Rice is the staple food for more than half of the world's population and for more than 60% of China population. Increasing rice yield is therefore crucial for solving food shortage problem, ensuring food secruity, an...Rice is the staple food for more than half of the world's population and for more than 60% of China population. Increasing rice yield is therefore crucial for solving food shortage problem, ensuring food secruity, and reducing poverty. Given the vast population and limited per capita cultivated land in China, meeting food demands by increasing the yield per unit area with the aid of advanced sciences and technologies would be the only option. Several alternative measures for increasing crop yield, such as building water conservancy facilities, increasing fertilizer application, improving soil texture, forming interrelated cultivation techniques, more effective controlling of pests and diseases, and using of elite varieties, have been undertaken. Among these alternative measures, adopting elite varieties, particularly popularizing super hybrid rice, proves to be the most economical and effective option.展开更多
In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular,...In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.展开更多
China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to...China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to keep pace with domestic and international changes. It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978, prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC), and gradually enhancing both these two imperatives after the 18th CPC National Congress. Currently, with the once-in-a-century global changes and the increase in traditional and non-traditional security threats, China is confronted with unprecedented external challenges. However, its capability to preserve national security still needs improvement. Based on a clear understanding of the situation, the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security, highlighting “ensuring both development and security” as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance. Thus, it provides guidance, both in theory and in practice, for pursuing the path of national security with Chinese characteristics.展开更多
Background: The department of defense's field manual(FM) 3-11 is among the military's field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Si...Background: The department of defense's field manual(FM) 3-11 is among the military's field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Since post 9-11, U.S. military service members have been deployed in the global war on terrorism. This study attempted to determine the effectiveness of the FM 3-11 in detecting, deterring or preventing a human-borne with bioagent(HBBA) terrorist breach at an entry control point(ECP).Methods: This time-specific, cross-sectional study disseminated a validated survey tool with Cronbach's α>0.82 to respondents who have had antiterrorism training and combat ECP experience. The return rate was greater than 75.0%; however, many of the respondents failed to meet the inclusion criteria. Consequently, only 26 questionnaires were included in the sample.Results: The results revealed that while over 60.0% of the respondents either strongly agreed or agreed that biointelligence, the deployment of biodetectors and the use of biowarning systems could be effective in preventing an ECP breach by a terrorist with a bioagent, the use of protective equipment and immunization to decontaminate service members or other tactics, techniques and procedures(TTPs) would never prevent a breach. A large percentage of respondents claimed that soldiers at the ECP lacked the devices or the knowledge to detect an HBBA at an ECP, and 72.0% suggested modifying current ECP TTPs to include education, training and equipment for security personnel at military base ECPs.Conclusion: If obtained from appropriate sources and communicated to the personnel at the ECP in an effective or timely manner, the possible effectiveness of certain TTPs in the FM 3-11, specifically FM 3-11.86(intelligence), might increase.展开更多
Ensuring food security is the top priority for any country in the world.It is more so for China,a developing country with 1.4 billion people.Since the 18 th National Congress of the Communist Party of China in 2012。
The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to i...The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to improve the performance of fading channels reducing the effects of aforementioned parameters. Motivated by these issues, in this paper, a secure wireless multicasting scenario through κ-μ shadowed fading channel is considered in the presence of multiple eavesdroppers with opportunistic relaying. The main purpose of this paper is to ensure the security level in wireless multicasting compensating the loss of security due to the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers, by opportunistic relaying technique. The closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to understand the insight of the effects of above parameters. The results show that the loss of security in multicasting through κ-μ shadowed fading channel can be significantly enhanced using opportunistic relaying technique by compensating the effects of scatterers, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers.展开更多
Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publicati...Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.展开更多
A serious sandstorm occurred in North China from April 5 to April 7, 2000, while the remote smallsand decending took place in even larger area to the far northeast China. In Chanchun city, smallsand descending with sn...A serious sandstorm occurred in North China from April 5 to April 7, 2000, while the remote smallsand decending took place in even larger area to the far northeast China. In Chanchun city, smallsand descending with snow provides the best samples to conduct a quantitative research on the possible impacts of city - ecology. In the 253km2 urban district area of Changchun city, smallsands accumulated up to more than 3000t on April 7, according to the calculation of four "mud - snow" samples. After naturally melting in room temperature, two samples are taken to do quarantine of "invasion bacteria". As a preliminary result, the individual amount of bacterium in 1 ml sample water is up to 8. 9 x 104 or 1. 05 x 105, and it is estimated that there are 640 million "invasion bacterium" individuals in one square meter. This study proves that other than the obvious environmental effects of sandstorm, the urban micro - ecosystem is very possible under threat by the "invasion bacterium" accompanied by remote descending smallsand.展开更多
文摘Rice is the staple food for more than half of the world's population and for more than 60% of China population. Increasing rice yield is therefore crucial for solving food shortage problem, ensuring food secruity, and reducing poverty. Given the vast population and limited per capita cultivated land in China, meeting food demands by increasing the yield per unit area with the aid of advanced sciences and technologies would be the only option. Several alternative measures for increasing crop yield, such as building water conservancy facilities, increasing fertilizer application, improving soil texture, forming interrelated cultivation techniques, more effective controlling of pests and diseases, and using of elite varieties, have been undertaken. Among these alternative measures, adopting elite varieties, particularly popularizing super hybrid rice, proves to be the most economical and effective option.
基金supported by the Fundamental Research Funds for the Center University of China under Grant HIT. MKSTISP. 2016 13
文摘In this paper, we consider the secure data transmission over α-η-κ-μ fading channels, which are recently proposed to encompass nearly all the well-known statistical models adopted in the literature. In particular, we address the secrecy performance in terms of the average secrecy capacity(ASC) and the secrecy outage probability(SOP), for which novel analytical expressions are derived. Simulation results verify the analysis and demonstrate the impact of the physical parameters on the secrecy performance of this new channel fading model.
