The research studied opportunities and potential threats confronted by agricultural sustainable development, laying foundation for optimization of agricultural structure, transformation of agricultural development mod...The research studied opportunities and potential threats confronted by agricultural sustainable development, laying foundation for optimization of agricultural structure, transformation of agricultural development mode, and accomplishment of agricultural modernization. On basis of development target, development theory and route of the 13^th Five-year Plan, the research analysis the opportunities and potential threats of Yunnan agriculture and proposed policy suggestions on sustainable development of agriculture from the perspectives of ecological and competitive advantage, as well as sustainable development division in order to provide references for scientific formulation and decision-making of relevant regional planning.展开更多
Background Despite high relapse rate among methamphetamine (MA) abusers, there still have been little empirical data to date detecting the risk factors related to craving and relapse from the perspective of MA abusers...Background Despite high relapse rate among methamphetamine (MA) abusers, there still have been little empirical data to date detecting the risk factors related to craving and relapse from the perspective of MA abusers. Therefore, the aim of this study was to use qualitative research methods exploring the strengths, weaknesses, opportunities and threat factors that could facilitate or impede individuals' abstinence in a real-life context from the perspectives of MA abusers. Aim To use qualitative research methods exploring the strengths, weaknesses, opportunities and threat factors relating to individuals' abstinence in a real-life context. Method Semistructured interviews were conducted with 32 MA abusers recruited in Shanghai guided by open-ended questions on narrating the real-life catalysts and inhibitors related to craving, initiation, relapse and abstinence. All data were transcribed verbatim and analysed using a strengths, weaknesses, opportunities and threats (SWOT) analysis. Results The results of the SWOT analysis revealed that contextual factors including peer influence, prevalence and availability of MA, familiar venue of MA use, discrimination, sexual behaviours, alcohol, emotional states and their attitudes towards smoking MA were important factors that contribute to reinitiation and relapse. Surveillance systems, antidrug social workers, vocational skills trainings, moving to another city and family responsibility might serve as counter measures targeti叩 those mentioned weaknesses and threats above. Conclusion This SWOT analysis highlights the complex nature of relapse. Comprehensive interventions strengtheni叩 coping skills such as virtual reality techniques are desperately needed to facilitate individuals1 sustained abstinence.展开更多
The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environment...The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environmental pollution.Due to their intermittent nature,these green and sustainable sources require appropriate energy storage systems.Amongst different energy storage technologies,electrochemical energy storage devices,particularly supercapacitors(SCs),have fascinated global attention for their utilization in electric vehicles,power supports,portable electronics,and many others application requiring electric energy devices for their operation.Thus,the growth of SCs in the commercial market has squeezed requirements,and further developments are obligatory for their effective industrialization.In the meantime,SCs also face technical complications and contests for their introduction in industrial settings because of their low energy density and high Levelized cost.The present study combines core strengths,weaknesses,opportunities,and threats(SWOT)analysis of SCs with new perspectives and recent ideas.The challenges and the future progressive prospects of SCs are also presented in detail.This review will afford consistent direction and new superhighways for the further development of SCs as standalone and complementary energy storage systems.展开更多
Jordan’s mining sector is considered the cornerstone to the Jordanian economy. It plays a vital role in growth of many other important sectors in the economy and contributes to the Jordan’s standard of living. The m...Jordan’s mining sector is considered the cornerstone to the Jordanian economy. It plays a vital role in growth of many other important sectors in the economy and contributes to the Jordan’s standard of living. The mining industry in Jordan is dominated by the production of phosphate, potash, building and decoration stones, glass sand and other nonmetallic resources. Recently, Jordan has been ranked as the sixth largest producer and the second largest exporter of phosphate, the fourth largest producer and the second largest exporter of potash, and has the 5th largest oil-shale reserves in the world. Also, Jordan has sustainable amounts of uranium around 3% of the world resources. The main objective of this research is to focus on the present status of mining industry in Jordan with the aim to emphasis the most important industries, and its effect on the economy of Jordan in order to generate new wealth depends on its mineral endowment. A literature review has been carried out by reviewing the most published articles and the publicly available reports published by various Jordanian Institutions as well as from the private sector. The author reveals that there are many positive outlooks which are looming with an increasing domestic added value along with investing in other areas, such as feldspar, clays, travertine, gypsum, zirconium, uranium, copper and rare earth elements (REE). This requires activating the exploitation of many other untapped mineral resources in the country to achieve a progress that works for meeting the global great demands worldwide. In this context, successive governments have put effort into policies that promote and facilitate investment in the mining sector in Jordan. A comprehensive outlook of the mining sector in Jordan has been discussed in this article. The author also highlighted the opportunities and threats in this sector and more important dilemmas focused on what needs to be carried out by the Jordanian government, including important recommendations to encourage investment in this field and inspire investors in the mining industry in Jordan.展开更多
