Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak...Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.展开更多
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p...In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.展开更多
Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide ...Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories.展开更多
Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes dif...Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes difficult to collect data from multiple data owners to make machine learning predictions due to the lack of data security.Data is forced to be stored independently between companies,creating“data silos”.With the goal of safeguarding data privacy and security,the federated learning framework greatly expands the amount of training data,effectively improving the shortcomings of traditional machine learning and deep learning,and bringing AI algorithms closer to our reality.In the context of the current international data security issues,federated learning is developing rapidly and has gradually moved from the theoretical to the applied level.The paper first introduces the federated learning framework,analyzes its advantages,reviews the results of federated learning applications in industries such as communication and healthcare,then analyzes the pitfalls of federated learning and discusses the security issues that should be considered in applications,and finally looks into the future of federated learning and the application layer.展开更多
In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely ...In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.展开更多
Attribute-based encryption(ABE)is a technique used to encrypt data,it has the flexibility of access control,high security,and resistance to collusion attacks,and especially it is used in cloud security protection.Howe...Attribute-based encryption(ABE)is a technique used to encrypt data,it has the flexibility of access control,high security,and resistance to collusion attacks,and especially it is used in cloud security protection.However,a large number of bilinear mappings are used in ABE,and the calculation of bilinear pairing is time-consuming.So there is the problem of low efficiency.On the other hand,the decryption key is not uniquely associated with personal identification information,if the decryption key is maliciously sold,ABE is unable to achieve accountability for the user.In practical applications,shared message requires hierarchical sharing in most cases,in this paper,we present a message security hierarchy ABE scheme for this scenario.Firstly,attributes were grouped and weighted according to the importance of attributes,and then an access structure based on a threshold tree was constructed according to attribute weight.This method saved the computing time for decryption while ensuring security and on-demand access to information for users.In addition,with the help of computing power in the cloud,two-step decryption was used to complete the access,which relieved the computing and storage burden on the client side.Finally,we simulated and tested the scheme based on CP-ABE,and selected different security levels to test its performance.The security proof and the experimental simulation result showthat the proposed scheme has high efficiency and good performance,and the solution implements hierarchical access to the shared message.展开更多
As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challe...As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles.展开更多
Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hi...Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hibernation techniques,mild hypothermia has preliminarily confirmed its clinical effect on spinal cord injury.However,its technical defects and barriers,along with serious clinical side effects,restrict its clinical application for spinal cord injury.Artificial hibernation is a futureoriented disruptive technology for human life support.It involves endogenous hibernation inducers and hibernation-related central neuromodulation that activate particular neurons,reduce the central constant temperature setting point,disrupt the normal constant body temperature,make the body adapt"to the external cold environment,and reduce the physiological resistance to cold stimulation.Thus,studying the artificial hibernation mechanism may help develop new treatment strategies more suitable for clinical use than the cooling method of mild hypothermia technology.This review introduces artificial hibernation technologies,including mild hypothermia technology,hibernation inducers,and hibernation-related central neuromodulation technology.It summarizes the relevant research on hypothermia and hibernation for organ and nerve protection.These studies show that artificial hibernation technologies have therapeutic significance on nerve injury after spinal co rd injury through inflammatory inhibition,immunosuppression,oxidative defense,and possible central protection.It also promotes the repair and protection of res pirato ry and digestive,cardiovascular,locomoto r,urinary,and endocrine systems.This review provides new insights for the clinical treatment of nerve and multiple organ protection after spinal cord injury thanks to artificial hibernation.At present,artificial hibernation technology is not mature,and research fa ces various challenges.Neve rtheless,the effort is wo rthwhile for the future development of medicine.展开更多
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ...China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.展开更多
In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in...In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in the completion phase,the weighted-selection strategy is applied to provide low overhead.The performance of the proposed scheme is analyzed and compared with the existing UEP online fountain scheme.Simulation results show that in terms of MIS and the least important symbols(LIS),when the bit error ratio is 10-4,the proposed scheme can achieve 85%and 31.58%overhead reduction,respectively.展开更多
Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and su...Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and subsequent experimental validation.Methods:Network pharmacology was applied to construct an active ingredient-efficacy target-disease protein network to reveal the unique regulation pattern of s.miltiorrhiza and C.tinctorius as herb pair.Molecular docking was used to verify the binding of the components of these herbs and their potential targets.An H9c2 glucose hypoxia model was used to evaluate the efficacy of the components and their synergistic effects,which were evaluated using the combination index.Western blot was performed to detect the protein expression of these targets.Results:Network pharmacology analysis revealed 5 pathways and 8 core targets of s.miltiorrhiza and C.tinctorius in myocardial protection.Five of the core targets were enriched in the hypoxia-inducible factor-1(HIF-1)signaling pathway.S.miltiorrhiza-C.tinctorius achieved vascular tone mainly by regulating the target genes of the HIF-1 pathway.As an upstream gene of the HIF-1 pathway,STAT3 can be activated by the active ingredients cryptotanshinone(Ctan),salvianolic acid B(Sal.B),and myricetin(Myric).Cell experiments revealed that Myric,Sal.B,and Ctan also exhibited synergistic myocardial protective activity.Molecular docking verified the strong binding of Myric,Sal.B,and Ctan to STAT3.Western blot further showed that the active ingredients synergistically upregulated the protein expressionof STAT3.Conclusion:The pharmacodynamic transmission analysis revealed that the active ingredients of S.miltiorrhiza and C.tinctorius can synergistically resist ischemia through various targets and pathways.This study provides a methodological reference for interpreting traditional Chinese medicine compatibility.展开更多
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect...The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0.展开更多
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r...Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques.展开更多
A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented i...A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare.展开更多
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece...The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.展开更多
Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,whic...Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,which is intrinsically triggered by the overcharging and overheating.To improve the safety of LIBs,various protection strategies based on self-actuating reaction control mechanisms(SRCMs)have been proposed,including redox shuttle,polymerizable monomer additive,potential-sensitive separator,thermal shutdown separator,positive-temperature-coefficient electrode,thermally polymerizable addi-tive,and reversible thermal phase transition electrolyte.As build-in protection mechanisms,these meth-ods can sensitively detect either the temperature change inside battery or the potential change of the electrode,and spontaneously shut down the electrode reaction at risky conditions,thus preventing the battery from going into thermal runaway.Given their advantages in enhancing the intrinsic safety of LIBs,this paper overviews the research progresses of SRCMs after a brief introduction of thermal runaway mechanism and limitations of conventional thermal runaway mitigating measures.More importantly,the current states and issues,key challenges,and future developing trends of SRCTs are also discussed and outlined from the viewpoint of practical application,aiming at providing insights and guidance for developing more effective SRCMs for LIBs.展开更多
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s...Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.展开更多
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user...The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological cond...Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological conditions,including stroke,head trauma,and neurodegenerative disease,can generate stress in neurons,affecting their survival and proper function.In most neural pathologies,mitochondria become dysfunctional and this plays a pivotal role in the process of cell death.The challenge over the last few decades has been to develop effective interventions that improve neuronal homeostasis under pathological conditions.Such interventions,often referred to as disease-modifying or neuroprotective,have,however,proved frustratingly elusive,at both preclinical and,in particular,clinical levels.In this perspective,we highlight two factors that we feel are key to the development of effective neuroprotective treatments.These are:firstly,the choice of dose of intervention and method of application,and secondly,the selection of subjects,whether they be patients or the animal model.展开更多
文摘Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.
文摘In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference.
文摘Today, the advent of quantum computers and algorithms is calling into question the semantic security of symmetrical and asymmetrical cryptosystems. The security of objects connected to the network, which must provide a security service and protect the privacy of users by providing protection against attacks such as identity theft, denial of service, eavesdropping and unauthorised access to personal and sensitive data. It is therefore necessary to find a robust method of using the key that is effective in protecting and preventing data tampering. In this paper, we design and implement a security and data protection method using a key generated on the basis of electromagnetic wave propagation theories. Modelling and implementation of a data security and protection method using a key generated on the basis of electromagnetic wave propagation theories.