文摘China has always placed great importance on the relationship between development and security. Since the founding of the People’s Republic in 1949, China has been modifying its approach to security and development to keep pace with domestic and international changes. It has gone through three periods in terms of its approach to development and security—prioritizing security before the launch of the reform and opening-up policy in 1978, prioritizing development between 1978 and the 18th National Congress of the Communist Party of China(CPC), and gradually enhancing both these two imperatives after the 18th CPC National Congress. Currently, with the once-in-a-century global changes and the increase in traditional and non-traditional security threats, China is confronted with unprecedented external challenges. However, its capability to preserve national security still needs improvement. Based on a clear understanding of the situation, the CPC Central Committee with Comrade Xi Jinping at its core has proposed a holistic approach to national security, highlighting “ensuring both development and security” as a guideline for China’s socio-economic development and a major principle underlying the CPC’s governance. Thus, it provides guidance, both in theory and in practice, for pursuing the path of national security with Chinese characteristics.
文摘Background: The department of defense's field manual(FM) 3-11 is among the military's field manuals for preparing for, reacting to and recovering from chemical, biological, radiological and nuclear attacks. Since post 9-11, U.S. military service members have been deployed in the global war on terrorism. This study attempted to determine the effectiveness of the FM 3-11 in detecting, deterring or preventing a human-borne with bioagent(HBBA) terrorist breach at an entry control point(ECP).Methods: This time-specific, cross-sectional study disseminated a validated survey tool with Cronbach's α>0.82 to respondents who have had antiterrorism training and combat ECP experience. The return rate was greater than 75.0%; however, many of the respondents failed to meet the inclusion criteria. Consequently, only 26 questionnaires were included in the sample.Results: The results revealed that while over 60.0% of the respondents either strongly agreed or agreed that biointelligence, the deployment of biodetectors and the use of biowarning systems could be effective in preventing an ECP breach by a terrorist with a bioagent, the use of protective equipment and immunization to decontaminate service members or other tactics, techniques and procedures(TTPs) would never prevent a breach. A large percentage of respondents claimed that soldiers at the ECP lacked the devices or the knowledge to detect an HBBA at an ECP, and 72.0% suggested modifying current ECP TTPs to include education, training and equipment for security personnel at military base ECPs.Conclusion: If obtained from appropriate sources and communicated to the personnel at the ECP in an effective or timely manner, the possible effectiveness of certain TTPs in the FM 3-11, specifically FM 3-11.86(intelligence), might increase.
文摘Ensuring food security is the top priority for any country in the world.It is more so for China,a developing country with 1.4 billion people.Since the 18 th National Congress of the Communist Party of China in 2012。
文摘The effects of scatterers, fluctuation parameter and propagation clusters significantly affect the performance of κ-μ shadowed fading channel. On the other hand, opportunistic relaying is an efficient technique to improve the performance of fading channels reducing the effects of aforementioned parameters. Motivated by these issues, in this paper, a secure wireless multicasting scenario through κ-μ shadowed fading channel is considered in the presence of multiple eavesdroppers with opportunistic relaying. The main purpose of this paper is to ensure the security level in wireless multicasting compensating the loss of security due to the effects of power ratio between dominant and scattered waves, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers, by opportunistic relaying technique. The closed-form analytical expressions are derived for the probability of non-zero secrecy multicast capacity (PNSMC) and the secure outage probability for multicasting (SOPM) to understand the insight of the effects of above parameters. The results show that the loss of security in multicasting through κ-μ shadowed fading channel can be significantly enhanced using opportunistic relaying technique by compensating the effects of scatterers, fluctuation parameter, and the number of propagation clusters, multicast users and eavesdroppers.
文摘Healthcare security and privacy breaches are occurring in the United States (US), and increased substantially during the pandemic. This paper reviews the National Institute of Standards and Technology (NIST) publication base as an effective solution. The NIST Special Publication 800-66 Revision 1 was an essential standard in US healthcare, which was withdrawn in February 2024 and superseded by SP 800-66 Revision 2. This review investigates the academic papers concerning the application of the NIST SP 800-66 Revision 1 standard in the US healthcare literature. A systematic review method was used in this study to determine current knowledge gaps of the SP 800-66 Revision 1. Some limitations were employed in the search to enforce validity. A total of eleven articles were found eligible for the study. Consequently, this study suggests the necessity for additional academic papers pertaining to SP 800-66 Revision 2 in the US healthcare literature. In turn, it will enhance awareness of safeguarding electronic protected health information (ePHI), help to mitigate potential future risks, and eventually reduce breaches.
文摘A serious sandstorm occurred in North China from April 5 to April 7, 2000, while the remote smallsand decending took place in even larger area to the far northeast China. In Chanchun city, smallsand descending with snow provides the best samples to conduct a quantitative research on the possible impacts of city - ecology. In the 253km2 urban district area of Changchun city, smallsands accumulated up to more than 3000t on April 7, according to the calculation of four "mud - snow" samples. After naturally melting in room temperature, two samples are taken to do quarantine of "invasion bacteria". As a preliminary result, the individual amount of bacterium in 1 ml sample water is up to 8. 9 x 104 or 1. 05 x 105, and it is estimated that there are 640 million "invasion bacterium" individuals in one square meter. This study proves that other than the obvious environmental effects of sandstorm, the urban micro - ecosystem is very possible under threat by the "invasion bacterium" accompanied by remote descending smallsand.