Training of preschool teachers in Sichuan Province brings advantages in increasing government support for the preschool education industry.The society attaches an important role to the preschool education industry as ...Training of preschool teachers in Sichuan Province brings advantages in increasing government support for the preschool education industry.The society attaches an important role to the preschool education industry as well as the rapid development of preschool education in Sichuan Province.However,problem exists in large flows of preschool teachers and imbalanced gender ratios.By viewing from the new situation,the comprehensive liberalization of the second-child policy and the development of educational informatization as well as the implementation of the one belt and one road strategy have created great opportunities in training of preschool teachers.At the same time,the increase in external impact of high-quality graduates in the east also poses a great threat to the development of preschool teachers in Sichuan Province.Through the strategic combination of strengths,weaknesses,opportunities,and threats analysis,the paper explores effective countermeasure ways to improve the quality of training of the preschool teachers in Sichuan Province and the construction of an excellent team of preschool teachers in Sichuan Province.展开更多
The belt and road initiative strategy is proposed based on the stable and sustainable cooperation on economy and development between China and neighboring countries.The development of economy can affect every aspect o...The belt and road initiative strategy is proposed based on the stable and sustainable cooperation on economy and development between China and neighboring countries.The development of economy can affect every aspect of vocational education development.Therefore,vocational education in China must be moved toward internationalization to achieve sustainable development in the face of the implementation of the belt and road initiative strategy.The analysis data obtained through the strengths,weaknesses,opportunities,and threats analysis method on the internationalization of China’s vocational education under the background of the belt and road initiative strategy were the advantages analysis(strengths)of continuous maturity in developing of vocational education,which drives by economic development and the foreign employment and entrepreneurship guidance mechanism;the disadvantages analysis(weaknesses)of lack talent cultivation and weak branding of vocational education;analysis of support opportunities given by national policy;and threats analysis of social culture in the involved countries along the route.To further develop and expand China’s vocational education under the background of the belt and road initiative strategy,some countermeasures were proposed such as improves cultivation or training of talents,to build strong branding of China vocational education,and faces cultural challenges to facilitate the international development of China vocational education.展开更多
The 21st century has seen the world superpowers,such as Russia and China and multi-lateral agencies encourage backward states to embrace and promote foreign direct investment(FDI)as an instrument to improve domestic p...The 21st century has seen the world superpowers,such as Russia and China and multi-lateral agencies encourage backward states to embrace and promote foreign direct investment(FDI)as an instrument to improve domestic production which will lead to economic growth and development.This is premised on the fact that FDI comes with transfer of technology,new and advanced management approaches,technical skills,and access to international markets.However,researchers have shown that occasionally FDI inflows achieve the opposite as they compete for the same markets with local industries and,as a result,they crowd out local industries leading to higher unemployment.Further,research has shown that most international financial crises were caused by rapid withdrawal of FDI.In essence,FDI can have positive and can also have negative effects on economic growth.Against this background,this discussion seeks to outline and look at the threats and opportunities that backward states,such as those in Africa will draw from the 21st century FDI from world superpowers.展开更多
The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated...The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats.展开更多
Spinal cord injury(SCI)is a devastating and disabling medical condition generally caused by a traumatic event(primary injury).This initial trauma is accompanied by a set of biological mechanisms directed to ameliorate...Spinal cord injury(SCI)is a devastating and disabling medical condition generally caused by a traumatic event(primary injury).This initial trauma is accompanied by a set of biological mechanisms directed to ameliorate neural damage but also exacerbate initial damage(secondary injury).The alterations that occur in the spinal cord have not only local but also systemic consequences and virtually all organs and tissues of the body incur important changes after SCI,explaining the progression and detrimental consequences related to this condition.Psychoneuroimmunoendocrinology(PNIE)is a growing area of research aiming to integrate and explore the interactions among the different systems that compose the human organism,considering the mind and the body as a whole.The initial traumatic event and the consequent neurological disruption trigger immune,endocrine,and multisystem dysfunction,which in turn affect the patient's psyche and well-being.In the present review,we will explore the most important local and systemic consequences of SCI from a PNIE perspective,defining the changes occurring in each system and how all these mechanisms are interconnected.Finally,potential clinical approaches derived from this knowledge will also be collectively presented with the aim to develop integrative therapies to maximize the clinical management of these patients.展开更多