基金supported by National Natural Science Foundation of China (NO.51974131)Hebei Province Natural Science Fund for Distinguished Young Scholars (NO.E2020209082).
文摘Federated learning is a new type of distributed learning framework that allows multiple participants to share training results without revealing their data privacy.As data privacy becomes more important,it becomes difficult to collect data from multiple data owners to make machine learning predictions due to the lack of data security.Data is forced to be stored independently between companies,creating“data silos”.With the goal of safeguarding data privacy and security,the federated learning framework greatly expands the amount of training data,effectively improving the shortcomings of traditional machine learning and deep learning,and bringing AI algorithms closer to our reality.In the context of the current international data security issues,federated learning is developing rapidly and has gradually moved from the theoretical to the applied level.The paper first introduces the federated learning framework,analyzes its advantages,reviews the results of federated learning applications in industries such as communication and healthcare,then analyzes the pitfalls of federated learning and discusses the security issues that should be considered in applications,and finally looks into the future of federated learning and the application layer.
文摘In the current digital era, it is difficult to preserve the confidentiality, integrity, and availability of an organization’s information and technology assets against cyber attacks. Organizations cannot rely solely on technical solutions for defense, since many cyber attacks attempt to exploit non-technical vulnerabilities such as how well employees comply with the organization’s cybersecurity policies. This study surveyed 245 randomly selected employees of government organizations in the Kingdom of Saudi Arabia with an electronically distributed questionnaire about factors that influence employees’ compliance with cybersecurity policies. The study found that ethical factors had the most influence on employee compliance with cybersecurity policies, followed in decreasing order of influence by legislative factors, technical factors, and administrative factors.
基金funded by the Funding of Nanjing Institute of Technology No.JXGG2021017the National Natural Science Foundation of China No.61701221.
文摘Attribute-based encryption(ABE)is a technique used to encrypt data,it has the flexibility of access control,high security,and resistance to collusion attacks,and especially it is used in cloud security protection.However,a large number of bilinear mappings are used in ABE,and the calculation of bilinear pairing is time-consuming.So there is the problem of low efficiency.On the other hand,the decryption key is not uniquely associated with personal identification information,if the decryption key is maliciously sold,ABE is unable to achieve accountability for the user.In practical applications,shared message requires hierarchical sharing in most cases,in this paper,we present a message security hierarchy ABE scheme for this scenario.Firstly,attributes were grouped and weighted according to the importance of attributes,and then an access structure based on a threshold tree was constructed according to attribute weight.This method saved the computing time for decryption while ensuring security and on-demand access to information for users.In addition,with the help of computing power in the cloud,two-step decryption was used to complete the access,which relieved the computing and storage burden on the client side.Finally,we simulated and tested the scheme based on CP-ABE,and selected different security levels to test its performance.The security proof and the experimental simulation result showthat the proposed scheme has high efficiency and good performance,and the solution implements hierarchical access to the shared message.
文摘As Vehicular ad hoc networks (VANETs) become more sophisticated, the importance of integrating data protection and cybersecurity is increasingly evident. This paper offers a comprehensive investigation into the challenges and solutions associated with the privacy implications within VANETs, rooted in an intricate landscape of cross-jurisdictional data protection regulations. Our examination underscores the unique nature of VANETs, which, unlike other ad-hoc networks, demand heightened security and privacy considerations due to their exposure to sensitive data such as vehicle identifiers, routes, and more. Through a rigorous exploration of pseudonymization schemes, with a notable emphasis on the Density-based Location Privacy (DLP) method, we elucidate the potential to mitigate and sometimes sidestep the heavy compliance burdens associated with data protection laws. Furthermore, this paper illuminates the cybersecurity vulnerabilities inherent to VANETs, proposing robust countermeasures, including secure data transmission protocols. In synthesizing our findings, we advocate for the proactive adoption of protective mechanisms to facilitate the broader acceptance of VANET technology while concurrently addressing regulatory and cybersecurity hurdles.
