Through the analysis on the meanings and features as well as the ad- vantages of the third-party logistics for agricultural products, the quantization index system for the selection of third-party logistics providers ...Through the analysis on the meanings and features as well as the ad- vantages of the third-party logistics for agricultural products, the quantization index system for the selection of third-party logistics providers for agricultural products was constructed based on the system comprehensive evaluation theory. Analytic hierar- chy process (AHP) was used to determine the weight of the index system of each level, and AHP and fuzzy comprehensive evaluation method were used to determine the selection steps for the third-party logistics providers for agricultural products. The method was proved to be scientific and reasonable through calculation examples.展开更多
Zan Tingquan and Wu Xuemou, Pansystems logic: a new logic fra-mework for AI.In this artic1e, we take a step towards providing a new logic fra-mework as a basis for human and artificial intelligence.We unite logic,epis...Zan Tingquan and Wu Xuemou, Pansystems logic: a new logic fra-mework for AI.In this artic1e, we take a step towards providing a new logic fra-mework as a basis for human and artificial intelligence.We unite logic,epistemology, cognitive science, methodology and s ystems sciences tostudy cognitive processes and forms of thought and try to construct anew logic framework by use of pansystems metllodology.The new logicframework is called pansystems Logic.Included are:(1)propose the concepts of generalized. subjects and generalizedobjects, articulate the pansystems observocontrol relativity principle asa new model of cognitive foundations for artifitial intelligence.(2)present fifteen layer-parts of artifitial intelligence researchfrom the new view, i.e.AI concerns with five aspects of man, things,the relations between man and things, artificial systems, the relations be-tween the former three and the latter one,which should be studied fromthree levels of philosophical, mathematical and technical researches.展开更多
Data security is a major cloud computing issue due to different usertransactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic aci...Data security is a major cloud computing issue due to different usertransactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated usinga variety of molecular methods. Many security mechanisms including knowledgebased authentication, two-factor authentication, adaptive authentication, multifactorauthentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most ofthem are based on complex mathematical calculations and equations. In the proposed approach, a novel and unique Hybrid helix scuttle-deoxy ribo nucleic acids(HHS-DNA) encryption algorithm has been proposed which is inspired by DNAcryptography and Helix scuttle. The proposed HHS-DNA is a type of multifold binary version of DNA (MF-BDNA). The major role of this paper is to present a multifold HHS-DNA algorithm to encrypt the cloud data assuring more security with lesscomplexity. The experimentation is carried out and it reduces the encryption time,cipher text size, and improves throughput. When compared with previous techniques, there is a 45% improvement in throughput, 37% fast in encryption time,54.67% cipher text size. The relevant experimental results and foregoing analysisshow that this method is of good robustness, stability, and security.展开更多
Aims and Scope.Journal of Electronic&Information Systems publishes original research papers that offers professional review and publication to freely disseminate research findings in areas of Networks and Telecomm...Aims and Scope.Journal of Electronic&Information Systems publishes original research papers that offers professional review and publication to freely disseminate research findings in areas of Networks and Telecommunication,Human–Computer Interaction,Data Management,High Voltage Engineering and more.The Journal focuses on innovations of research methods at all stages and is committed to providing theoretical and practical experience for all those who are involved in these fields.展开更多
A key feature of the fossils found in a new Cretaceous mammal(as in the reconstructed early Cretaceous environment above)provides evidence for separation of hearing and chewing modules,an important step to the evoluti...A key feature of the fossils found in a new Cretaceous mammal(as in the reconstructed early Cretaceous environment above)provides evidence for separation of hearing and chewing modules,an important step to the evolution of the mammalians’multi-boned middle ears.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
Premise:The com bined effects of modern healthcare practices which prolong lifespan and declining birthrates have created unprecedented changes in age demographics worldwide that are especially pronounced in Japan,Sou...Premise:The com bined effects of modern healthcare practices which prolong lifespan and declining birthrates have created unprecedented changes in age demographics worldwide that are especially pronounced in Japan,South Korea,Europe,and North America.Since old age is the most significant predictor of dementia,global healthcare systems must rise to the challenge of providing care for those with neurodegenerative disorders.展开更多