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s...Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.展开更多
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues...Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks.展开更多
Considering the increased anthropogenic impacts,species with a limited range and low detectability often lack fundamental information and conservation actions,placing them at a high risk of endangerment.The Chinting a...Considering the increased anthropogenic impacts,species with a limited range and low detectability often lack fundamental information and conservation actions,placing them at a high risk of endangerment.The Chinting alpine toad Scutiger chintingensis is a rare mountain amphibian endemic to the eastern margin of the Qinghai-Xizang Plateau in China.Within its whole distribution range,only three known populations(Wolong,Emei,and Wawu)exist and no recent population status report has been documented for this species over the past two decades.From 2020 to 2023,we investigated the species distribution,and assessed the risk factors for the main populations.We recorded this species in all distribution areas,and updated a new distribution site with a lower elevation limit.The relative population density was 0.024±0.012 ind./m^(2)on Mount Emei,whereas only 0.008±0.017 ind./m^(2)on Mount Wawu.No significant difference was observed in the number of individuals between the two populations;however,the relative population density was significantly different.Sewage and waste discharge resulting from the construction of scenic areas,as well as disturbances from tourism,were the primary anthropogenic factors that influenced the survival of this species.Our results provide the updated information on the distribution and population status of the Chinting alpine toad,and suggest that unrecorded populations,as well as a wider elevation range,may exist for this species.Our findings emphasise the importance of timely updates of species distribution and population information and offer a basis for the future conservation of endangered amphibians.展开更多
Although AI and quantum computing (QC) are fast emerging as key enablers of the future Internet, experts believe they pose an existential threat to humanity. Responding to the frenzied release of ChatGPT/GPT-4, thousa...Although AI and quantum computing (QC) are fast emerging as key enablers of the future Internet, experts believe they pose an existential threat to humanity. Responding to the frenzied release of ChatGPT/GPT-4, thousands of alarmed tech leaders recently signed an open letter to pause AI research to prepare for the catastrophic threats to humanity from uncontrolled AGI (Artificial General Intelligence). Perceived as an “epistemological nightmare”, AGI is believed to be on the anvil with GPT-5. Two computing rules appear responsible for these risks. 1) Mandatory third-party permissions that allow computers to run applications at the expense of introducing vulnerabilities. 2) The Halting Problem of Turing-complete AI programming languages potentially renders AGI unstoppable. The double whammy of these inherent weaknesses remains invincible under the legacy systems. A recent cybersecurity breakthrough shows that banning all permissions reduces the computer attack surface to zero, delivering a new zero vulnerability computing (ZVC) paradigm. Deploying ZVC and blockchain, this paper formulates and supports a hypothesis: “Safe, secure, ethical, controllable AGI/QC is possible by conquering the two unassailable rules of computability.” Pursued by a European consortium, testing/proving the proposed hypothesis will have a groundbreaking impact on the future digital infrastructure when AGI/QC starts powering the 75 billion internet devices by 2025.展开更多
Hepatitis E virus(HEV),responsible for widespread viral hepatitis,infects approximately 2.3 billion individuals globally,with a significant mortality burden in Asia.The virus,primarily transmitted through contaminated...Hepatitis E virus(HEV),responsible for widespread viral hepatitis,infects approximately 2.3 billion individuals globally,with a significant mortality burden in Asia.The virus,primarily transmitted through contaminated water and undercooked meat,is often underdiagnosed,particularly in immunocompromised patients.Current HEV treatments,while effective,are limited by adverse effects,necessitating research into safer alternatives.Moreover,HEV’s extrahepatic manifestations,impacting the nervous and renal systems,remain poorly understood.This study underscores the imperative for enhanced HEV research,improved diagnostic methods,and more effective treatments,coupled with increased public health awareness and preventive strategies.展开更多
