The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ...The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication.展开更多
Maize(Zea mays L.) is an economically vital grain crop that is cultivated worldwide. In 2011, a maize foliar disease was detected in Lingtai and Lintao counties in Gansu Province, China. The characteristic signs and s...Maize(Zea mays L.) is an economically vital grain crop that is cultivated worldwide. In 2011, a maize foliar disease was detected in Lingtai and Lintao counties in Gansu Province, China. The characteristic signs and symptoms of this disease include irregular chlorotic lesions on the tips and edges of infected leaves and black punctate fruiting bodies in dead leaf tissues. Given favourable environmental conditions, this disease spread to areas surrounding Gansu. In this study, infected leaves were collected from Gansu and Ningxia Hui Autonomous Region between 2018and 2020 to identify the disease-causing pathogen. Based on morphological features, pathogenicity tests, and multilocus phylogenetic analysis involving internal transcribed spacer(ITS), 18S small subunit rDNA(SSU), 28S large subunit rDNA(LSU), translation elongation factor 1-alpha(TEF), and β-tubulin(TUB) sequences, Eutiarosporella dactylidis was identified as the causative pathogen of this newly discovered leaf blight. Furthermore, an in vitro bioassay was conducted on representative strains using six fungicides, and both fludioxonil and carbendazim were found to significantly inhibit the mycelial growth of E. dactylidis. The results of this study provide a reference for the detection and management of Eutiarosporella leaf blight.展开更多
Precipitation projections over the Tibetan Plateau(TP)show diversity among existing studies,partly due to model uncertainty.How to develop a reliable projection remains inconclusive.Here,based on the IPCC AR6–assesse...Precipitation projections over the Tibetan Plateau(TP)show diversity among existing studies,partly due to model uncertainty.How to develop a reliable projection remains inconclusive.Here,based on the IPCC AR6–assessed likely range of equilibrium climate sensitivity(ECS)and the climatological precipitation performance,the authors constrain the CMIP6(phase 6 of the Coupled Model Intercomparison Project)model projection of summer precipitation and water availability over the TP.The best estimates of precipitation changes are 0.24,0.25,and 0.45 mm d^(−1)(5.9%,6.1%,and 11.2%)under the Shared Socioeconomic Pathway(SSP)scenarios of SSP1–2.6,SSP2–4.5,and SSP5–8.5 from 2050–2099 relative to 1965–2014,respectively.The corresponding constrained projections of water availability measured by precipitation minus evaporation(P–E)are 0.10,0.09,and 0.22 mm d^(−1)(5.7%,4.9%,and 13.2%),respectively.The increase of precipitation and P–E projected by the high-ECS models,whose ECS values are higher than the upper limit of the likely range,are about 1.7 times larger than those estimated by constrained projections.Spatially,there is a larger increase in precipitation and P–E over the eastern TP,while the western part shows a relatively weak difference in precipitation and a drier trend in P–E.The wetter TP projected by the high-ECS models resulted from both an approximately 1.2–1.4 times stronger hydrological sensitivity and additional warming of 0.6℃–1.2℃ under all three scenarios during 2050–2099.This study emphasizes that selecting climate models with climate sensitivity within the likely range is crucial to reducing the uncertainty in the projection of TP precipitation and water availability changes.展开更多
China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the ...China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.展开更多
Let(X,T)be a linear dynamical system,where X is a Banach space and T:X→X is a bounded linear operator.This paper obtains that(X,T)is sensitive(Li-Yorke sensitive,mean sensitive,syndetically mean sensitive,respectivel...Let(X,T)be a linear dynamical system,where X is a Banach space and T:X→X is a bounded linear operator.This paper obtains that(X,T)is sensitive(Li-Yorke sensitive,mean sensitive,syndetically mean sensitive,respectively)if and only if(X,T)is Banach mean sensitive(Banach mean Li-Yorke sensitive,thickly multi-mean sensitive,thickly syndetically mean sensitive,respectively).Several examples are provided to distinguish between different notions of mean sensitivity,syndetic mean sensitivi`ty and mean Li-Yorke sensitivity.展开更多
Let(X,T) be a linear dynamical system,where X is a Banach space over C and T:X→X is a bounded linear operator.We show that if(X,T) is sensitive and not cofinitely sensitive,then σ(T) ∩T≠?,where σ(T) is the spectr...Let(X,T) be a linear dynamical system,where X is a Banach space over C and T:X→X is a bounded linear operator.We show that if(X,T) is sensitive and not cofinitely sensitive,then σ(T) ∩T≠?,where σ(T) is the spectrum of T and T={λ∈C:|λ|=1},and that there is a non-hypercyclic,sensitive system(X,T) which is not syndetically sensitive.We also show that there is a transitively sensitive system(X,T) which is mean sensitive but not multi-transitively sensitive.展开更多