基金supported by the Key Projects of the National Natural Science Foundation of China,No.11932013(to XC)Key Military Logistics Research Projects,No.B WJ21J002(to XC)+4 种基金the Key projects of the Special Zone for National Defence Innovation,No.21-163-12-ZT006002-13(to XC)the National Nature Science Foundation of China No.82272255(to XC)the National Defense Science and Technology Outstanding Youth Science Fund Program,No.2021-JCIQ-ZQ-035(to XC)the Scientific Research Innovation Team Project of Armed Police Characteristic Medical Center,No.KYCXTD0104(to ZL)the National Natural Science Foundation of China Youth Fund,No.82004467(to BC)。
文摘Spinal cord injury is a serious disease of the central nervous system involving irreversible nerve injury and various organ system injuries.At present,no effective clinical treatment exists.As one of the artificial hibernation techniques,mild hypothermia has preliminarily confirmed its clinical effect on spinal cord injury.However,its technical defects and barriers,along with serious clinical side effects,restrict its clinical application for spinal cord injury.Artificial hibernation is a futureoriented disruptive technology for human life support.It involves endogenous hibernation inducers and hibernation-related central neuromodulation that activate particular neurons,reduce the central constant temperature setting point,disrupt the normal constant body temperature,make the body adapt"to the external cold environment,and reduce the physiological resistance to cold stimulation.Thus,studying the artificial hibernation mechanism may help develop new treatment strategies more suitable for clinical use than the cooling method of mild hypothermia technology.This review introduces artificial hibernation technologies,including mild hypothermia technology,hibernation inducers,and hibernation-related central neuromodulation technology.It summarizes the relevant research on hypothermia and hibernation for organ and nerve protection.These studies show that artificial hibernation technologies have therapeutic significance on nerve injury after spinal co rd injury through inflammatory inhibition,immunosuppression,oxidative defense,and possible central protection.It also promotes the repair and protection of res pirato ry and digestive,cardiovascular,locomoto r,urinary,and endocrine systems.This review provides new insights for the clinical treatment of nerve and multiple organ protection after spinal cord injury thanks to artificial hibernation.At present,artificial hibernation technology is not mature,and research fa ces various challenges.Neve rtheless,the effort is wo rthwhile for the future development of medicine.
基金The authors acknowledge the financial support received from the National Natural Science Foundation of China(72061147002).
文摘China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.
基金supported by the National Natural Science Foundation of China(61601147)the Beijing Natural Science Foundation(L182032)。
文摘In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in the completion phase,the weighted-selection strategy is applied to provide low overhead.The performance of the proposed scheme is analyzed and compared with the existing UEP online fountain scheme.Simulation results show that in terms of MIS and the least important symbols(LIS),when the bit error ratio is 10-4,the proposed scheme can achieve 85%and 31.58%overhead reduction,respectively.
基金supported by the National Natural Science Foundation of China(81703947)the Fundamental Research Funds for the Central Universities(2019-JYB-XJSJJ-011).
文摘Objective:To reveal the molecular mechanism underlying the compatibility of Salvia miltiorrhiza Bge(S.miltiorrhiza,Dan Shen)and C.tinctorius L.(C.tinctorius,Hong Hua)as an herb pair through network pharmacology and subsequent experimental validation.Methods:Network pharmacology was applied to construct an active ingredient-efficacy target-disease protein network to reveal the unique regulation pattern of s.miltiorrhiza and C.tinctorius as herb pair.Molecular docking was used to verify the binding of the components of these herbs and their potential targets.An H9c2 glucose hypoxia model was used to evaluate the efficacy of the components and their synergistic effects,which were evaluated using the combination index.Western blot was performed to detect the protein expression of these targets.Results:Network pharmacology analysis revealed 5 pathways and 8 core targets of s.miltiorrhiza and C.tinctorius in myocardial protection.Five of the core targets were enriched in the hypoxia-inducible factor-1(HIF-1)signaling pathway.S.miltiorrhiza-C.tinctorius achieved vascular tone mainly by regulating the target genes of the HIF-1 pathway.As an upstream gene of the HIF-1 pathway,STAT3 can be activated by the active ingredients cryptotanshinone(Ctan),salvianolic acid B(Sal.B),and myricetin(Myric).Cell experiments revealed that Myric,Sal.B,and Ctan also exhibited synergistic myocardial protective activity.Molecular docking verified the strong binding of Myric,Sal.B,and Ctan to STAT3.Western blot further showed that the active ingredients synergistically upregulated the protein expressionof STAT3.Conclusion:The pharmacodynamic transmission analysis revealed that the active ingredients of S.miltiorrhiza and C.tinctorius can synergistically resist ischemia through various targets and pathways.This study provides a methodological reference for interpreting traditional Chinese medicine compatibility.