This study aims to explore the challenges and opportunities associated with developing healthcare infrastructure in Saudi Arabia through the implementation of smart technologies. The healthcare sector in Saudi Arabia ...This study aims to explore the challenges and opportunities associated with developing healthcare infrastructure in Saudi Arabia through the implementation of smart technologies. The healthcare sector in Saudi Arabia is undergoing significant transformation, and the integration of smart technologies has the potential to revolutionize healthcare delivery, improve patient outcomes, and enhance the overall healthcare experience. However, several challenges need to be addressed in order to fully leverage the benefits of smart technologies in healthcare infrastructure development. This research identifies and analyzes these challenges while also highlighting the opportunities that arise from the adoption of smart technologies in the Saudi Arabian healthcare system. The findings contribute to the understanding of the current state of healthcare infrastructure in Saudi Arabia and provide insights into the strategies and policies required to overcome challenges and maximize the benefits of smart technologies in healthcare.展开更多
China and Myanmar are geographically adjacent and have close economic and trade cooperation. China has been Myanmar’s largest trading partner and largest source of investment for many consecutive years. With the offi...China and Myanmar are geographically adjacent and have close economic and trade cooperation. China has been Myanmar’s largest trading partner and largest source of investment for many consecutive years. With the official entry into force of RCEP (Regional Comprehensive Economic Partnership) for Myanmar on May 1, 2022, the reduction of trade tariffs on goods and flexible rules of origin between China and Myanmar will undoubtedly bring more practical results to China Myanmar economic and trade cooperation. However, the implementation of RCEP in Myanmar may face a series of challenges such as poor business environment, weak human resource management, and outdated infrastructure construction. Finally, the article provides countermeasures for China Myanmar economic and trade cooperation from three aspects: optimizing the business environment to attract Chinese investment, increasing investment in education and training to improve labor quality, strengthening infrastructure construction to enhance economic support.展开更多
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ...Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company.展开更多
The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate...The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate with each other to complete a search and rescue task.Secondly,a threat assessment method based on meteorological data was proposed,and potential meteorological threats,such as storms and rainfall,can be predicted by collecting and analyzing meteorological data.Finally,an experiment was carried out to evaluate the performance of the proposed method in different scenarios.The experimental results show that the coordinated search and rescue system of unmanned/manned aircraft can be used to effectively assess meteorological threats and provide accurate search and rescue guidance.展开更多
Insects are posited to be declining globally.This stark reality poses a grave threat to the delicate balance of ecosystems that depend on these creatures for pollination,decomposition,and as a vital food source.Recent...Insects are posited to be declining globally.This stark reality poses a grave threat to the delicate balance of ecosystems that depend on these creatures for pollination,decomposition,and as a vital food source.Recent studies emphasize three interconnected forces driving this decline:The substantial impact of climate change on insect populations,widespread habitat destruction due to human activities,and the farreaching consequences of modern agricultural practices,particularly the extensive use of pesticides.Addressing these interconnected threats is more urgent than ever,as the future of ecosystems and the benefits they provide to human societies are increasingly at risk.展开更多
This paper comprehensively analyzes the development opportunities and realistic dilemmas faced by adult higher education in China in the new era,and puts forward corresponding strategies as solutions.With the construc...This paper comprehensively analyzes the development opportunities and realistic dilemmas faced by adult higher education in China in the new era,and puts forward corresponding strategies as solutions.With the construction of a learning society,the development of digital technology,and the popularization of the concept of lifelong learning,adult higher education has unprecedented development opportunities.At the same time,these forms of education are facing a series of dilemmas due to challenges such as unsound guarantee mechanisms and traditional enrollment competition.Through the establishment of perfect legal and policy guarantees,transformation of school running mode,meeting the diversified needs of learners,and other multi-faceted measures,the development of adult higher education can be effectively promoted to meet the needs of individual and social development.展开更多
基金Supported by National Natural Science Foundation of China(71463032)~~
文摘The research studied opportunities and potential threats confronted by agricultural sustainable development, laying foundation for optimization of agricultural structure, transformation of agricultural development mode, and accomplishment of agricultural modernization. On basis of development target, development theory and route of the 13^th Five-year Plan, the research analysis the opportunities and potential threats of Yunnan agriculture and proposed policy suggestions on sustainable development of agriculture from the perspectives of ecological and competitive advantage, as well as sustainable development division in order to provide references for scientific formulation and decision-making of relevant regional planning.
基金National Key R&D Program of China (2017YFC1310400), National Nature Science Foundation of China (U150222& 81501148)Shanghai Municipal Health and Family Planning Commission (2014ZYJB0002)+3 种基金Shanghai Health and Family Planni叩 Commission Clinical Research Project (20184Y0134)Program of Shanghai Academic Research Leader (17XD1403300)Shanghai Key Laboratory of Psychotic Disorders (13DZ2260500)Qihang Project of Shanghai Mental Health Center (2018-QH-02).
