In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application o...In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application of 5G private industrial networks,a comparative analysis is used to plan and design a private network security construction scheme.The network security construction model,network organization,and key processes of 5G private industrial networks at the current stage are investigated.In addition,the key direction for the next stage of construction is discussed.展开更多
This narrative review aims to highlight some of the factors contributing to challenges faced by many countries in controlling the spread of COVID-19 pandemic that continues to rage around the world,especially after st...This narrative review aims to highlight some of the factors contributing to challenges faced by many countries in controlling the spread of COVID-19 pandemic that continues to rage around the world,especially after stoppage of official prevention and control activities.A literature search was conducted on PubMed,and Google using search terms“COVID-19”,“challenges”,“prevention”,and“control”in different combinations.COVID-19 prevention and control challenges are related to health-system,vaccines,administration,and society culture.Controlling the spread of COVID-19 necessitates cooperation between community leaders,healthcare professionals,religious leaders,and the public.展开更多
According to the current problems of safety management processes in coalmine enterprises,we introduced barrel theory to coal mine safety management,constructedthe closed-loop structure of a coal mine safety management...According to the current problems of safety management processes in coalmine enterprises,we introduced barrel theory to coal mine safety management,constructedthe closed-loop structure of a coal mine safety management system,andpointed out that efficient safety management lies in three factors:safety quality of all ofthe staff in coal mine enterprises,weak links in security management systems,and cooperationamong departments.After conducting detailed analysis of these three factors,we proposed concrete ways of preventing and controlling potential safety hazards duringthe process of coal mine production.展开更多
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar...COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.展开更多
The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using a...The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.展开更多
This paper proposes a new approach for online power system transient security assessment(TSA)and preventive control based on XGBoost and DC optimal power flow(DCOPF).The novelty of this proposal is that it applies the...This paper proposes a new approach for online power system transient security assessment(TSA)and preventive control based on XGBoost and DC optimal power flow(DCOPF).The novelty of this proposal is that it applies the XGBoost and data selection method based on the 1-norm distance in local feature importance evaluation which can provide a certain model interpretability.The method of SMOTE+ENN is adopted for data rebalancing.The contingency-oriented XGBoost model is trained with databases generated by time domain simulations to represent the transient security constraint in the DCOPF model,which has a relatively fast speed of calculation.The transient security constrained generation rescheduling is implemented with the differential evolution algorithm,which is utilized to optimize the rescheduled generation in the preventive control.Feasibility and effectiveness of the proposed approach are demonstrated on an IEEE 39-bus test system and a 500-bus operational model for South Carolina,USA.展开更多
文摘In this paper,we investigate and analyze the network security risks faced by 5G private industrial networks.Based on current network security architecture and 3GPP requirements and considering the actual application of 5G private industrial networks,a comparative analysis is used to plan and design a private network security construction scheme.The network security construction model,network organization,and key processes of 5G private industrial networks at the current stage are investigated.In addition,the key direction for the next stage of construction is discussed.
文摘This narrative review aims to highlight some of the factors contributing to challenges faced by many countries in controlling the spread of COVID-19 pandemic that continues to rage around the world,especially after stoppage of official prevention and control activities.A literature search was conducted on PubMed,and Google using search terms“COVID-19”,“challenges”,“prevention”,and“control”in different combinations.COVID-19 prevention and control challenges are related to health-system,vaccines,administration,and society culture.Controlling the spread of COVID-19 necessitates cooperation between community leaders,healthcare professionals,religious leaders,and the public.
文摘According to the current problems of safety management processes in coalmine enterprises,we introduced barrel theory to coal mine safety management,constructedthe closed-loop structure of a coal mine safety management system,andpointed out that efficient safety management lies in three factors:safety quality of all ofthe staff in coal mine enterprises,weak links in security management systems,and cooperationamong departments.After conducting detailed analysis of these three factors,we proposed concrete ways of preventing and controlling potential safety hazards duringthe process of coal mine production.
基金This paper is support by:In 2019,Liaoning Provincial Department of Education Project named“Study on the Path Selection of Rural Revitalization in Ethnic Autonomous Areas of Liaoning Province”The 3rd Azure Talent Project of Dalian Ocean University in 2018+1 种基金In 2019,Liaoning Province’s overseas training project“China-Canada Cooperation Research Plan on Marine Law and Policy”(2019GJWYB019)The Ministry of Education filed the 2017 National and Regional Research Center Project“Northeast Asia Research Center for Marine Law and Policy”(GQ17091).
文摘COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection.
文摘The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the traditional field type DoS attacks at the network end system or network using adaptive mechanisms exist loopholes flow through the low-rate periodic attacks on the implementation of high-efficiency attacked by an intruder and not be found, resulting in loss of user data or a computer deadlock. LDos attack since there has been extensive attention of researchers, the attack signature analysis and detection methods to prevent network security have become an important research topic. Some have been proposed for the current attacks were classified LDoS describe and model, and then in NS-2 platform for experimental verification, and then LDoS attack detection to prevent difficulties are discussed and summarized for the future such attacks detection method research work to provide a reference.
基金supported in part by the National Key Research and Development Program of China under Grant 2020YFB0905900.
文摘This paper proposes a new approach for online power system transient security assessment(TSA)and preventive control based on XGBoost and DC optimal power flow(DCOPF).The novelty of this proposal is that it applies the XGBoost and data selection method based on the 1-norm distance in local feature importance evaluation which can provide a certain model interpretability.The method of SMOTE+ENN is adopted for data rebalancing.The contingency-oriented XGBoost model is trained with databases generated by time domain simulations to represent the transient security constraint in the DCOPF model,which has a relatively fast speed of calculation.The transient security constrained generation rescheduling is implemented with the differential evolution algorithm,which is utilized to optimize the rescheduled generation in the preventive control.Feasibility and effectiveness of the proposed approach are demonstrated on an IEEE 39-bus test system and a 500-bus operational model for South Carolina,USA.