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece...The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.展开更多
Clarifying the relationship between stress sensitivities of permeability and porosity is of great significance in guiding underground resource mining.More and more studies focus on how to construct stress sensitivity ...Clarifying the relationship between stress sensitivities of permeability and porosity is of great significance in guiding underground resource mining.More and more studies focus on how to construct stress sensitivity models to describe the relationship and obtain a comprehensive stress sensitivity of porous rock.However,the limitations of elastic deformation calculation and incompleteness of considered tortuosity sensitivity lead to the fact that the existing stress sensitivity models are still unsatisfactory in terms of accuracy and generalization.Therefore,a more accurate and generic stress sensitivity model considering elastic-structural deformation of capillary cross-section and tortuosity sensitivity is proposed in this paper.The elastic deformation is derived from the fractal scaling model and Hooke's law.Considering the effects of elastic-structural deformation on tortuosity sensitivity,an empirical formula is proposed,and the conditions for its applicability are clarified.The predictive performance of the proposed model for the permeability-porosity relationships is validated in several sets of publicly available experimental data.These experimental data are from different rocks under different pressure cycles.The mean and standard deviation of relative errors of predicted stress sensitivity with respect to experimental data are 2.63%and 1.91%.Compared with other models,the proposed model has higher accuracy and better predictive generalization performance.It is also found that the porosity sensitivity exponent a,which can describe permeability-porosity relationships,is 2 when only elastic deformation is considered.a decreases from 2 when structural deformation is also considered.In addition,a may be greater than 3 due to the increase in tortuosity sensitivity when tortuosity sensitivity is considered even if the rock is not fractured.展开更多
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user...The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.展开更多
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of ...Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste.展开更多
Continental shale oil reservoirs,characterized by numerous bedding planes and micro-nano scale pores,feature significantly higher stress sensitivity compared to other types of reservoirs.However,research on suitable s...Continental shale oil reservoirs,characterized by numerous bedding planes and micro-nano scale pores,feature significantly higher stress sensitivity compared to other types of reservoirs.However,research on suitable stress sensitivity characterization models is still limited.In this study,three commonly used stress sensitivity models for shale oil reservoirs were considered,and experiments on representative core samples were conducted.By fitting and comparing the data,the“exponential model”was identified as a characterization model that accurately represents stress sensitivity in continental shale oil reservoirs.To validate the accuracy of the model,a two-phase seepage mathematical model for shale oil reservoirs coupled with the exponential model was introduced.The model was discretely solved using the finite volume method,and its accuracy was verified through the commercial simulator CMG.The study evaluated the productivity of a typical horizontal well under different engineering,geological,and fracture conditions.The results indicate that considering stress sensitivity leads to a 13.57%reduction in production for the same matrix permeability.Additionally,as the fracture half-length and the number of fractures increase,and the bottomhole flowing pressure decreases,the reservoir stress sensitivity becomes higher.展开更多
Fluopyram is an succinate dehydrogenase inhibitors(SDHI)fungicide that has been registered in China to control gummy stem blight(GSB)in watermelons for many years.However,whether the field pathogens of GSB are still s...Fluopyram is an succinate dehydrogenase inhibitors(SDHI)fungicide that has been registered in China to control gummy stem blight(GSB)in watermelons for many years.However,whether the field pathogens of GSB are still sensitive to fluopyram or not is unknown.Therefore,we collected 69 Didymella bryoniae isolates from the fields that usually use fluopyram to control GSB to determine the sensitivity change.The EC_(50)(50%inhibition effect)values of fluopyram against D.bryoniae ranged from 0.0691 to 0.3503μg mL^(–1) and the variation factor was 