This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain an...This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain and generative AI,the research team aimed to address the timely challenge of safeguarding visual medical content.The participating researchers conducted a comprehensive analysis,examining the vulnerabilities of medical AI services,personal information protection issues,and overall security weaknesses.This multi faceted exploration led to an indepth evaluation of the model’s performance and security.Notably,the correlation between accuracy,detection rate,and error rate was scrutinized.This analysis revealed insights into the model’s strengths and limitations,while the consideration of standard deviation shed light on the model’s stability and performance variability.The study proposed practical improvements,emphasizing the reduction of false negatives to enhance detection rate and leveraging blockchain technology to ensure visual data integrity in medical applications.Applying blockchain to generative AI-created medical content addresses key personal information protection issues.By utilizing the distributed ledger system of blockchain,the research team aimed to protect the privacy and integrity of medical data especially medical images.This approach not only enhances security but also enables transparent and tamperproof record-keeping.Additionally,the use of generative AI models ensures the creation of novel medical content without compromising personal information,further safeguarding patient privacy.In conclusion,this study showcases the potential of blockchain-based solutions in the medical field,particularly in securing sensitive medical data and protecting patient privacy.The proposed approach,combining blockchain and generative AI,offers a promising direction toward more robust and secure medical content management.Further research and advancements in this area will undoubtedly contribute to the development of robust and privacy-preserving healthcare systems,and visual diagnostic systems.展开更多
The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the regio...The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the region has witnessed significant land use/cover changes(LUCC), impacting ecosystem services(ES) and ecological security patterns(ESP). Investigating LUCC's effects on ES and ESP in the YRD is crucial for ecological security and sustainable development. This study utilized the PLUS model to simulate 2030 land use scenarios, including natural development(NDS), economic development(EDS), and ecological protection scenarios(EPS). Subsequently, the InVEST model and circuit theory were applied to assess ES and ESP under varying LUCC scenarios from 2010 to 2030. Findings indicate:(1) Notable LUCC from 2010 to 2030, marked by decreasing cropland and increasing construction land and water bodies.(2) From 2010 to 2020, improvements were observed in carbon storage,water yield, soil retention, and habitat quality, whereas 2020–2030 saw increases in water yield and soil retention but declines in habitat quality and carbon storage. Among the scenarios, EPS showed superior performance in all four ES.(3) Between 2010 and 2030, ecological sources, corridors, and pinchpoints expanded, displaying significant spatial heterogeneity. The EPS scenario yielded the most substantial increases in ecological sources,corridors, and pinchpoints, totaling 582.89 km^(2), 645.03 km^(2),and 64.43 km^(2), respectively. This study highlights the importance of EPS, offering insightful scientific guidance for the YRD's sustainable development.展开更多
It is one of the fundamental research contents of rural revitalization by constructing a ecological security pattern of rural landscape,providing important basis for scientifically formulating rural spatial planning a...It is one of the fundamental research contents of rural revitalization by constructing a ecological security pattern of rural landscape,providing important basis for scientifically formulating rural spatial planning and sustainable rural development.The research on ecological security patterns of landscape at home and abroad is mainly focused on urban areas.In the context of rural revitalization,the research on strategies and paths for constructing the ecological security pattern of rural landscapes aims to provide important references for the overall planning and design of rural areas and the optimization of rural resource allocation.Using 3S(GPS,RS,GIS)technology methods,this paper systematically analyzes and elaborates on the construction strategies and paths of rural water ecological security pattern,rural biological protection security pattern,rural geological disaster security pattern,and local cultural landscape security pattern.Through the comprehensive superposition of the patterns,a comprehensive ecological security pattern of rural landscape is finally constructed.In the process of constructing and improving the ecological security pattern of rural landscape,emphasis is placed on top-level design,long-term planning,multi-party participation,mechanism improvement,technological innovation,and the strategy of“integrating knowledge with action”.展开更多