Both conflict and asymmetric information exist betweenthe telecom operators and the service provider,and result in illegal behaviors of the service provider.The relationship between the telecom operators andthe servic...Both conflict and asymmetric information exist betweenthe telecom operators and the service provider,and result in illegal behaviors of the service provider.The relationship between the telecom operators andthe service provider is classical multi-task principalagentrelationship. The multi-task incentive for theservice provider is considered in the design of theprincipal-agent incentive contract, and it is necessaryto add the multi-task incentive to the serviceproviders through the analysis of the risk costs andthe agency costs of this problem.展开更多
Cloud computing is becoming popular technology due to its functional properties and variety of customer-oriented services over the Internet.The design of reliable and high-quality cloud applications requires a strong ...Cloud computing is becoming popular technology due to its functional properties and variety of customer-oriented services over the Internet.The design of reliable and high-quality cloud applications requires a strong Quality of Service QoS parameter metric.In a hyperconverged cloud ecosystem environment,building high-reliability cloud applications is a challenging job.The selection of cloud services is based on the QoS parameters that play essential roles in optimizing and improving cloud rankings.The emergence of cloud computing is significantly reshaping the digital ecosystem,and the numerous services offered by cloud service providers are playing a vital role in this transformation.Hyperconverged software-based unified utilities combine storage virtualization,compute virtualization,and network virtualization.The availability of the latter has also raised the demand for QoS.Due to the diversity of services,the respective quality parameters are also in abundance and need a carefully designed mechanism to compare and identify the critical,common,and impactful parameters.It is also necessary to reconsider the market needs in terms of service requirements and the QoS provided by various CSPs.This research provides a machine learning-based mechanism to monitor the QoS in a hyperconverged environment with three core service parameters:service quality,downtime of servers,and outage of cloud services.展开更多
To satisfy mobile terminals ’( MTs) offloading requirements and reduce MTs’ cost,a joint cloud and wireless resource allocation scheme based on the evolutionary game( JRA-EG) is proposed for overlapping heterogeneou...To satisfy mobile terminals ’( MTs) offloading requirements and reduce MTs’ cost,a joint cloud and wireless resource allocation scheme based on the evolutionary game( JRA-EG) is proposed for overlapping heterogeneous networks in mobile edge computing environments. MTs that have tasks offloading requirements in the same service area form a population. MTs in one population acquire different wireless and computation resources by selecting different service providers( SPs). An evolutionary game is formulated to model the SP selection and resource allocation of the MTs. The cost function of the game consists of energy consumption,time delay and monetary cost. The solutions of evolutionary equilibrium( EE) include the centralized algorithm based on replicator dynamics and the distributed algorithm based on Q-learning.Simulation results show that both algorithms can converge to the EE rapidly. The differences between them are the convergence speed and trajectory stability. Compared with the existing schemes,the JRA-EG scheme can save more energy and have a smaller time delay when the data size becomes larger. The proposed scheme can schedule the wireless and computation resources reasonably so that the offloading cost is reduced efficiently.展开更多
The International Health Regulations was enforced in June 2007,emphasizing the obligation of State Parties to detect,report,and respond to public health emergencies[1].An effective public health response requires a co...The International Health Regulations was enforced in June 2007,emphasizing the obligation of State Parties to detect,report,and respond to public health emergencies[1].An effective public health response requires a coordinated laboratory response in the Ministry of Health(MOH)network with credible laboratories capable of providing accurate and reliable results in a timely manner to enable effective public health measures展开更多
A key global challenge in the 21st century is how to secure sustainable access to energy for a growing global population—set to reach 10 billion by 2035—while coping with the threat of dangerous climate change.The o...A key global challenge in the 21st century is how to secure sustainable access to energy for a growing global population—set to reach 10 billion by 2035—while coping with the threat of dangerous climate change.The oil and gas industry will still play an essential role in the energy transition by providing affordable and reliable energy to improve living conditions.Meanwhile,producing this energy with decreasing emissions supports a net-zero world.展开更多
Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server,a significant parameter called trust was introduced.Trust-based security pla...Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server,a significant parameter called trust was introduced.Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic.In most cloud-based data distribution environments,emphasis is placed on accepting trusted client users’requests,but the cloud servers’integrity is seldom verified.This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue.The proposed methodology consists of data encryption using Cyclic Shift Transposition Algorithm and trust-based access control method.In this trust-based access control mechanism framework,trust values are assigned to cloud users using direct trust degrees.The direct trust degree is estimated based on the following metrics:success and failure rate of interactions,service satisfaction index,and dishonesty level.In addition to this,trust values are assigned to cloud servers based on the metrics:server load,service rejection rate,and service access delay.The role-Based Access control policy of each user is modified based on his trust level.If the server fails to meet the minimum trust level,then another suitable server will be selected.The proposed system is found to outperform other existing systems in a multi-cloud environment.展开更多
The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many d...The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.展开更多
Sexually transmitted infection (STI) management is considered rudimentary among rural medical practitioners (RMPs) in Bangladesh. We sought to understand the level of knowledge and skills in STI management and to asse...Sexually transmitted infection (STI) management is considered rudimentary among rural medical practitioners (RMPs) in Bangladesh. We sought to understand the level of knowledge and skills in STI management and to assess the impact of a two-day training orientation among RMPs in Tangail district. Data were collected through a baseline survey of 225 practicing RMPs in the study area and a three-month follow-up survey of 99 RMPs who participated in a two-day STI/HIV orientation training. The level of formal training among RMPs ranged from none (22.7%), to paramedical training (14.7%) and local medical assistant training (62.6%). The baseline survey revealed a low level of STI/HIV knowledge and misconceptions about the transmission of STI/HIV among RMPs. RMPs mostly prescribed first line antibiotics for treatment of common reproductive tract infections (RTIs) including STIs, but they rarely prescribed the correct dosages according to the national RTI/STI management guidelines. Only 3% of RMPs were able to correctly answer all four HIV transmission (unprotected sexual intercourse, blood transfusion, needle sharing and mother to child transmission) questions at baseline, while 94.9% of RMPs answered all four correctly at three months following the training (p = 0.001). Only 10% of RMPs reported suggesting the recommended drug (azithromycin) and only 2% mentioned about the recommended dosage (2 gm single dose) for the treatment of urethritis/cervicitis;compared to 49.5% suggested azithromycin at follow-up with 39.4% mentioned the recommended 2 gm single dose (p = 0.001). Our study found low level of knowledge and poor practices related RTI/STI management among RMPs. Short orientation training and education intervention shown promise to increase knowledge and management skills for RTIs/STIs.展开更多
Adolescent/youth-friendly sexual and reproductive health services(SRHS)play a vital role in reducing morbidity and mortality associated with adolescent SRH.This review examined studies carried out on adolescent/youth-...Adolescent/youth-friendly sexual and reproductive health services(SRHS)play a vital role in reducing morbidity and mortality associated with adolescent SRH.This review examined studies carried out on adolescent/youth-friendly SRHS with focus on availability,accessibility,utilization as well as perception of health care providers,and adolescents about the services.The study design was systematic review of empirical studies using a well-defined strategy.Online journal was searched comprehensively using Web of Science,Google Scholars databases,PubMed,Medline,and EMBASE.Other sources were identified through the scanning of references of selected sources.The articles selected were between 2016 and 2022 and had qualitative/quantitative and mixed methods.The articles that met the selection criteria were also screened using PRISMA-P guidelines and SPIDER framework for systematic review was further used for inclusion criteria based on the following concepts:sample,phenomenon of interest,design,evaluation and research type.A total number of 32 studies were included in the study and findings were reported based on the five emerging themes.The review showed that majority of the adolescents were not aware of adolescent/youth-friendly SRHS,some health care providers were not also in support of the services which accounted for low utilization of the services among adolescents.The review further showed poor accessibility and nonavailability of AYFSRHS as the only available SRHS were meant for married adults.Therefore,these findings serve as evidence for policy-makers at all the levels of healthcare delivery system to considered all the factors observed in this review and develop strategies that will make adolescent/youth-friendly SRHS available and accessible to adolescents.More so,other stakeholders,especially health care providers must improve their attitude toward provision of adolescent/youth-friendly SRHS.展开更多
Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size and yet the security issue continues to pose a big threat on it. The sec...Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size and yet the security issue continues to pose a big threat on it. The security and privacy issues persisting in cloud computing have proved to be an obstacle for its widespread adoption. In this paper, we look at these issues from a business perspective and how they are damaging the reputation of big companies. There is a literature review on the existing issues in cloud computing and how they are being tackled by the Cloud Service Providers (CSP). We propose a governing body framework which aims at solving these issues by establishing relationship amongst the CSPs in which the data about possible threats can be generated based on the previous attacks on other CSPs. The Governing Body will be responsible for Data Center control, Policy control, legal control, user awareness, performance evaluation, solution architecture and providing motivation for the entities involved.展开更多
This paper proposed a new method of semi-automatic extraction for semantic structures from unlabelled corpora in specific domains. The approach is statistical in nature. The extracted structures can be used for shallo...This paper proposed a new method of semi-automatic extraction for semantic structures from unlabelled corpora in specific domains. The approach is statistical in nature. The extracted structures can be used for shallow parsing and semantic labeling. By iteratively extracting new words and clustering words, we get an inital semantic lexicon that groups words of the same semantic meaning together as a class. After that, a bootstrapping algorithm is adopted to extract semantic structures. Then the semantic structures are used to extract new展开更多
As global population increases and demands for food supplies become greater,we face great challenges in providing more products and in larger quantities from less arable land.Crop science has gained increasing importa...As global population increases and demands for food supplies become greater,we face great challenges in providing more products and in larger quantities from less arable land.Crop science has gained increasing importance in meeting these challenges and results of scientific research must be communicated worldwide on a regular basis.In many countries,however,crop scientists have to publish the results of their investigations in national journals with heterogeneous con-展开更多
基金Supported by the Natural Science Foundation of Guangxi Province(2011GXNSFB018061)the High-grade Scientific Research(Cultivation)Program of Qinzhou University(2014PY-SJ03,2014PY-SJ01)~~
文摘Through the analysis on the meanings and features as well as the ad- vantages of the third-party logistics for agricultural products, the quantization index system for the selection of third-party logistics providers for agricultural products was constructed based on the system comprehensive evaluation theory. Analytic hierar- chy process (AHP) was used to determine the weight of the index system of each level, and AHP and fuzzy comprehensive evaluation method were used to determine the selection steps for the third-party logistics providers for agricultural products. The method was proved to be scientific and reasonable through calculation examples.
文摘Zan Tingquan and Wu Xuemou, Pansystems logic: a new logic fra-mework for AI.In this artic1e, we take a step towards providing a new logic fra-mework as a basis for human and artificial intelligence.We unite logic,epistemology, cognitive science, methodology and s ystems sciences tostudy cognitive processes and forms of thought and try to construct anew logic framework by use of pansystems metllodology.The new logicframework is called pansystems Logic.Included are:(1)propose the concepts of generalized. subjects and generalizedobjects, articulate the pansystems observocontrol relativity principle asa new model of cognitive foundations for artifitial intelligence.(2)present fifteen layer-parts of artifitial intelligence researchfrom the new view, i.e.AI concerns with five aspects of man, things,the relations between man and things, artificial systems, the relations be-tween the former three and the latter one,which should be studied fromthree levels of philosophical, mathematical and technical researches.