5.07.The mean EC_(50) value was(0.1579±0.0669)μg mL^(–1) and the curve of sensitivity was unimodal.No resistant strains were found in the isolates,which means that the pathogens were still sensitive to fluopyram.The minimal inhibition concentration(MIC)of fluopyram against D.bryoniae was 3μg mL^(–1).Four low-resistant mutants and two medium-resistant mutants were obtained using fungicide taming and the resistance of mutants could be inherited stably.The growth rate of mutants decreased significantly compared with that of wild-type strains while the biomass of most mutants was similar to that of wild-type strains.The sensitivity of most resistant mutants to various stresses was increased compared with that of wild-type strains.The virulence of mutants receded except for low-resistant mutant XN51FR-1,which had the same lesion area as XN51 on the watermelon leaves.The results indicated that the fitness of resistant mutants was decreased compared with that of wild-type strains.The cross-resistance assay indicated that fluopyram-resistant mutants were positive cross-resistant to all six SDHI fungicides in this test but were still sensitive to fluazinam and tebuconazole.So the resistance risk of D.bryoniae to fluopyram was moderate.In addition,we found that the SdhB gene of low-resistant mutant XN30FR-1 had three new point mutations at positions K258N,A259P,and H277N.Medium-resistant mutant XN52FR-1 showed a mutation at position H277N and other mutants did not have any point mutation.展开更多
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia...The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication.展开更多
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof...This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.展开更多
In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic method...In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.展开更多
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
Introduction: Food security is one of the greatest challenges that most African countries face. It is a concept that considers not only food quantity but also food quality. The objective of this study was to describe ...Introduction: Food security is one of the greatest challenges that most African countries face. It is a concept that considers not only food quantity but also food quality. The objective of this study was to describe dietary diversity and food security status at the individual level in Cameroonian populations. Methods: A total of 1180 men and women aged 20 and over and living in the West, North West, and Littoral regions of Cameroon were recruited. Data on dietary habits were collected through the frequency of consumption of various food groups. Dietary diversity was assessed using a 24-hour dietary recall. Food security status was determined by combining two indicators (food consumption score and individual food diversity score). Results: The mean dietary diversity score of the population was 3.53 ± 1.44, p Conclusion: The diet diversity of adults living in the West, North West, and Littoral regions of Cameroon is medium. Although half of the study population was food secure, there is a need to implement food security policies further to reduce food insecurity among the Cameroonian population.展开更多
文摘The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication.
基金supported by the Doctor Foundation of Gansu Academy of Agricultural Sciences,China(2020GAAS33)the Young Science and Technology Lifting Engineering Talents in Gansu Province,China(2020-18)the Agricultural Science and Technology Innovation Program of the Chinese Academy of Agricultural Sciences(CAAS-ASTIP-2017-ICS)。
文摘Maize(Zea mays L.) is an economically vital grain crop that is cultivated worldwide. In 2011, a maize foliar disease was detected in Lingtai and Lintao counties in Gansu Province, China. The characteristic signs and symptoms of this disease include irregular chlorotic lesions on the tips and edges of infected leaves and black punctate fruiting bodies in dead leaf tissues. Given favourable environmental conditions, this disease spread to areas surrounding Gansu. In this study, infected leaves were collected from Gansu and Ningxia Hui Autonomous Region between 2018and 2020 to identify the disease-causing pathogen. Based on morphological features, pathogenicity tests, and multilocus phylogenetic analysis involving internal transcribed spacer(ITS), 18S small subunit rDNA(SSU), 28S large subunit rDNA(LSU), translation elongation factor 1-alpha(TEF), and β-tubulin(TUB) sequences, Eutiarosporella dactylidis was identified as the causative pathogen of this newly discovered leaf blight. Furthermore, an in vitro bioassay was conducted on representative strains using six fungicides, and both fludioxonil and carbendazim were found to significantly inhibit the mycelial growth of E. dactylidis. The results of this study provide a reference for the detection and management of Eutiarosporella leaf blight.