The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecolo...The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecology research.This paper identifies the ecological source through the evaluation of the ecosystem service and ecosystem sensitivity of the Lanzhou-Xining(Lan-Xi)urban agglomeration.The minimum cumulative resistance(MCR)model modified by night light data NPP/VIIRS(National Polar-orbiting Operational Environmental Satellite System Preparatory Project/Visible Infrared Imaging Radiometer Suite)was used to measure the relative resistance of the materials and energy circulation between the source areas,and to establish the resistance surface of the ecological source area expansion.Then ecological corridors were identified based on ecological sources and resistance surface.The ecological strategic node is the ecological fragile point in the ecological corridors.The ecological strategic node is identified with hydrological module by superimposing the"ridge line"of cumulative ecological resistance with the ecological corridor.Combined with ecological sources,corridors and strategic nodes,the ESP of the Lan-Xi urban agglomeration can be constructed.The ecological source of the Lan-Xi urban agglomeration accounts for 28.42%of the total area,most of which is distributed within Qinghai Province.The nature reserves in the area are all located within the ecological source area.A total of 41 potential ecological corridors have been identified in the study area.The total length of the potential corridors is 1201.03 km,comprising 23 source corridors and 18 radiation corridors.There are 30 strategic nodes identified in the Lan-Xi urban agglomeration.These locations are the most vulnerable areas of the ecological corridors.Ecological engineering should be applied in the construction of corridors.Affected by the ecological source,the potential ecological corridor extends from the northwest to the southeast,which is basically consistent with the direction trend of the mountains in the region.展开更多
Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study ...Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study explored ecological planning and design of waterfront from the perspective of landscape security pattern,analyzed current waterfront in Xianghe County and construction of landscape security pattern for waterfront,provided a basis for the ecological planning and design of landscape.展开更多
Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve rel...Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services.展开更多
Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so ...Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so as to optimize the distributions of rural settlement would be the key challenge for rural areas in ecologically fragile regions. From the perspective of maintaining regional ecological security, this paper takes Da’an City, a typical ecological fragile region in Jilin Province, as the case area, constructing the comprehensive ecological security pattern(ESP) on basis of landscape ecology, and applying the landscape pattern indexes to quantitative analysis the spatial distribution characteristics of rural settlements. Then, different optimization directions and management strategies are put forward for rural settlements in each secure zone under the comprehensive ESP. The experimental results showed that 1) the area of the low security zone, the general security zone, the moderate security zone and the extreme security zone was 1570.18 km^2, 1463.36 km^2, 1215.80 km^2 and 629.77 km^2, representing 32.18%, 29.99%, 24.92% and 12.91% of the total area of the target area, respectively. 2) The rural settlements in Da’an City were characterized by a high degree of fragmentation with a large number of small-scale patches. 3) The area of rural settlements in the ecological relocation zone, the in situ remediation zone, the limited development zone and the key development zone was 22.80 km^2, 42.31 km^2, 36.28 km^2 and 19.40 km^2, accounting for 18.88%, 35.03%, 30.04% and 16.06% of the total area of rural settlements, respectively. Then, different measures were proposed for settlements in different optimization zones in order to scientifically plan important ecological space, production space and living space in rural areas. This paper aims to provide fundamental support for rural settlements based on redistribution from the perspective of landscape ecology and provide insights for rural planning and rural habitat environmental improvement.展开更多