文摘Data security is a major cloud computing issue due to different usertransactions in the system. The evolution of cryptography and cryptographic analysis are regarded domains of current research. deoxyribo nucleic acid (DNA) cryptography makes use of DNA as a sensing platform, which is then manipulated usinga variety of molecular methods. Many security mechanisms including knowledgebased authentication, two-factor authentication, adaptive authentication, multifactorauthentication and single password authentication have been deployed. These cryptographic techniques have been developed to ensure confidentiality, but most ofthem are based on complex mathematical calculations and equations. In the proposed approach, a novel and unique Hybrid helix scuttle-deoxy ribo nucleic acids(HHS-DNA) encryption algorithm has been proposed which is inspired by DNAcryptography and Helix scuttle. The proposed HHS-DNA is a type of multifold binary version of DNA (MF-BDNA). The major role of this paper is to present a multifold HHS-DNA algorithm to encrypt the cloud data assuring more security with lesscomplexity. The experimentation is carried out and it reduces the encryption time,cipher text size, and improves throughput. When compared with previous techniques, there is a 45% improvement in throughput, 37% fast in encryption time,54.67% cipher text size. The relevant experimental results and foregoing analysisshow that this method is of good robustness, stability, and security.
文摘Aims and Scope.Journal of Electronic&Information Systems publishes original research papers that offers professional review and publication to freely disseminate research findings in areas of Networks and Telecommunication,Human–Computer Interaction,Data Management,High Voltage Engineering and more.The Journal focuses on innovations of research methods at all stages and is committed to providing theoretical and practical experience for all those who are involved in these fields.
文摘A key feature of the fossils found in a new Cretaceous mammal(as in the reconstructed early Cretaceous environment above)provides evidence for separation of hearing and chewing modules,an important step to the evolution of the mammalians’multi-boned middle ears.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
基金funded by the Natural Sciences and Engineering Research Council of Canada(RGPIN:2016-05964&2023-04283 to JHK)the University of Manitoba Tri-Agency Bridge Funding(#57289 to JHK)the Ricard Foundation’s Baxter Bursary(to JP)。
文摘Premise:The com bined effects of modern healthcare practices which prolong lifespan and declining birthrates have created unprecedented changes in age demographics worldwide that are especially pronounced in Japan,South Korea,Europe,and North America.Since old age is the most significant predictor of dementia,global healthcare systems must rise to the challenge of providing care for those with neurodegenerative disorders.
文摘Both conflict and asymmetric information exist betweenthe telecom operators and the service provider,and result in illegal behaviors of the service provider.The relationship between the telecom operators andthe service provider is classical multi-task principalagentrelationship. The multi-task incentive for theservice provider is considered in the design of theprincipal-agent incentive contract, and it is necessaryto add the multi-task incentive to the serviceproviders through the analysis of the risk costs andthe agency costs of this problem.
文摘Cloud computing is becoming popular technology due to its functional properties and variety of customer-oriented services over the Internet.The design of reliable and high-quality cloud applications requires a strong Quality of Service QoS parameter metric.In a hyperconverged cloud ecosystem environment,building high-reliability cloud applications is a challenging job.The selection of cloud services is based on the QoS parameters that play essential roles in optimizing and improving cloud rankings.The emergence of cloud computing is significantly reshaping the digital ecosystem,and the numerous services offered by cloud service providers are playing a vital role in this transformation.Hyperconverged software-based unified utilities combine storage virtualization,compute virtualization,and network virtualization.The availability of the latter has also raised the demand for QoS.Due to the diversity of services,the respective quality parameters are also in abundance and need a carefully designed mechanism to compare and identify the critical,common,and impactful parameters.It is also necessary to reconsider the market needs in terms of service requirements and the QoS provided by various CSPs.This research provides a machine learning-based mechanism to monitor the QoS in a hyperconverged environment with three core service parameters:service quality,downtime of servers,and outage of cloud services.
