Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situatio...Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences.展开更多
In the field of sequencing of secret number,an important problem is how to establish an efficient and secure protocol for sorting the secret number.As a powerful tool in solving privacy sequencing problems,secure mult...In the field of sequencing of secret number,an important problem is how to establish an efficient and secure protocol for sorting the secret number.As a powerful tool in solving privacy sequencing problems,secure multipart computation is more and more popular in anonymous voting and online auction.In the present study,related secure computation protocol for sequencing problem is not many by far.In order to improve the efficiency and safety,we propose a security sequencing protocol based on homomorphic encryption.We also give analysis of correctness and security to highlight its feasibility.展开更多
The aim of the article was firstly to analyze a specific character of the food security's concept, and secondly to present a large variety of stakeholders' positions dealing with the issue and their impact on econom...The aim of the article was firstly to analyze a specific character of the food security's concept, and secondly to present a large variety of stakeholders' positions dealing with the issue and their impact on economic and political dimensions. For this purpose, a review in available studies and documents was made. The results show that a lack of the precise definition for the food security's concept creates different understandings, leading to various interpretations and divergent solutions. The reasons could be found in specifics of the food security's concept which is qualified as a wicked problem. Wicked problems refer to issues which are highly complex, have innumerable and undefined causes and are difficult to understand and frame. Therefore, caution is required when positions of stakeholders are estimating. Based on literature, it can be stated that the productionist (focusing on intensive food production) and environmental frames are dominant in the debate, resulting in potential conflicts and different claims about action to be taken. As a result, a clear political vision on the food security's concept is lacking. In conclusion, a return to the principle what food production is economically, socially and environmentally sustainable can reshape a public debate in order to actively form food security policies at the global and national levels in the future. However, better coping strategies like cooperative strategy should be developed to tame food security as a wicked problem by turning over to stakeholders for new definitions and solutions.展开更多
With the development of social economy and industry,fisheries also play an important role in the development of the country.In the process of fishery development,the problems in the fishermen’s social security system...With the development of social economy and industry,fisheries also play an important role in the development of the country.In the process of fishery development,the problems in the fishermen’s social security system are becoming more and more serious,and the types of problems are gradually increasing.Discovering the problems existing in the development of fisheries,and making up and correcting them in time,has an important role in promoting the development of fisheries and social and economic development.In recent years,the issue of“agriculture,rural areas and farmers”has been a hot topic of discussion.During the course of the problem,the party and the government introduced a series of safeguard measures and policy systems.Based on this,this paper focuses on the problems existing in the fishermen’s social security system and the measures to solve the problems.At the same time,the reasons for the reform of the fishermen’s social security system are also briefly explained.The main reasons can be divided into four points,namely the cost of living,unemployment insurance for fishermen,fishery resources,and income of fishermen,etc.,which are the reasons why the fishery social security system is in urgent need of optimization,contributing to the sustainable development and progress of fisheries.展开更多
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"...Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.展开更多
In May 1993, the State Council promulgated ProvisionalRegulations Regarding the Issuing of Stocks and theAdministration of Stock Dealings. However, the Stock Act isstill in the process of drafting. This paper intends ...In May 1993, the State Council promulgated ProvisionalRegulations Regarding the Issuing of Stocks and theAdministration of Stock Dealings. However, the Stock Act isstill in the process of drafting. This paper intends to discuss thefollowing three problems concerning the securities legislation.展开更多
The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as seriou...The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as serious social crimes The first was from terrorist threat, and the global Jihad network in Eurasia was looming in the early 21st century, which was guided by radical ideologies; the second threat was from ethnic separatist groups; the third threat was related with foreign personnel and diplomats' security; the fourth threat was from mass disturbances, and the fifth was from serious social crimes. China's measures to these potential multi-faceted challenges were serious and various, including preventing terrorist attacks through international cooperation, lessening ethnic separatists' dissatisfaction and avoiding possible mass demonstration, reducing the chance of domestic mass disturbances, guaranteeing public transportation and aerospace security, making extensive use of advanced technologies and referring to other countries' expertise in security check, seeking help from other provinces bordering Shanghai, and strengthening control over explosive materials, etc.. Nevertheless, the efficacy of the above-mentioned countermeasures was problematic, for they were more defensive than offensive, more passive than proactive, and more tactical than strategic.展开更多