This study focuses on urgent research on restoring and enhancing carbon storage capacity in the Beibu Gulf Urban Agglomer-ation of China,a key area in the‘Belt and Road’Initiative,which aligns with carbon peaking an...This study focuses on urgent research on restoring and enhancing carbon storage capacity in the Beibu Gulf Urban Agglomer-ation of China,a key area in the‘Belt and Road’Initiative,which aligns with carbon peaking and neutrality goals.This research ana-lyzes the spatial characteristics of carbon metabolism from 2000 to 2020 and uses models to identify stable carbon sink areas,positive carbon flow corridors,and carbon sequestration nodes.The goal is to construct a carbon metabolism spatial security pattern(CMSSP)and propose territorial ecological restoration strategies under different development demand scenarios.The results show the following:1)in 2020,the study area’s carbon sink decreased by 8.29×10^(4) t C/yr compared with that in 2010 and by 10.83×10^(4) t C/yr compared with that in 2000.High-carbon sinks were found mainly in mountainous areas,whereas low-carbon sinks are concentrated in urban con-struction land,rural residential areas,and land margins.2)From 2000 to 2020,the spatial security pattern of carbon metabolism tended to be‘high in the middle of the east and west and low in the gulf.’In 2000,2010,and 2020,16 stable carbon sinks were identified.The carbon energy flow density in Guangxi was greater than that in Guangdong and Hainan,with positive carbon flow corridors located primarily in Guangxi and Guangdong.The number of carbon sequestration nodes remained stable at approximately 15,mainly in Guangxi and Hainan.3)Scenario simulations revealed that under the Nature-based mild restoration scenario,the carbon sink rate will reach 611.85×10^(4) t C/yr by 2030 and increase to 612.45×10^(4) t C/yr by 2060,with stable carbon sinks increasing to 18.In the restora-tion scenario based on Anti-globalization,the carbon sink will decrease from 610.24×10^(4) t C/yr in 2030 to 605.19×10^(4) t C/yr in 2060,with the disappearance of some positive carbon flow corridors and stable carbon sinks.Under the Human-based sustainable restoration scenario,the carbon sink area will decrease from 607.00×10^(4) t C/yr in 2030 to 596.39×10^(4) t C/yr in 2060,with carbon sink areas frag-menting and positive carbon flow corridors becoming less dense.4)On the basis of the current and predicted CMSSPs,this study ex-plores spatial ecological restoration strategies for high-carbon storage areas in bay urban agglomerations at four levels:the land control region,urban agglomeration structure system,carbon sink structure and bay structure control region.展开更多
A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organ...A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language.展开更多
The paper was to study the effects of different cultivation patterns( mix cultivation and monocultivation) of wheat on population structure of Puccinia striiformis West. f. sp. tritici in the fields. Five race-specifi...The paper was to study the effects of different cultivation patterns( mix cultivation and monocultivation) of wheat on population structure of Puccinia striiformis West. f. sp. tritici in the fields. Five race-specific-markers( CY32,CY31,CY29,CY23 and Shuiyuan pathotype) were used to survey 113 infected samples collected from two cultivation patterns. The results indicated that frequency of race-specific-markers under monocultivation was higher than that under mix cultivation; the dominant race-specific-markers were CY32 and CY29 under monocultivation,and the frequency of detection were 81. 5% and 78. 5%,respectively. The dominant race-specific-markers were CY29 and Shuiyuan pathotype under mix cultivation,and the frequency of detection are 41. 7% and 18. 8%,respectively.Several race-specific-markers were detected in single infected leaf,and 41. 7% of infected single leaf were detected with more than two race-specific-markers,58. 3% of infected single leaf were detected with one race-specific-marker under mix cultivation pattern,while there were 75. 0% infected leaves with more than two race-specific-markers and 25. 0% infected single leaf detected with one race-specific-marker under monocultivation pattern. The results indicated that mix cultivation pattern of wheat can reduce races on single leaf,affect the distribution of races in infected leaves,and suppress the occurrence frequency of dominant races of P. striiformis in the fields significantly,subsequently reduced severity and prevalence of the disease.展开更多
The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty,...The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty, social disorder, poor coherence and poor integration appear to haunt them and the gravity is felt more in the rural communities. The factors are traceable to many pathetic issues. The pathological consequences do affect Igbo stability and navigation in the Nigerian socio-economic environment. The causality constitutes the physical, human, natural, financial and social assets. It is recommended, among others, that the people should return to core values and norms, stick to their own noble identities, have a framework for tackling insecurity and hunger, target the youth in poverty reduction measures and tackle the herdsmen menace. Equally, the abused philosophies used to support dangerous and strange behavior should be tackled.展开更多