基金supported by the Second Tibetan Plateau Scientific Expedition and Research(STEP)program[grant number 2019QZKK0102]the Chinese Academy of Sciences[grant number 060GJHZ2023079GC].
文摘Precipitation projections over the Tibetan Plateau(TP)show diversity among existing studies,partly due to model uncertainty.How to develop a reliable projection remains inconclusive.Here,based on the IPCC AR6–assessed likely range of equilibrium climate sensitivity(ECS)and the climatological precipitation performance,the authors constrain the CMIP6(phase 6 of the Coupled Model Intercomparison Project)model projection of summer precipitation and water availability over the TP.The best estimates of precipitation changes are 0.24,0.25,and 0.45 mm d^(−1)(5.9%,6.1%,and 11.2%)under the Shared Socioeconomic Pathway(SSP)scenarios of SSP1–2.6,SSP2–4.5,and SSP5–8.5 from 2050–2099 relative to 1965–2014,respectively.The corresponding constrained projections of water availability measured by precipitation minus evaporation(P–E)are 0.10,0.09,and 0.22 mm d^(−1)(5.7%,4.9%,and 13.2%),respectively.The increase of precipitation and P–E projected by the high-ECS models,whose ECS values are higher than the upper limit of the likely range,are about 1.7 times larger than those estimated by constrained projections.Spatially,there is a larger increase in precipitation and P–E over the eastern TP,while the western part shows a relatively weak difference in precipitation and a drier trend in P–E.The wetter TP projected by the high-ECS models resulted from both an approximately 1.2–1.4 times stronger hydrological sensitivity and additional warming of 0.6℃–1.2℃ under all three scenarios during 2050–2099.This study emphasizes that selecting climate models with climate sensitivity within the likely range is crucial to reducing the uncertainty in the projection of TP precipitation and water availability changes.
基金The authors acknowledge the financial support received from the National Natural Science Foundation of China(72061147002).
文摘China removed fertilizer manufacturing subsidies from 2015 to 2018 to bolster market-oriented reforms and foster environmentally sustainable practices.However,the impact of this policy reform on food security and the environment remains inadequately evaluated.Moreover,although green and low-carbon technologies offer environmental advantages,their widespread adoption is hindered by prohibitively high costs.This study analyzes the impact of removing fertilizer manufacturing subsidies and explores the potential feasibility of redirecting fertilizer manufacturing subsidies to invest in the diffusion of these technologies.Utilizing the China Agricultural University Agri-food Systems model,we analyzed the potential for achieving mutually beneficial outcomes regarding food security and environmental sustainability.The findings indicate that removing fertilizer manufacturing subsidies has reduced greenhouse gas(GHG)emissions from agricultural activities by 3.88 million metric tons,with minimal impact on food production.Redirecting fertilizer manufacturing subsidies to invest in green and low-carbon technologies,including slow and controlled-release fertilizer,organic-inorganic compound fertilizers,and machine deep placement of fertilizer,emerges as a strategy to concurrently curtail GHG emissions,ensure food security,and secure robust economic returns.Finally,we propose a comprehensive set of government interventions,including subsidies,field guidance,and improved extension systems,to promote the widespread adoption of these technologies.
文摘Let(X,T)be a linear dynamical system,where X is a Banach space and T:X→X is a bounded linear operator.This paper obtains that(X,T)is sensitive(Li-Yorke sensitive,mean sensitive,syndetically mean sensitive,respectively)if and only if(X,T)is Banach mean sensitive(Banach mean Li-Yorke sensitive,thickly multi-mean sensitive,thickly syndetically mean sensitive,respectively).Several examples are provided to distinguish between different notions of mean sensitivity,syndetic mean sensitivi`ty and mean Li-Yorke sensitivity.