文摘Background Despite high relapse rate among methamphetamine (MA) abusers, there still have been little empirical data to date detecting the risk factors related to craving and relapse from the perspective of MA abusers. Therefore, the aim of this study was to use qualitative research methods exploring the strengths, weaknesses, opportunities and threat factors that could facilitate or impede individuals' abstinence in a real-life context from the perspectives of MA abusers. Aim To use qualitative research methods exploring the strengths, weaknesses, opportunities and threat factors relating to individuals' abstinence in a real-life context. Method Semistructured interviews were conducted with 32 MA abusers recruited in Shanghai guided by open-ended questions on narrating the real-life catalysts and inhibitors related to craving, initiation, relapse and abstinence. All data were transcribed verbatim and analysed using a strengths, weaknesses, opportunities and threats (SWOT) analysis. Results The results of the SWOT analysis revealed that contextual factors including peer influence, prevalence and availability of MA, familiar venue of MA use, discrimination, sexual behaviours, alcohol, emotional states and their attitudes towards smoking MA were important factors that contribute to reinitiation and relapse. Surveillance systems, antidrug social workers, vocational skills trainings, moving to another city and family responsibility might serve as counter measures targeti叩 those mentioned weaknesses and threats above. Conclusion This SWOT analysis highlights the complex nature of relapse. Comprehensive interventions strengtheni叩 coping skills such as virtual reality techniques are desperately needed to facilitate individuals1 sustained abstinence.
基金supported by the Japan Society for the Promotion of Science(JSPS)KAKENHI Grant Number JP22F22368。
文摘The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environmental pollution.Due to their intermittent nature,these green and sustainable sources require appropriate energy storage systems.Amongst different energy storage technologies,electrochemical energy storage devices,particularly supercapacitors(SCs),have fascinated global attention for their utilization in electric vehicles,power supports,portable electronics,and many others application requiring electric energy devices for their operation.Thus,the growth of SCs in the commercial market has squeezed requirements,and further developments are obligatory for their effective industrialization.In the meantime,SCs also face technical complications and contests for their introduction in industrial settings because of their low energy density and high Levelized cost.The present study combines core strengths,weaknesses,opportunities,and threats(SWOT)analysis of SCs with new perspectives and recent ideas.The challenges and the future progressive prospects of SCs are also presented in detail.This review will afford consistent direction and new superhighways for the further development of SCs as standalone and complementary energy storage systems.
文摘Jordan’s mining sector is considered the cornerstone to the Jordanian economy. It plays a vital role in growth of many other important sectors in the economy and contributes to the Jordan’s standard of living. The mining industry in Jordan is dominated by the production of phosphate, potash, building and decoration stones, glass sand and other nonmetallic resources. Recently, Jordan has been ranked as the sixth largest producer and the second largest exporter of phosphate, the fourth largest producer and the second largest exporter of potash, and has the 5th largest oil-shale reserves in the world. Also, Jordan has sustainable amounts of uranium around 3% of the world resources. The main objective of this research is to focus on the present status of mining industry in Jordan with the aim to emphasis the most important industries, and its effect on the economy of Jordan in order to generate new wealth depends on its mineral endowment. A literature review has been carried out by reviewing the most published articles and the publicly available reports published by various Jordanian Institutions as well as from the private sector. The author reveals that there are many positive outlooks which are looming with an increasing domestic added value along with investing in other areas, such as feldspar, clays, travertine, gypsum, zirconium, uranium, copper and rare earth elements (REE). This requires activating the exploitation of many other untapped mineral resources in the country to achieve a progress that works for meeting the global great demands worldwide. In this context, successive governments have put effort into policies that promote and facilitate investment in the mining sector in Jordan. A comprehensive outlook of the mining sector in Jordan has been discussed in this article. The author also highlighted the opportunities and threats in this sector and more important dilemmas focused on what needs to be carried out by the Jordanian government, including important recommendations to encourage investment in this field and inspire investors in the mining industry in Jordan.