Spring Security作为Web开发中十分重要的安全框架之一,常被用于Web应用的认证和授权。为了进一步了解SpringSecurity框架的设计和实现,加深对常见设计模式的理解,文章详细介绍了SpringSecurity框架中策略模式、代理模式、适配器模式、...Spring Security作为Web开发中十分重要的安全框架之一,常被用于Web应用的认证和授权。为了进一步了解SpringSecurity框架的设计和实现,加深对常见设计模式的理解,文章详细介绍了SpringSecurity框架中策略模式、代理模式、适配器模式、责任链模式、模板方法模式的运用,对上述设计模式的概念、基本原理、作用等进行描述,分析SpringSecurity中关键类库在设计模式中承担的作用及执行流程,为开发人员提供一定的学习参考。展开更多
With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and ...With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique.展开更多
In network environments,before meaningful interactions can begin,trust may need to be established between two interactive entities in which an entity may ask the other to provide some information involving privacy.Con...In network environments,before meaningful interactions can begin,trust may need to be established between two interactive entities in which an entity may ask the other to provide some information involving privacy.Consequently,privacy protection and trust establishment become important in network interactions.In order to protect privacy while facilitating effective interactions,we propose a trust-based privacy protection method.Our main contributions in this paper are as follows:(1)We introduce a novel concept of k-sensitive privacy as a measure to assess the potential threat of inferring privacy;(2)According to trust and k-sensitive privacy evaluation,our proposed method can choose appropriate interaction patterns with lower degree of inferring privacy threat;(3)By considering interaction patterns for privacy protection,our proposed method can overcome the shortcomings of some current privacy protection methods which may result in low interaction success rate.Simulation results show that our method can achieve effective interactions with less privacy loss.展开更多
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err...Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>展开更多
Nonproliferation cooperation has always been a bright spot in China-US security cooperation for over more than a decade. China and the U.S. should timely adjust the focus of their nonproliferation cooperation on a mor...Nonproliferation cooperation has always been a bright spot in China-US security cooperation for over more than a decade. China and the U.S. should timely adjust the focus of their nonproliferation cooperation on a more equal basis, expanding common interests and exploring new patterns for cooperation so as to create a model for the two countries to join hands in global governance and maintenance of regional order.展开更多
The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study ...The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study area. The records of each crime incidence were geocoded. Microsoft Excel was used to collate and organise the crime entries before they were imported into the ArcGIS Pro 2.0 environment. A geodatabase was created where the spatial and aspatial data were encoded and geospatial analysis was performed. The study reveals that the crime distribution pattern is generally clustered with a Global Moran’s I index of 0.097, a Z-score of 1.87, and a P-value < 0.06. Furthermore, the study reveals that armed robbery (61), kidnapping (40), car theft (33), culpable homicide (31), rape (29), and robbery (13) cases rank the highest in crime rate. Equally, findings of the study show that Chaza, Kwamba, Madalla, Suleja central, and Gaboda are the major crime hotspot zones at 90% confidence, as analysed using the Getis-Ord Gi* (Hot spot analysis) spatial statistics tool in ArcGIS Pro 2.0. The research therefore recommends that more effort be put into fighting crime, especially in areas where there are low-security formations, as they mostly have the highest record of crimes committed. Also, the patrol units should be equipped with GPS for better surveillance and real-time tracking of criminal activities.展开更多
A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed ba...A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed based on field programmable gate array (FPGA) platform. The principle of ultra-weak fiber Bragg grating high-speed demodulation and signal recognition method were analyzed theoretically, and the Support Vector Machine model was introduced to optimize the event recognition accuracy of the system. A perimeter security experimental system containing 1000 ultra-weak fiber Bragg gratings, ultra-weak fiber Bragg grating sense optical cables with a diameter of 2.0 mm and a reflectivity of 0.01%, steel space frames and demodulation equipments was built to recognize four typical events such as knocking, shaking, wind blowing and rainfall. The experimental resulted show that the system has a spatial resolution of 1m and an acquisition frequency of 200 Hz. The joint time-frequency domain detection method is used to achieve 99.2% alarm accuracy, and 98% recognition accuracy of two intrusion events, which has good anti-interference performance.展开更多