At the present stage,with the continuous development of social economy and science and technology,China's financial and securities industry has gradually developed.As an important part of China's socialist eco...At the present stage,with the continuous development of social economy and science and technology,China's financial and securities industry has gradually developed.As an important part of China's socialist economic market,including the financial and securities industry,therefore,to a certain extent,the development of the financial securities industry has promoted the prosperity and development of China's economy.In other words,strengthening the management of financial securities market regulation can promote the sustainable development of the securities industry,thereby promoting the rapid development of China's economy.This paper mainly discusses and expounds some problems existing in the current process of financial securities market regulation,and proposes solutions to it,hoping to be helpful to the financial securities industry.展开更多
With the rapid development of the computer network technologies, in the application of the computer networks, the importance of the network security is becoming increasingly prominent, and computer network security is...With the rapid development of the computer network technologies, in the application of the computer networks, the importance of the network security is becoming increasingly prominent, and computer network security issues have received more and more attention of the communities. In the face of the problems of the security hidden trouble in the computer network, it is essential to take the relevant measures to ensure the safety of the computer network. With the computer network security as the breakthrough point, this paper discusses the precautionary measures of the computer network security based on the analysis of the computer network security, in order to illustrate the importance of the computer network security, to provide references for ensuring the security of the computer network.展开更多
The first 20 years of this century is the period of strategic opportunities of building a weU-offsociety in an all-round way, at the same time, China's social development is also facing a lot of systemic risk. Econom...The first 20 years of this century is the period of strategic opportunities of building a weU-offsociety in an all-round way, at the same time, China's social development is also facing a lot of systemic risk. Economic change and social transformation puts forward new requirements for the social security system reform. This paper studies the theoretical basis of the social security system reform, analyzes the status quo of China's social security system and the existing problems and experience in social security system of other countries for reference, on the basis of perfecting China's pension, medical, unemployment and other social security system, the construction is suitable for the situation of our country's social security system with Chinese characteristics, ensuring and improving people's livelihood, the achievements of reform and opening to the public to achieve genuine sharing is of great significance.展开更多
The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous res...The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous research results. Then we prove the security of LWE public key cryptosystem by Regev in detail. For not only independent identical Gaussian disturbances but also any general independent identical disturbances, we give a more accurate estimation probability of decryption error of general LWE cryptosystem. This guarantees high security and widespread applications of the LWE public key cryptosystem.展开更多
Since China’s reform and opening to the outside world,especially since the mid-1990s,China's social security system has undergone a number of reforms and adjustments.We can say that the basic framework of social ...Since China’s reform and opening to the outside world,especially since the mid-1990s,China's social security system has undergone a number of reforms and adjustments.We can say that the basic framework of social insurance system had been established,but it is still facing many difficulties such as small coverage,high payment rates,"empty" individual accounts,etc.The question is whether China will choose the proper way from so many suggestions inside and outside China to solve the above issues.I will analyze some important issues on pension reform and old age security system construction and give my own view in this paper.展开更多
To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- u...To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- ure network coding algorithms. Firstly, by means of the distance between the message and its sig- nature in a lattice, we propose a Distance-bas- ed Secure Network Coding (DSNC) algorithm and stipulate its security to a new hard problem Fixed Length Vector Problem (FLVP), which is harder than Shortest Vector Problem (SVP) on lattices. Secondly, considering the bound- ary on the distance between the message and its signature, we further propose an efficient Bo- undary-based Secure Network Coding (BSNC) algorithm to reduce the computing complexity induced by square calculation in DSNC. Sim- ulation results and security analysis show that the proposed signature schemes have stronger unforgeability due to the natural property of lattices than traditional Rivest-Shamir-Adleman (RSA)-based signature scheme. DSNC algo- rithm is more secure and BSNC algorithm greatly reduces the time cost on computation.展开更多
Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs ...Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs to curb various NTS threats, given a countryslimited resources and capacities? By raising thought-provoking questions, the author triesto explain the perplexity concerning NTS issues, arguing that NTS is important in economic,political and security sense, but that more efforts are needed from the academics in order toreach a consensus in understanding and dealing with NTS issues.展开更多
The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presente...The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing.展开更多
With the continuous development of economy in our country, the level of science and technology requirements are also become greater. In the process of scientific and technological progress, ensuring that technology ca...With the continuous development of economy in our country, the level of science and technology requirements are also become greater. In the process of scientific and technological progress, ensuring that technology can serve the public better is a problem that needs to be faced in our study. In our daily life, computer networks have become essential to everyone, and the use of computers can bring a lot of convenience to the public which is also an important guarantee for the continuous development of society. However, when we use computers, we will face the problems related to computer network security. These problems will bring a lot of negative results for users or industries. Based on these considerations, in the process of using a computer network, we have to maintain the network system. In this paper, we discussed the development situation and problems of computer network security at the present stage. And in the process, we are looking for more solutions to maintain the security of computer network.展开更多
Mobile Ad-hoc Network(MANET)routing problems are thoroughly studied several approaches are identified in support of MANET.Improve the Quality of Service(QoS)performance of MANET is achieving higher performance.To redu...Mobile Ad-hoc Network(MANET)routing problems are thoroughly studied several approaches are identified in support of MANET.Improve the Quality of Service(QoS)performance of MANET is achieving higher performance.To reduce this drawback,this paper proposes a new secure routing algorithm based on real-time partial ME(Mobility,energy)approximation.The routing method RRME(Real-time Regional Mobility Energy)divides the whole network into several parts,and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly.It is done in the path discovery phase,estimated to identify and remove malicious nodes.In addition,Trusted Forwarding Factor(TFF)calculates the various nodes based on historical records and other characteristics of multiple nodes.Similarly,the calculated QoS Support Factor(QoSSF)calculating by the Data Forwarding Support(DFS),Throughput Support(TS),and Lifetime Maximization Support(LMS)to any given path.One route was found to implement the path of maximizing MANET QoS based on QoSSF value.Hence the proposed technique produces the QoS based on real-time regional ME feature approximation.The proposed simulation implementation is done by the Network Simulator version 2(NS2)tool to produce better performance than other methods.It achieved a throughput performance had 98.5%and a routing performance had 98.2%.展开更多
文摘Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences.
基金supported by the National Natural Science Foundation of China under Grant No.51307004
文摘In the field of sequencing of secret number,an important problem is how to establish an efficient and secure protocol for sorting the secret number.As a powerful tool in solving privacy sequencing problems,secure multipart computation is more and more popular in anonymous voting and online auction.In the present study,related secure computation protocol for sequencing problem is not many by far.In order to improve the efficiency and safety,we propose a security sequencing protocol based on homomorphic encryption.We also give analysis of correctness and security to highlight its feasibility.
文摘The aim of the article was firstly to analyze a specific character of the food security's concept, and secondly to present a large variety of stakeholders' positions dealing with the issue and their impact on economic and political dimensions. For this purpose, a review in available studies and documents was made. The results show that a lack of the precise definition for the food security's concept creates different understandings, leading to various interpretations and divergent solutions. The reasons could be found in specifics of the food security's concept which is qualified as a wicked problem. Wicked problems refer to issues which are highly complex, have innumerable and undefined causes and are difficult to understand and frame. Therefore, caution is required when positions of stakeholders are estimating. Based on literature, it can be stated that the productionist (focusing on intensive food production) and environmental frames are dominant in the debate, resulting in potential conflicts and different claims about action to be taken. As a result, a clear political vision on the food security's concept is lacking. In conclusion, a return to the principle what food production is economically, socially and environmentally sustainable can reshape a public debate in order to actively form food security policies at the global and national levels in the future. However, better coping strategies like cooperative strategy should be developed to tame food security as a wicked problem by turning over to stakeholders for new definitions and solutions.