文摘Training of preschool teachers in Sichuan Province brings advantages in increasing government support for the preschool education industry.The society attaches an important role to the preschool education industry as well as the rapid development of preschool education in Sichuan Province.However,problem exists in large flows of preschool teachers and imbalanced gender ratios.By viewing from the new situation,the comprehensive liberalization of the second-child policy and the development of educational informatization as well as the implementation of the one belt and one road strategy have created great opportunities in training of preschool teachers.At the same time,the increase in external impact of high-quality graduates in the east also poses a great threat to the development of preschool teachers in Sichuan Province.Through the strategic combination of strengths,weaknesses,opportunities,and threats analysis,the paper explores effective countermeasure ways to improve the quality of training of the preschool teachers in Sichuan Province and the construction of an excellent team of preschool teachers in Sichuan Province.
文摘The belt and road initiative strategy is proposed based on the stable and sustainable cooperation on economy and development between China and neighboring countries.The development of economy can affect every aspect of vocational education development.Therefore,vocational education in China must be moved toward internationalization to achieve sustainable development in the face of the implementation of the belt and road initiative strategy.The analysis data obtained through the strengths,weaknesses,opportunities,and threats analysis method on the internationalization of China’s vocational education under the background of the belt and road initiative strategy were the advantages analysis(strengths)of continuous maturity in developing of vocational education,which drives by economic development and the foreign employment and entrepreneurship guidance mechanism;the disadvantages analysis(weaknesses)of lack talent cultivation and weak branding of vocational education;analysis of support opportunities given by national policy;and threats analysis of social culture in the involved countries along the route.To further develop and expand China’s vocational education under the background of the belt and road initiative strategy,some countermeasures were proposed such as improves cultivation or training of talents,to build strong branding of China vocational education,and faces cultural challenges to facilitate the international development of China vocational education.
文摘The 21st century has seen the world superpowers,such as Russia and China and multi-lateral agencies encourage backward states to embrace and promote foreign direct investment(FDI)as an instrument to improve domestic production which will lead to economic growth and development.This is premised on the fact that FDI comes with transfer of technology,new and advanced management approaches,technical skills,and access to international markets.However,researchers have shown that occasionally FDI inflows achieve the opposite as they compete for the same markets with local industries and,as a result,they crowd out local industries leading to higher unemployment.Further,research has shown that most international financial crises were caused by rapid withdrawal of FDI.In essence,FDI can have positive and can also have negative effects on economic growth.Against this background,this discussion seeks to outline and look at the threats and opportunities that backward states,such as those in Africa will draw from the 21st century FDI from world superpowers.
文摘The Industrial Internet of Things(IIoT)has brought numerous benefits,such as improved efficiency,smart analytics,and increased automation.However,it also exposes connected devices,users,applications,and data generated to cyber security threats that need to be addressed.This work investigates hybrid cyber threats(HCTs),which are now working on an entirely new level with the increasingly adopted IIoT.This work focuses on emerging methods to model,detect,and defend against hybrid cyber attacks using machine learning(ML)techniques.Specifically,a novel ML-based HCT modelling and analysis framework was proposed,in which L1 regularisation and Random Forest were used to cluster features and analyse the importance and impact of each feature in both individual threats and HCTs.A grey relation analysis-based model was employed to construct the correlation between IIoT components and different threats.
基金funded by grants from the Fondo de Investigacion de la Seguridad Social(Spain)(FIS PI-14/01935)the Spanish Ministerio de Ciencia y Tecnologia+4 种基金Instituto de Salud Carlos III(PI051871,CIBERehd)the Spanish Ministerio de Economia y Competitividad(SAF2017-86343-R)the Comunidad de Madrid(P2022/BMD-7321)HALEKULANY S.L.PROACAPITAL and MJR.
文摘Spinal cord injury(SCI)is a devastating and disabling medical condition generally caused by a traumatic event(primary injury).This initial trauma is accompanied by a set of biological mechanisms directed to ameliorate neural damage but also exacerbate initial damage(secondary injury).The alterations that occur in the spinal cord have not only local but also systemic consequences and virtually all organs and tissues of the body incur important changes after SCI,explaining the progression and detrimental consequences related to this condition.Psychoneuroimmunoendocrinology(PNIE)is a growing area of research aiming to integrate and explore the interactions among the different systems that compose the human organism,considering the mind and the body as a whole.The initial traumatic event and the consequent neurological disruption trigger immune,endocrine,and multisystem dysfunction,which in turn affect the patient's psyche and well-being.In the present review,we will explore the most important local and systemic consequences of SCI from a PNIE perspective,defining the changes occurring in each system and how all these mechanisms are interconnected.Finally,potential clinical approaches derived from this knowledge will also be collectively presented with the aim to develop integrative therapies to maximize the clinical management of these patients.