文摘The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0.
文摘Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques.
基金co-financed by the European Regional Development Fund of the European UnionGreek national funds through the Operational Program Competitiveness,Entrepreneurship and Innovation,under the call RESEARCH-CREATE-INNOVATE(project code:T1EDK-04429)。
文摘A philosophy for the design of novel,lightweight,multi-layered armor,referred to as Composite Armor Philosophy(CAP),which can adapt to the passive protection of light-,medium-,and heavy-armored vehicles,is presented in this study.CAP can serve as a guiding principle to assist designers in comprehending the distinct roles fulfilled by each component.The CAP proposal comprises four functional layers,organized in a suggested hierarchy of materials.Particularly notable is the inclusion of a ceramic-composite principle,representing an advanced and innovative solution in the field of armor design.This paper showcases real-world defense industry applications,offering case studies that demonstrate the effectiveness of this advanced approach.CAP represents a significant milestone in the history of passive protection,marking an evolutionary leap in the field.This philosophical approach provides designers with a powerful toolset with which to enhance the protection capabilities of military vehicles,making them more resilient and better equipped to meet the challenges of modern warfare.
基金supported by the Research Program funded by the SeoulTech(Seoul National University of Science and Technology).
文摘The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
基金financially supported by the National Natural Science Foundation of China(U22A20438)the National Key R&D Program of China(2022YFB2502100)the National Natural Science Foundation of China(22309138).
文摘Safety issue is still a problem nowadays for the large-scale application of lithium-ion batteries(LIBs)in electric vehicles and energy storage stations.The unsafe behaviors of LIBs arise from the thermal run-away,which is intrinsically triggered by the overcharging and overheating.To improve the safety of LIBs,various protection strategies based on self-actuating reaction control mechanisms(SRCMs)have been proposed,including redox shuttle,polymerizable monomer additive,potential-sensitive separator,thermal shutdown separator,positive-temperature-coefficient electrode,thermally polymerizable addi-tive,and reversible thermal phase transition electrolyte.As build-in protection mechanisms,these meth-ods can sensitively detect either the temperature change inside battery or the potential change of the electrode,and spontaneously shut down the electrode reaction at risky conditions,thus preventing the battery from going into thermal runaway.Given their advantages in enhancing the intrinsic safety of LIBs,this paper overviews the research progresses of SRCMs after a brief introduction of thermal runaway mechanism and limitations of conventional thermal runaway mitigating measures.More importantly,the current states and issues,key challenges,and future developing trends of SRCTs are also discussed and outlined from the viewpoint of practical application,aiming at providing insights and guidance for developing more effective SRCMs for LIBs.
基金funded by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skłodowska-Curie Action(MSCA)grant agreement No.101109961.
文摘Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
文摘The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金supported by Fonds Clinatec and COVEA France(to JM).
文摘Neurons are notoriously vulnerable cell types.Even the slightest change in their internal and/or external environments will cause much distress and dysfunction,leading often to their death.A range of pathological conditions,including stroke,head trauma,and neurodegenerative disease,can generate stress in neurons,affecting their survival and proper function.In most neural pathologies,mitochondria become dysfunctional and this plays a pivotal role in the process of cell death.The challenge over the last few decades has been to develop effective interventions that improve neuronal homeostasis under pathological conditions.Such interventions,often referred to as disease-modifying or neuroprotective,have,however,proved frustratingly elusive,at both preclinical and,in particular,clinical levels.In this perspective,we highlight two factors that we feel are key to the development of effective neuroprotective treatments.These are:firstly,the choice of dose of intervention and method of application,and secondly,the selection of subjects,whether they be patients or the animal model.