文摘With the development of social economy and industry,fisheries also play an important role in the development of the country.In the process of fishery development,the problems in the fishermen’s social security system are becoming more and more serious,and the types of problems are gradually increasing.Discovering the problems existing in the development of fisheries,and making up and correcting them in time,has an important role in promoting the development of fisheries and social and economic development.In recent years,the issue of“agriculture,rural areas and farmers”has been a hot topic of discussion.During the course of the problem,the party and the government introduced a series of safeguard measures and policy systems.Based on this,this paper focuses on the problems existing in the fishermen’s social security system and the measures to solve the problems.At the same time,the reasons for the reform of the fishermen’s social security system are also briefly explained.The main reasons can be divided into four points,namely the cost of living,unemployment insurance for fishermen,fishery resources,and income of fishermen,etc.,which are the reasons why the fishery social security system is in urgent need of optimization,contributing to the sustainable development and progress of fisheries.
基金supported by the National Natural Science Foundation Innovation Group Project(61521003)。
文摘Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.
文摘In May 1993, the State Council promulgated ProvisionalRegulations Regarding the Issuing of Stocks and theAdministration of Stock Dealings. However, the Stock Act isstill in the process of drafting. This paper intends to discuss thefollowing three problems concerning the securities legislation.
文摘The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as serious social crimes The first was from terrorist threat, and the global Jihad network in Eurasia was looming in the early 21st century, which was guided by radical ideologies; the second threat was from ethnic separatist groups; the third threat was related with foreign personnel and diplomats' security; the fourth threat was from mass disturbances, and the fifth was from serious social crimes. China's measures to these potential multi-faceted challenges were serious and various, including preventing terrorist attacks through international cooperation, lessening ethnic separatists' dissatisfaction and avoiding possible mass demonstration, reducing the chance of domestic mass disturbances, guaranteeing public transportation and aerospace security, making extensive use of advanced technologies and referring to other countries' expertise in security check, seeking help from other provinces bordering Shanghai, and strengthening control over explosive materials, etc.. Nevertheless, the efficacy of the above-mentioned countermeasures was problematic, for they were more defensive than offensive, more passive than proactive, and more tactical than strategic.
文摘At the present stage,with the continuous development of social economy and science and technology,China's financial and securities industry has gradually developed.As an important part of China's socialist economic market,including the financial and securities industry,therefore,to a certain extent,the development of the financial securities industry has promoted the prosperity and development of China's economy.In other words,strengthening the management of financial securities market regulation can promote the sustainable development of the securities industry,thereby promoting the rapid development of China's economy.This paper mainly discusses and expounds some problems existing in the current process of financial securities market regulation,and proposes solutions to it,hoping to be helpful to the financial securities industry.
文摘With the rapid development of the computer network technologies, in the application of the computer networks, the importance of the network security is becoming increasingly prominent, and computer network security issues have received more and more attention of the communities. In the face of the problems of the security hidden trouble in the computer network, it is essential to take the relevant measures to ensure the safety of the computer network. With the computer network security as the breakthrough point, this paper discusses the precautionary measures of the computer network security based on the analysis of the computer network security, in order to illustrate the importance of the computer network security, to provide references for ensuring the security of the computer network.
文摘The first 20 years of this century is the period of strategic opportunities of building a weU-offsociety in an all-round way, at the same time, China's social development is also facing a lot of systemic risk. Economic change and social transformation puts forward new requirements for the social security system reform. This paper studies the theoretical basis of the social security system reform, analyzes the status quo of China's social security system and the existing problems and experience in social security system of other countries for reference, on the basis of perfecting China's pension, medical, unemployment and other social security system, the construction is suitable for the situation of our country's social security system with Chinese characteristics, ensuring and improving people's livelihood, the achievements of reform and opening to the public to achieve genuine sharing is of great significance.
文摘The main purpose of this paper is to introduce the LWE public key cryptosystem with its security. In the first section, we introduce the LWE public key cryptosystem by Regev with its applications and some previous research results. Then we prove the security of LWE public key cryptosystem by Regev in detail. For not only independent identical Gaussian disturbances but also any general independent identical disturbances, we give a more accurate estimation probability of decryption error of general LWE cryptosystem. This guarantees high security and widespread applications of the LWE public key cryptosystem.