基金funded by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skłodowska-Curie Action(MSCA)grant agreement No.101109961.
文摘Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
基金supported by the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia(Grant No.KFU242068).
文摘Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store.Despite the increasing reliance on database management systems,this field continues to face numerous cyber-attacks.Database management systems serve as the foundation of any information system or application.Any cyber-attack can result in significant damage to the database system and loss of sensitive data.Consequently,cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats.Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks.The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems,including classifying threats,vulnerabilities,impacts,and countermeasures.This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat.Additionally,this research aims to explore technical countermeasures to protect database systems from cyber threats.This study employs the content analysis method to collect,analyze,and classify data in terms of types of threats,vulnerabilities,and countermeasures.The results indicate that SQL injection attacks and Denial of Service(DoS)attacks were the most prevalent technical threats in database systems,each accounting for 9%of incidents.Vulnerable audit trails,intrusion attempts,and ransomware attacks were classified as the second level of technical threats in database systems,comprising 7%and 5%of incidents,respectively.Furthermore,the findings reveal that insider threats were the most common non-technical threats in database systems,accounting for 5%of incidents.Moreover,the results indicate that weak authentication,unpatched databases,weak audit trails,and multiple usage of an account were the most common technical vulnerabilities in database systems,each accounting for 9%of vulnerabilities.Additionally,software bugs,insecure coding practices,weak security controls,insecure networks,password misuse,weak encryption practices,and weak data masking were classified as the second level of security vulnerabilities in database systems,each accounting for 4%of vulnerabilities.The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks.
基金supported by the National Natural Science Foundation of China(32271737,32071544)the Interdisciplinary Innovation Team of the Chinese Academy of Sciences(CAS)“Light of West China”Program(xbzg-zdsys-202207)+1 种基金the Shenzhen Zhilan Foundation(2021070451A)Nature Science Foundation of Sichuan Province(2022NSFSC0125).
文摘Considering the increased anthropogenic impacts,species with a limited range and low detectability often lack fundamental information and conservation actions,placing them at a high risk of endangerment.The Chinting alpine toad Scutiger chintingensis is a rare mountain amphibian endemic to the eastern margin of the Qinghai-Xizang Plateau in China.Within its whole distribution range,only three known populations(Wolong,Emei,and Wawu)exist and no recent population status report has been documented for this species over the past two decades.From 2020 to 2023,we investigated the species distribution,and assessed the risk factors for the main populations.We recorded this species in all distribution areas,and updated a new distribution site with a lower elevation limit.The relative population density was 0.024±0.012 ind./m^(2)on Mount Emei,whereas only 0.008±0.017 ind./m^(2)on Mount Wawu.No significant difference was observed in the number of individuals between the two populations;however,the relative population density was significantly different.Sewage and waste discharge resulting from the construction of scenic areas,as well as disturbances from tourism,were the primary anthropogenic factors that influenced the survival of this species.Our results provide the updated information on the distribution and population status of the Chinting alpine toad,and suggest that unrecorded populations,as well as a wider elevation range,may exist for this species.Our findings emphasise the importance of timely updates of species distribution and population information and offer a basis for the future conservation of endangered amphibians.
文摘Although AI and quantum computing (QC) are fast emerging as key enablers of the future Internet, experts believe they pose an existential threat to humanity. Responding to the frenzied release of ChatGPT/GPT-4, thousands of alarmed tech leaders recently signed an open letter to pause AI research to prepare for the catastrophic threats to humanity from uncontrolled AGI (Artificial General Intelligence). Perceived as an “epistemological nightmare”, AGI is believed to be on the anvil with GPT-5. Two computing rules appear responsible for these risks. 1) Mandatory third-party permissions that allow computers to run applications at the expense of introducing vulnerabilities. 2) The Halting Problem of Turing-complete AI programming languages potentially renders AGI unstoppable. The double whammy of these inherent weaknesses remains invincible under the legacy systems. A recent cybersecurity breakthrough shows that banning all permissions reduces the computer attack surface to zero, delivering a new zero vulnerability computing (ZVC) paradigm. Deploying ZVC and blockchain, this paper formulates and supports a hypothesis: “Safe, secure, ethical, controllable AGI/QC is possible by conquering the two unassailable rules of computability.” Pursued by a European consortium, testing/proving the proposed hypothesis will have a groundbreaking impact on the future digital infrastructure when AGI/QC starts powering the 75 billion internet devices by 2025.