文摘Let(X,T) be a linear dynamical system,where X is a Banach space over C and T:X→X is a bounded linear operator.We show that if(X,T) is sensitive and not cofinitely sensitive,then σ(T) ∩T≠?,where σ(T) is the spectrum of T and T={λ∈C:|λ|=1},and that there is a non-hypercyclic,sensitive system(X,T) which is not syndetically sensitive.We also show that there is a transitively sensitive system(X,T) which is mean sensitive but not multi-transitively sensitive.
基金supported by the Research Program funded by the SeoulTech(Seoul National University of Science and Technology).
文摘The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
基金funding support from the State Key Program of National Natural Science Foundation of China(Grant No.U1637206)Shanghai Sailing Program(Grant No.20YF1417200).
文摘Clarifying the relationship between stress sensitivities of permeability and porosity is of great significance in guiding underground resource mining.More and more studies focus on how to construct stress sensitivity models to describe the relationship and obtain a comprehensive stress sensitivity of porous rock.However,the limitations of elastic deformation calculation and incompleteness of considered tortuosity sensitivity lead to the fact that the existing stress sensitivity models are still unsatisfactory in terms of accuracy and generalization.Therefore,a more accurate and generic stress sensitivity model considering elastic-structural deformation of capillary cross-section and tortuosity sensitivity is proposed in this paper.The elastic deformation is derived from the fractal scaling model and Hooke's law.Considering the effects of elastic-structural deformation on tortuosity sensitivity,an empirical formula is proposed,and the conditions for its applicability are clarified.The predictive performance of the proposed model for the permeability-porosity relationships is validated in several sets of publicly available experimental data.These experimental data are from different rocks under different pressure cycles.The mean and standard deviation of relative errors of predicted stress sensitivity with respect to experimental data are 2.63%and 1.91%.Compared with other models,the proposed model has higher accuracy and better predictive generalization performance.It is also found that the porosity sensitivity exponent a,which can describe permeability-porosity relationships,is 2 when only elastic deformation is considered.a decreases from 2 when structural deformation is also considered.In addition,a may be greater than 3 due to the increase in tortuosity sensitivity when tortuosity sensitivity is considered even if the rock is not fractured.
文摘The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
文摘Plantain is a food security crop of significant nutritional value in the global south. Yet there are significant post-harvest losses, especially at the senescent stage. This review seeks to give a general overview of the crop, its nutritional significance and the technologies that can be adopted to enhance its utilisation at its senescent stage. In West Africa, plantains are eaten at all ripening stages, yet processing is limited to the unripe and semi-ripe. Adoptable technologies such as foam-mat drying will enhance its utilisation in indigenous meals and other food applications. This review provides useful insight to optimize the use of plantain to prevent food waste.
基金supported by the China Postdoctoral Science Foundation(2021M702304)Natural Science Foundation of Shandong Province(ZR2021QE260).
文摘Continental shale oil reservoirs,characterized by numerous bedding planes and micro-nano scale pores,feature significantly higher stress sensitivity compared to other types of reservoirs.However,research on suitable stress sensitivity characterization models is still limited.In this study,three commonly used stress sensitivity models for shale oil reservoirs were considered,and experiments on representative core samples were conducted.By fitting and comparing the data,the“exponential model”was identified as a characterization model that accurately represents stress sensitivity in continental shale oil reservoirs.To validate the accuracy of the model,a two-phase seepage mathematical model for shale oil reservoirs coupled with the exponential model was introduced.The model was discretely solved using the finite volume method,and its accuracy was verified through the commercial simulator CMG.The study evaluated the productivity of a typical horizontal well under different engineering,geological,and fracture conditions.The results indicate that considering stress sensitivity leads to a 13.57%reduction in production for the same matrix permeability.Additionally,as the fracture half-length and the number of fractures increase,and the bottomhole flowing pressure decreases,the reservoir stress sensitivity becomes higher.