文摘Since China’s reform and opening to the outside world,especially since the mid-1990s,China's social security system has undergone a number of reforms and adjustments.We can say that the basic framework of social insurance system had been established,but it is still facing many difficulties such as small coverage,high payment rates,"empty" individual accounts,etc.The question is whether China will choose the proper way from so many suggestions inside and outside China to solve the above issues.I will analyze some important issues on pension reform and old age security system construction and give my own view in this paper.
基金ACKNOWLEDGEMENT This work was partially supported by the National Basic Research Program of China under Grant No. 2012CB315905 the National Natural Sci- ence Foundation of China under Grants No. 61272501, No. 61173154, No. 61370190 and the Beijing Natural Science Foundation under Grant No. 4132056.
文摘To provide a high-security guaran- tee to network coding and lower the comput- ing complexity induced by signature scheme, we take full advantage of homomorphic prop- erty to build lattice signature schemes and sec- ure network coding algorithms. Firstly, by means of the distance between the message and its sig- nature in a lattice, we propose a Distance-bas- ed Secure Network Coding (DSNC) algorithm and stipulate its security to a new hard problem Fixed Length Vector Problem (FLVP), which is harder than Shortest Vector Problem (SVP) on lattices. Secondly, considering the bound- ary on the distance between the message and its signature, we further propose an efficient Bo- undary-based Secure Network Coding (BSNC) algorithm to reduce the computing complexity induced by square calculation in DSNC. Sim- ulation results and security analysis show that the proposed signature schemes have stronger unforgeability due to the natural property of lattices than traditional Rivest-Shamir-Adleman (RSA)-based signature scheme. DSNC algo- rithm is more secure and BSNC algorithm greatly reduces the time cost on computation.
文摘Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs to curb various NTS threats, given a countryslimited resources and capacities? By raising thought-provoking questions, the author triesto explain the perplexity concerning NTS issues, arguing that NTS is important in economic,political and security sense, but that more efforts are needed from the academics in order toreach a consensus in understanding and dealing with NTS issues.
基金This study is supported by National Natural Science Foundation of China (No.60973146) National Natur al Science Foundation of Beijing (No.4092029) The Fundamental Research Funds for the Central Universities (No.2009RC0217). We also thank the anonymous reviewers for their constructive comments.
文摘The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing.
文摘With the continuous development of economy in our country, the level of science and technology requirements are also become greater. In the process of scientific and technological progress, ensuring that technology can serve the public better is a problem that needs to be faced in our study. In our daily life, computer networks have become essential to everyone, and the use of computers can bring a lot of convenience to the public which is also an important guarantee for the continuous development of society. However, when we use computers, we will face the problems related to computer network security. These problems will bring a lot of negative results for users or industries. Based on these considerations, in the process of using a computer network, we have to maintain the network system. In this paper, we discussed the development situation and problems of computer network security at the present stage. And in the process, we are looking for more solutions to maintain the security of computer network.
文摘Mobile Ad-hoc Network(MANET)routing problems are thoroughly studied several approaches are identified in support of MANET.Improve the Quality of Service(QoS)performance of MANET is achieving higher performance.To reduce this drawback,this paper proposes a new secure routing algorithm based on real-time partial ME(Mobility,energy)approximation.The routing method RRME(Real-time Regional Mobility Energy)divides the whole network into several parts,and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly.It is done in the path discovery phase,estimated to identify and remove malicious nodes.In addition,Trusted Forwarding Factor(TFF)calculates the various nodes based on historical records and other characteristics of multiple nodes.Similarly,the calculated QoS Support Factor(QoSSF)calculating by the Data Forwarding Support(DFS),Throughput Support(TS),and Lifetime Maximization Support(LMS)to any given path.One route was found to implement the path of maximizing MANET QoS based on QoSSF value.Hence the proposed technique produces the QoS based on real-time regional ME feature approximation.The proposed simulation implementation is done by the Network Simulator version 2(NS2)tool to produce better performance than other methods.It achieved a throughput performance had 98.5%and a routing performance had 98.2%.