文摘This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain and generative AI,the research team aimed to address the timely challenge of safeguarding visual medical content.The participating researchers conducted a comprehensive analysis,examining the vulnerabilities of medical AI services,personal information protection issues,and overall security weaknesses.This multi faceted exploration led to an indepth evaluation of the model’s performance and security.Notably,the correlation between accuracy,detection rate,and error rate was scrutinized.This analysis revealed insights into the model’s strengths and limitations,while the consideration of standard deviation shed light on the model’s stability and performance variability.The study proposed practical improvements,emphasizing the reduction of false negatives to enhance detection rate and leveraging blockchain technology to ensure visual data integrity in medical applications.Applying blockchain to generative AI-created medical content addresses key personal information protection issues.By utilizing the distributed ledger system of blockchain,the research team aimed to protect the privacy and integrity of medical data especially medical images.This approach not only enhances security but also enables transparent and tamperproof record-keeping.Additionally,the use of generative AI models ensures the creation of novel medical content without compromising personal information,further safeguarding patient privacy.In conclusion,this study showcases the potential of blockchain-based solutions in the medical field,particularly in securing sensitive medical data and protecting patient privacy.The proposed approach,combining blockchain and generative AI,offers a promising direction toward more robust and secure medical content management.Further research and advancements in this area will undoubtedly contribute to the development of robust and privacy-preserving healthcare systems,and visual diagnostic systems.
基金financially supported by the National Natural Science Foundation of China (Grant No. 41461011)。
文摘The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the region has witnessed significant land use/cover changes(LUCC), impacting ecosystem services(ES) and ecological security patterns(ESP). Investigating LUCC's effects on ES and ESP in the YRD is crucial for ecological security and sustainable development. This study utilized the PLUS model to simulate 2030 land use scenarios, including natural development(NDS), economic development(EDS), and ecological protection scenarios(EPS). Subsequently, the InVEST model and circuit theory were applied to assess ES and ESP under varying LUCC scenarios from 2010 to 2030. Findings indicate:(1) Notable LUCC from 2010 to 2030, marked by decreasing cropland and increasing construction land and water bodies.(2) From 2010 to 2020, improvements were observed in carbon storage,water yield, soil retention, and habitat quality, whereas 2020–2030 saw increases in water yield and soil retention but declines in habitat quality and carbon storage. Among the scenarios, EPS showed superior performance in all four ES.(3) Between 2010 and 2030, ecological sources, corridors, and pinchpoints expanded, displaying significant spatial heterogeneity. The EPS scenario yielded the most substantial increases in ecological sources,corridors, and pinchpoints, totaling 582.89 km^(2), 645.03 km^(2),and 64.43 km^(2), respectively. This study highlights the importance of EPS, offering insightful scientific guidance for the YRD's sustainable development.
基金Sponsored by Key Project of Humanities and Social Sciences of Chongqing Education Commission(24SKGH346)Chongqing Natural Science Foundation General Project(CSTB2024NSCQ-MSX1067)Natural Science Project of Chongqing College of Humanities,Science&Technology(CRKZK2023010).
文摘It is one of the fundamental research contents of rural revitalization by constructing a ecological security pattern of rural landscape,providing important basis for scientifically formulating rural spatial planning and sustainable rural development.The research on ecological security patterns of landscape at home and abroad is mainly focused on urban areas.In the context of rural revitalization,the research on strategies and paths for constructing the ecological security pattern of rural landscapes aims to provide important references for the overall planning and design of rural areas and the optimization of rural resource allocation.Using 3S(GPS,RS,GIS)technology methods,this paper systematically analyzes and elaborates on the construction strategies and paths of rural water ecological security pattern,rural biological protection security pattern,rural geological disaster security pattern,and local cultural landscape security pattern.Through the comprehensive superposition of the patterns,a comprehensive ecological security pattern of rural landscape is finally constructed.In the process of constructing and improving the ecological security pattern of rural landscape,emphasis is placed on top-level design,long-term planning,multi-party participation,mechanism improvement,technological innovation,and the strategy of“integrating knowledge with action”.