基金sponsored by the National Key R&D Program of China(2022YFD1400900)the National Natural Science Foundation of China(32272585)the Fundamental Research Funds for the Central Universities,China(KYCXJC2023003)。
文摘Fluopyram is an succinate dehydrogenase inhibitors(SDHI)fungicide that has been registered in China to control gummy stem blight(GSB)in watermelons for many years.However,whether the field pathogens of GSB are still sensitive to fluopyram or not is unknown.Therefore,we collected 69 Didymella bryoniae isolates from the fields that usually use fluopyram to control GSB to determine the sensitivity change.The EC_(50)(50%inhibition effect)values of fluopyram against D.bryoniae ranged from 0.0691 to 0.3503μg mL^(–1) and the variation factor was 5.07.The mean EC_(50) value was(0.1579±0.0669)μg mL^(–1) and the curve of sensitivity was unimodal.No resistant strains were found in the isolates,which means that the pathogens were still sensitive to fluopyram.The minimal inhibition concentration(MIC)of fluopyram against D.bryoniae was 3μg mL^(–1).Four low-resistant mutants and two medium-resistant mutants were obtained using fungicide taming and the resistance of mutants could be inherited stably.The growth rate of mutants decreased significantly compared with that of wild-type strains while the biomass of most mutants was similar to that of wild-type strains.The sensitivity of most resistant mutants to various stresses was increased compared with that of wild-type strains.The virulence of mutants receded except for low-resistant mutant XN51FR-1,which had the same lesion area as XN51 on the watermelon leaves.The results indicated that the fitness of resistant mutants was decreased compared with that of wild-type strains.The cross-resistance assay indicated that fluopyram-resistant mutants were positive cross-resistant to all six SDHI fungicides in this test but were still sensitive to fluazinam and tebuconazole.So the resistance risk of D.bryoniae to fluopyram was moderate.In addition,we found that the SdhB gene of low-resistant mutant XN30FR-1 had three new point mutations at positions K258N,A259P,and H277N.Medium-resistant mutant XN52FR-1 showed a mutation at position H277N and other mutants did not have any point mutation.
文摘The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication.
基金This work is the result of commissioned research project supported by the Affiliated Institute of ETRI(2022-086)received by Junho AhnThis research was supported by the National Research Foundation of Korea(NRF)Basic Science Research Program funded by the Ministry of Education(No.2020R1A6A1A03040583)this work was supported by Korea Institute for Advancement of Technology(KIAT)Grant funded by the Korea government(MOTIE)(P0008691,HRD Program for Industrial Innovation).
文摘This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules.
文摘In an era characterized by digital pervasiveness and rapidly expanding datasets,ensuring the integrity and reliability of information is paramount.As cyber threats evolve in complexity,traditional cryptographic methods face increasingly sophisticated challenges.This article initiates an exploration into these challenges,focusing on key exchanges(encompassing their variety and subtleties),scalability,and the time metrics associated with various cryptographic processes.We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering.Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity,foundational pillars of information security.Our method employs a phased strategy,beginning with a detailed examination of traditional cryptographic processes,including Elliptic Curve Diffie-Hellman(ECDH)key exchanges.We also delve into encrypt/decrypt paradigms,signature generation modes,and the hashes used for Message Authentication Codes(MACs).Each process is rigorously evaluated for performance and reliability.To gain a comprehensive understanding,a meticulously designed simulation was conducted,revealing the strengths and potential improvement areas of various techniques.Notably,our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs,marking a significant advancement over existing methods.Furthermore,with integrity metrics at 9.35,the protocol’s resilience is further affirmed.These metrics,derived from stringent testing,underscore the protocol’s efficacy in enhancing data security.
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
文摘Introduction: Food security is one of the greatest challenges that most African countries face. It is a concept that considers not only food quantity but also food quality. The objective of this study was to describe dietary diversity and food security status at the individual level in Cameroonian populations. Methods: A total of 1180 men and women aged 20 and over and living in the West, North West, and Littoral regions of Cameroon were recruited. Data on dietary habits were collected through the frequency of consumption of various food groups. Dietary diversity was assessed using a 24-hour dietary recall. Food security status was determined by combining two indicators (food consumption score and individual food diversity score). Results: The mean dietary diversity score of the population was 3.53 ± 1.44, p Conclusion: The diet diversity of adults living in the West, North West, and Littoral regions of Cameroon is medium. Although half of the study population was food secure, there is a need to implement food security policies further to reduce food insecurity among the Cameroonian population.