基金The National Natural Science Foundation of China(No.61741102,61471164)
文摘To satisfy mobile terminals ’( MTs) offloading requirements and reduce MTs’ cost,a joint cloud and wireless resource allocation scheme based on the evolutionary game( JRA-EG) is proposed for overlapping heterogeneous networks in mobile edge computing environments. MTs that have tasks offloading requirements in the same service area form a population. MTs in one population acquire different wireless and computation resources by selecting different service providers( SPs). An evolutionary game is formulated to model the SP selection and resource allocation of the MTs. The cost function of the game consists of energy consumption,time delay and monetary cost. The solutions of evolutionary equilibrium( EE) include the centralized algorithm based on replicator dynamics and the distributed algorithm based on Q-learning.Simulation results show that both algorithms can converge to the EE rapidly. The differences between them are the convergence speed and trajectory stability. Compared with the existing schemes,the JRA-EG scheme can save more energy and have a smaller time delay when the data size becomes larger. The proposed scheme can schedule the wireless and computation resources reasonably so that the offloading cost is reduced efficiently.
基金funded by the operational budget of the Disease Control Division,Ministry of Health,Malaysia
文摘The International Health Regulations was enforced in June 2007,emphasizing the obligation of State Parties to detect,report,and respond to public health emergencies[1].An effective public health response requires a coordinated laboratory response in the Ministry of Health(MOH)network with credible laboratories capable of providing accurate and reliable results in a timely manner to enable effective public health measures
文摘A key global challenge in the 21st century is how to secure sustainable access to energy for a growing global population—set to reach 10 billion by 2035—while coping with the threat of dangerous climate change.The oil and gas industry will still play an essential role in the energy transition by providing affordable and reliable energy to improve living conditions.Meanwhile,producing this energy with decreasing emissions supports a net-zero world.
文摘Security is an essential part of the cloud environment.For ensuring the security of the data being communicated to and from the cloud server,a significant parameter called trust was introduced.Trust-based security played a vital role in ensuring that the communication between cloud users and service providers remained unadulterated and authentic.In most cloud-based data distribution environments,emphasis is placed on accepting trusted client users’requests,but the cloud servers’integrity is seldom verified.This paper designs a trust-based access control model based on user and server characteristics in a multi-cloud environment to address this issue.The proposed methodology consists of data encryption using Cyclic Shift Transposition Algorithm and trust-based access control method.In this trust-based access control mechanism framework,trust values are assigned to cloud users using direct trust degrees.The direct trust degree is estimated based on the following metrics:success and failure rate of interactions,service satisfaction index,and dishonesty level.In addition to this,trust values are assigned to cloud servers based on the metrics:server load,service rejection rate,and service access delay.The role-Based Access control policy of each user is modified based on his trust level.If the server fails to meet the minimum trust level,then another suitable server will be selected.The proposed system is found to outperform other existing systems in a multi-cloud environment.
文摘The tremendous growth of the cloud computing environments requires new architecture for security services. Cloud computing is the utilization of many servers/data centers or cloud data storages (CDSs) housed in many different locations and interconnected by high speed networks. CDS, like any other emerging technology, is experiencing growing pains. It is immature, it is fragmented and it lacks standardization. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this paper a comprehensive security framework based on Multi-Agent System (MAS) architecture for CDS to facilitate confidentiality, correctness assurance, availability and integrity of users' data in the cloud is proposed. Our security framework consists of two main layers as agent layer and CDS layer. Our propose MAS architecture includes main five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). In order to verify our proposed security framework based on MAS architecture, pilot study is conducted using a questionnaire survey. Rasch Methodology is used to analyze the pilot data. Item reliability is found to be poor and a few respondents and items are identified as misfits with distorted measurements. As a result, some problematic questions are revised and some predictably easy questions are excluded from the questionnaire. A prototype of the system is implemented using Java. To simulate the agents, oracle database packages and triggers are used to implement agent functions and oracle jobs are utilized to create agents.