基金funded by the Improvement Plan of Scientific Research Ability in Northwest Normal University(NWNU-LKQN2020-16)National Science Foundation of China(Grant No.41771130)。
文摘The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecology research.This paper identifies the ecological source through the evaluation of the ecosystem service and ecosystem sensitivity of the Lanzhou-Xining(Lan-Xi)urban agglomeration.The minimum cumulative resistance(MCR)model modified by night light data NPP/VIIRS(National Polar-orbiting Operational Environmental Satellite System Preparatory Project/Visible Infrared Imaging Radiometer Suite)was used to measure the relative resistance of the materials and energy circulation between the source areas,and to establish the resistance surface of the ecological source area expansion.Then ecological corridors were identified based on ecological sources and resistance surface.The ecological strategic node is the ecological fragile point in the ecological corridors.The ecological strategic node is identified with hydrological module by superimposing the"ridge line"of cumulative ecological resistance with the ecological corridor.Combined with ecological sources,corridors and strategic nodes,the ESP of the Lan-Xi urban agglomeration can be constructed.The ecological source of the Lan-Xi urban agglomeration accounts for 28.42%of the total area,most of which is distributed within Qinghai Province.The nature reserves in the area are all located within the ecological source area.A total of 41 potential ecological corridors have been identified in the study area.The total length of the potential corridors is 1201.03 km,comprising 23 source corridors and 18 radiation corridors.There are 30 strategic nodes identified in the Lan-Xi urban agglomeration.These locations are the most vulnerable areas of the ecological corridors.Ecological engineering should be applied in the construction of corridors.Affected by the ecological source,the potential ecological corridor extends from the northwest to the southeast,which is basically consistent with the direction trend of the mountains in the region.
基金Supported by National Natural Science Foundation(51208338)Research Funds of Humanities and Social Sciences of Ministry of Education(10YJCZH144)
文摘Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study explored ecological planning and design of waterfront from the perspective of landscape security pattern,analyzed current waterfront in Xianghe County and construction of landscape security pattern for waterfront,provided a basis for the ecological planning and design of landscape.
文摘Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services.
基金the auspices of the National Natural Science Foundation of China(No.41571152,41771179)the Social Science Foundation of Jilin Province,China(No.2019B56)。
文摘Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so as to optimize the distributions of rural settlement would be the key challenge for rural areas in ecologically fragile regions. From the perspective of maintaining regional ecological security, this paper takes Da’an City, a typical ecological fragile region in Jilin Province, as the case area, constructing the comprehensive ecological security pattern(ESP) on basis of landscape ecology, and applying the landscape pattern indexes to quantitative analysis the spatial distribution characteristics of rural settlements. Then, different optimization directions and management strategies are put forward for rural settlements in each secure zone under the comprehensive ESP. The experimental results showed that 1) the area of the low security zone, the general security zone, the moderate security zone and the extreme security zone was 1570.18 km^2, 1463.36 km^2, 1215.80 km^2 and 629.77 km^2, representing 32.18%, 29.99%, 24.92% and 12.91% of the total area of the target area, respectively. 2) The rural settlements in Da’an City were characterized by a high degree of fragmentation with a large number of small-scale patches. 3) The area of rural settlements in the ecological relocation zone, the in situ remediation zone, the limited development zone and the key development zone was 22.80 km^2, 42.31 km^2, 36.28 km^2 and 19.40 km^2, accounting for 18.88%, 35.03%, 30.04% and 16.06% of the total area of rural settlements, respectively. Then, different measures were proposed for settlements in different optimization zones in order to scientifically plan important ecological space, production space and living space in rural areas. This paper aims to provide fundamental support for rural settlements based on redistribution from the perspective of landscape ecology and provide insights for rural planning and rural habitat environmental improvement.