基金Supported by the National Natural Science Foundation of China,No.82272396and the Youth Medical Talent of Jiangsu Province,No.QNRC2016475.
文摘Hepatitis E virus(HEV),responsible for widespread viral hepatitis,infects approximately 2.3 billion individuals globally,with a significant mortality burden in Asia.The virus,primarily transmitted through contaminated water and undercooked meat,is often underdiagnosed,particularly in immunocompromised patients.Current HEV treatments,while effective,are limited by adverse effects,necessitating research into safer alternatives.Moreover,HEV’s extrahepatic manifestations,impacting the nervous and renal systems,remain poorly understood.This study underscores the imperative for enhanced HEV research,improved diagnostic methods,and more effective treatments,coupled with increased public health awareness and preventive strategies.
文摘This study aims to explore the challenges and opportunities associated with developing healthcare infrastructure in Saudi Arabia through the implementation of smart technologies. The healthcare sector in Saudi Arabia is undergoing significant transformation, and the integration of smart technologies has the potential to revolutionize healthcare delivery, improve patient outcomes, and enhance the overall healthcare experience. However, several challenges need to be addressed in order to fully leverage the benefits of smart technologies in healthcare infrastructure development. This research identifies and analyzes these challenges while also highlighting the opportunities that arise from the adoption of smart technologies in the Saudi Arabian healthcare system. The findings contribute to the understanding of the current state of healthcare infrastructure in Saudi Arabia and provide insights into the strategies and policies required to overcome challenges and maximize the benefits of smart technologies in healthcare.
文摘China and Myanmar are geographically adjacent and have close economic and trade cooperation. China has been Myanmar’s largest trading partner and largest source of investment for many consecutive years. With the official entry into force of RCEP (Regional Comprehensive Economic Partnership) for Myanmar on May 1, 2022, the reduction of trade tariffs on goods and flexible rules of origin between China and Myanmar will undoubtedly bring more practical results to China Myanmar economic and trade cooperation. However, the implementation of RCEP in Myanmar may face a series of challenges such as poor business environment, weak human resource management, and outdated infrastructure construction. Finally, the article provides countermeasures for China Myanmar economic and trade cooperation from three aspects: optimizing the business environment to attract Chinese investment, increasing investment in education and training to improve labor quality, strengthening infrastructure construction to enhance economic support.
文摘Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company.
基金the Study on the Impact of the Construction and Development of Southwest Plateau Airport on the Ecological Environment(CZKY2023032).
文摘The architecture and working principle of coordinated search and rescue system of unmanned/manned aircraft,which is composed of manned/unmanned aircraft and manned aircraft,were first introduced,and they can cooperate with each other to complete a search and rescue task.Secondly,a threat assessment method based on meteorological data was proposed,and potential meteorological threats,such as storms and rainfall,can be predicted by collecting and analyzing meteorological data.Finally,an experiment was carried out to evaluate the performance of the proposed method in different scenarios.The experimental results show that the coordinated search and rescue system of unmanned/manned aircraft can be used to effectively assess meteorological threats and provide accurate search and rescue guidance.
文摘Insects are posited to be declining globally.This stark reality poses a grave threat to the delicate balance of ecosystems that depend on these creatures for pollination,decomposition,and as a vital food source.Recent studies emphasize three interconnected forces driving this decline:The substantial impact of climate change on insect populations,widespread habitat destruction due to human activities,and the farreaching consequences of modern agricultural practices,particularly the extensive use of pesticides.Addressing these interconnected threats is more urgent than ever,as the future of ecosystems and the benefits they provide to human societies are increasingly at risk.
文摘This paper comprehensively analyzes the development opportunities and realistic dilemmas faced by adult higher education in China in the new era,and puts forward corresponding strategies as solutions.With the construction of a learning society,the development of digital technology,and the popularization of the concept of lifelong learning,adult higher education has unprecedented development opportunities.At the same time,these forms of education are facing a series of dilemmas due to challenges such as unsound guarantee mechanisms and traditional enrollment competition.Through the establishment of perfect legal and policy guarantees,transformation of school running mode,meeting the diversified needs of learners,and other multi-faceted measures,the development of adult higher education can be effectively promoted to meet the needs of individual and social development.