文摘Sexually transmitted infection (STI) management is considered rudimentary among rural medical practitioners (RMPs) in Bangladesh. We sought to understand the level of knowledge and skills in STI management and to assess the impact of a two-day training orientation among RMPs in Tangail district. Data were collected through a baseline survey of 225 practicing RMPs in the study area and a three-month follow-up survey of 99 RMPs who participated in a two-day STI/HIV orientation training. The level of formal training among RMPs ranged from none (22.7%), to paramedical training (14.7%) and local medical assistant training (62.6%). The baseline survey revealed a low level of STI/HIV knowledge and misconceptions about the transmission of STI/HIV among RMPs. RMPs mostly prescribed first line antibiotics for treatment of common reproductive tract infections (RTIs) including STIs, but they rarely prescribed the correct dosages according to the national RTI/STI management guidelines. Only 3% of RMPs were able to correctly answer all four HIV transmission (unprotected sexual intercourse, blood transfusion, needle sharing and mother to child transmission) questions at baseline, while 94.9% of RMPs answered all four correctly at three months following the training (p = 0.001). Only 10% of RMPs reported suggesting the recommended drug (azithromycin) and only 2% mentioned about the recommended dosage (2 gm single dose) for the treatment of urethritis/cervicitis;compared to 49.5% suggested azithromycin at follow-up with 39.4% mentioned the recommended 2 gm single dose (p = 0.001). Our study found low level of knowledge and poor practices related RTI/STI management among RMPs. Short orientation training and education intervention shown promise to increase knowledge and management skills for RTIs/STIs.
文摘Adolescent/youth-friendly sexual and reproductive health services(SRHS)play a vital role in reducing morbidity and mortality associated with adolescent SRH.This review examined studies carried out on adolescent/youth-friendly SRHS with focus on availability,accessibility,utilization as well as perception of health care providers,and adolescents about the services.The study design was systematic review of empirical studies using a well-defined strategy.Online journal was searched comprehensively using Web of Science,Google Scholars databases,PubMed,Medline,and EMBASE.Other sources were identified through the scanning of references of selected sources.The articles selected were between 2016 and 2022 and had qualitative/quantitative and mixed methods.The articles that met the selection criteria were also screened using PRISMA-P guidelines and SPIDER framework for systematic review was further used for inclusion criteria based on the following concepts:sample,phenomenon of interest,design,evaluation and research type.A total number of 32 studies were included in the study and findings were reported based on the five emerging themes.The review showed that majority of the adolescents were not aware of adolescent/youth-friendly SRHS,some health care providers were not also in support of the services which accounted for low utilization of the services among adolescents.The review further showed poor accessibility and nonavailability of AYFSRHS as the only available SRHS were meant for married adults.Therefore,these findings serve as evidence for policy-makers at all the levels of healthcare delivery system to considered all the factors observed in this review and develop strategies that will make adolescent/youth-friendly SRHS available and accessible to adolescents.More so,other stakeholders,especially health care providers must improve their attitude toward provision of adolescent/youth-friendly SRHS.
文摘Cloud computing is touted as the next big thing in the Information Technology (IT) industry, which is going to impact the businesses of any size and yet the security issue continues to pose a big threat on it. The security and privacy issues persisting in cloud computing have proved to be an obstacle for its widespread adoption. In this paper, we look at these issues from a business perspective and how they are damaging the reputation of big companies. There is a literature review on the existing issues in cloud computing and how they are being tackled by the Cloud Service Providers (CSP). We propose a governing body framework which aims at solving these issues by establishing relationship amongst the CSPs in which the data about possible threats can be generated based on the previous attacks on other CSPs. The Governing Body will be responsible for Data Center control, Policy control, legal control, user awareness, performance evaluation, solution architecture and providing motivation for the entities involved.
文摘This paper proposed a new method of semi-automatic extraction for semantic structures from unlabelled corpora in specific domains. The approach is statistical in nature. The extracted structures can be used for shallow parsing and semantic labeling. By iteratively extracting new words and clustering words, we get an inital semantic lexicon that groups words of the same semantic meaning together as a class. After that, a bootstrapping algorithm is adopted to extract semantic structures. Then the semantic structures are used to extract new
文摘As global population increases and demands for food supplies become greater,we face great challenges in providing more products and in larger quantities from less arable land.Crop science has gained increasing importance in meeting these challenges and results of scientific research must be communicated worldwide on a regular basis.In many countries,however,crop scientists have to publish the results of their investigations in national journals with heterogeneous con-