基金Under the auspices of the National Natural Science Foundation of China(No.52268008)。
文摘This study focuses on urgent research on restoring and enhancing carbon storage capacity in the Beibu Gulf Urban Agglomer-ation of China,a key area in the‘Belt and Road’Initiative,which aligns with carbon peaking and neutrality goals.This research ana-lyzes the spatial characteristics of carbon metabolism from 2000 to 2020 and uses models to identify stable carbon sink areas,positive carbon flow corridors,and carbon sequestration nodes.The goal is to construct a carbon metabolism spatial security pattern(CMSSP)and propose territorial ecological restoration strategies under different development demand scenarios.The results show the following:1)in 2020,the study area’s carbon sink decreased by 8.29×10^(4) t C/yr compared with that in 2010 and by 10.83×10^(4) t C/yr compared with that in 2000.High-carbon sinks were found mainly in mountainous areas,whereas low-carbon sinks are concentrated in urban con-struction land,rural residential areas,and land margins.2)From 2000 to 2020,the spatial security pattern of carbon metabolism tended to be‘high in the middle of the east and west and low in the gulf.’In 2000,2010,and 2020,16 stable carbon sinks were identified.The carbon energy flow density in Guangxi was greater than that in Guangdong and Hainan,with positive carbon flow corridors located primarily in Guangxi and Guangdong.The number of carbon sequestration nodes remained stable at approximately 15,mainly in Guangxi and Hainan.3)Scenario simulations revealed that under the Nature-based mild restoration scenario,the carbon sink rate will reach 611.85×10^(4) t C/yr by 2030 and increase to 612.45×10^(4) t C/yr by 2060,with stable carbon sinks increasing to 18.In the restora-tion scenario based on Anti-globalization,the carbon sink will decrease from 610.24×10^(4) t C/yr in 2030 to 605.19×10^(4) t C/yr in 2060,with the disappearance of some positive carbon flow corridors and stable carbon sinks.Under the Human-based sustainable restoration scenario,the carbon sink area will decrease from 607.00×10^(4) t C/yr in 2030 to 596.39×10^(4) t C/yr in 2060,with carbon sink areas frag-menting and positive carbon flow corridors becoming less dense.4)On the basis of the current and predicted CMSSPs,this study ex-plores spatial ecological restoration strategies for high-carbon storage areas in bay urban agglomerations at four levels:the land control region,urban agglomeration structure system,carbon sink structure and bay structure control region.
基金"China National Science Foundation"under grant No: 2001AA412010
文摘A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language.
基金Supported by National 973 Project(2013CB127705)Special Fund of Ministry of Agriculture for Wheat Stripe Rust Industry(200903035-7)Key Fund of Yunnan Province of China(2009CC004)
文摘The paper was to study the effects of different cultivation patterns( mix cultivation and monocultivation) of wheat on population structure of Puccinia striiformis West. f. sp. tritici in the fields. Five race-specific-markers( CY32,CY31,CY29,CY23 and Shuiyuan pathotype) were used to survey 113 infected samples collected from two cultivation patterns. The results indicated that frequency of race-specific-markers under monocultivation was higher than that under mix cultivation; the dominant race-specific-markers were CY32 and CY29 under monocultivation,and the frequency of detection were 81. 5% and 78. 5%,respectively. The dominant race-specific-markers were CY29 and Shuiyuan pathotype under mix cultivation,and the frequency of detection are 41. 7% and 18. 8%,respectively.Several race-specific-markers were detected in single infected leaf,and 41. 7% of infected single leaf were detected with more than two race-specific-markers,58. 3% of infected single leaf were detected with one race-specific-marker under mix cultivation pattern,while there were 75. 0% infected leaves with more than two race-specific-markers and 25. 0% infected single leaf detected with one race-specific-marker under monocultivation pattern. The results indicated that mix cultivation pattern of wheat can reduce races on single leaf,affect the distribution of races in infected leaves,and suppress the occurrence frequency of dominant races of P. striiformis in the fields significantly,subsequently reduced severity and prevalence of the disease.
文摘The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty, social disorder, poor coherence and poor integration appear to haunt them and the gravity is felt more in the rural communities. The factors are traceable to many pathetic issues. The pathological consequences do affect Igbo stability and navigation in the Nigerian socio-economic environment. The causality constitutes the physical, human, natural, financial and social assets. It is recommended, among others, that the people should return to core values and norms, stick to their own noble identities, have a framework for tackling insecurity and hunger, target the youth in poverty reduction measures and tackle the herdsmen menace. Equally, the abused philosophies used to support dangerous and strange behavior should be tackled.
文摘With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique.
基金research funding from the Beijing Education Commission under Grant No. KM201010005027National Natural Science Foundation of China under Grant No. 61074128National Social Science Foundation of China under Grant No. 07CTQ010
文摘In network environments,before meaningful interactions can begin,trust may need to be established between two interactive entities in which an entity may ask the other to provide some information involving privacy.Consequently,privacy protection and trust establishment become important in network interactions.In order to protect privacy while facilitating effective interactions,we propose a trust-based privacy protection method.Our main contributions in this paper are as follows:(1)We introduce a novel concept of k-sensitive privacy as a measure to assess the potential threat of inferring privacy;(2)According to trust and k-sensitive privacy evaluation,our proposed method can choose appropriate interaction patterns with lower degree of inferring privacy threat;(3)By considering interaction patterns for privacy protection,our proposed method can overcome the shortcomings of some current privacy protection methods which may result in low interaction success rate.Simulation results show that our method can achieve effective interactions with less privacy loss.
文摘Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>
文摘Nonproliferation cooperation has always been a bright spot in China-US security cooperation for over more than a decade. China and the U.S. should timely adjust the focus of their nonproliferation cooperation on a more equal basis, expanding common interests and exploring new patterns for cooperation so as to create a model for the two countries to join hands in global governance and maintenance of regional order.
文摘The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study area. The records of each crime incidence were geocoded. Microsoft Excel was used to collate and organise the crime entries before they were imported into the ArcGIS Pro 2.0 environment. A geodatabase was created where the spatial and aspatial data were encoded and geospatial analysis was performed. The study reveals that the crime distribution pattern is generally clustered with a Global Moran’s I index of 0.097, a Z-score of 1.87, and a P-value < 0.06. Furthermore, the study reveals that armed robbery (61), kidnapping (40), car theft (33), culpable homicide (31), rape (29), and robbery (13) cases rank the highest in crime rate. Equally, findings of the study show that Chaza, Kwamba, Madalla, Suleja central, and Gaboda are the major crime hotspot zones at 90% confidence, as analysed using the Getis-Ord Gi* (Hot spot analysis) spatial statistics tool in ArcGIS Pro 2.0. The research therefore recommends that more effort be put into fighting crime, especially in areas where there are low-security formations, as they mostly have the highest record of crimes committed. Also, the patrol units should be equipped with GPS for better surveillance and real-time tracking of criminal activities.
文摘A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed based on field programmable gate array (FPGA) platform. The principle of ultra-weak fiber Bragg grating high-speed demodulation and signal recognition method were analyzed theoretically, and the Support Vector Machine model was introduced to optimize the event recognition accuracy of the system. A perimeter security experimental system containing 1000 ultra-weak fiber Bragg gratings, ultra-weak fiber Bragg grating sense optical cables with a diameter of 2.0 mm and a reflectivity of 0.01%, steel space frames and demodulation equipments was built to recognize four typical events such as knocking, shaking, wind blowing and rainfall. The experimental resulted show that the system has a spatial resolution of 1m and an acquisition frequency of 200 Hz. The joint time-frequency domain detection method is used to achieve 99.2% alarm accuracy, and 98% recognition accuracy of two intrusion events, which has good anti-interference performance.