The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,su...The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,such as low participation of residents,and low efficiency of fund use.Taking the exploration of standardization of community security fund management in Wuhou district,Chengdu city,as an example,this paper suggests further strengthening the use and management of community security funds by means of standardization,ensuring the democratic,open,and transparent use of funds,and effectively enhancing the supporting role of community security funds in community governance.展开更多
With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk manag...With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk management has become an important criterion to measure a good person.Therefore,the importance of e-commerce security and risk management courses in college education is self-evident.This course can not only help students master the basic knowledge of e-commerce,but also enable them to understand how to deal with various risks in practical work and ensure the safe operation of e-commerce.At the same time,through the study of e-commerce security and risk management,students can better understand the operation mode and law of e-commerce,and lay a solid foundation for their future career.In general,e-commerce security and risk management occupy an important position in the curriculum of colleges and universities,and play a crucial role in cultivating e-commerce professionals with practical operation ability and innovative thinking.展开更多
This study introduces an innovative approach by integrating AnyLogic simulation into emergency evacuation strategies to enhance security protocols.The research focuses on leveraging advanced computational models to si...This study introduces an innovative approach by integrating AnyLogic simulation into emergency evacuation strategies to enhance security protocols.The research focuses on leveraging advanced computational models to simulate and optimize evacuation scenarios in various settings,including public venues,residential areas,and urban environments.By integrating real-world data and behavioral models,the simulation accurately represents human movements,decision-making processes,and traffic flow dynamics during evacuation scenarios.The study evaluates the effectiveness of various evacuation strategies,including route planning,crowd behavior,and emergency response coordination,using a scenario-driven approach within the AnyLogic simulation environment.Furthermore,this research contributes to the establishment of optimized emergency response protocols by systematically evaluating and refining evacuation plans.The research frameworks mentioned in the research imply the efficient use of the AnyLogic simulation model to be used in different sectors and fields to enhance the strategies for saving lives and implementing an efficient evacuation management system.展开更多
The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cann...The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cannot be ignored.To address this issue,we firstly construct the models of DT model training and model poisoning attacks.An optimization problem is formulated to minimize the weighted sum of the DT loss function and DT model training delay.Then,the problem is transformed and solved by the proposed Multi-timescAle endogenouS securiTy-aware DQN-based rEsouRce management algorithm(MASTER)based on DT-assisted state information evaluation and attack detection.MASTER adopts multi-timescale deep Q-learning(DQN)networks to jointly schedule local training epochs and devices.It actively adjusts resource management strategies based on estimated attack probability to achieve endogenous security awareness.Simulation results demonstrate that MASTER has excellent performances in DT model training accuracy and delay.展开更多
Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grow...Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being.展开更多
Today, the demand for security software is Six Sigma quality, i.e. practically zero-defects. A practical and stochastic method is proposed for a Six Sigma security software quality management. Monte Carlo Simulation i...Today, the demand for security software is Six Sigma quality, i.e. practically zero-defects. A practical and stochastic method is proposed for a Six Sigma security software quality management. Monte Carlo Simulation is used in a Six Sigma DMAIC (Define, Measure, Analyze, Improve, Control) approach to security software testing. This elaboration used a published real project’s data from the final product testing lasted for 15 weeks, after which the product was delivered. The experiment utilised the first 12 weeks’ data to allow the results verification on the actual data from the last three weeks. A hypothetical testing project was applied, supposed to be completed in 15 weeks. The product due-date was Week 16 with zero-defects quality assurance aim. The testing project was analysed at the end of the 12th week with three weeks of testing remaining. Running a Monte Carlo Simulation with data from the first 12 weeks produced results which indicated that the product would not be able to meet its due-date with the desired zero-defects quality. To quantify an improvement, another simulation was run to find when zero-defects would be achieved. Simulation predicted that zero-defects would be achieved in week 35 with 56% probability, and there would be 82 defects from Weeks 16 - 35. Therefore, to meet the quality goals, either more resources should be allocated to the project, or the deadline for the project should be moved to Week 36. The paper concluded that utilising Monte Carlo Simulations in a Six Sigma DMAIC structured framework is better than conventional approaches using static analysis methods. When the simulation results were compared to the actual data, it was found to be accurate within ﹣3.5% to +1.3%. This approach helps to improve software quality and achieve the zero-defects quality assurance goal, while assigning quality confidence levels to scheduled product releases.展开更多
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib...In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it.展开更多
In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughp...In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughput and fault tolerance.However,PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism.As a result,traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network.To address these issues,we propose a novel decentralized reputation management mechanism for permissioned blockchain networks to enhance security,promote liveness,and mitigate centralization while retaining the same throughput as traditional PoA.This paper aims to design an off-chain reputation evaluation and an on-chain reputation-aided consensus.First,we evaluate the nodes’reputation in the context of the blockchain networks and make the reputation globally verifiable through smart contracts.Second,building upon traditional PoA,we propose a reputation-aided PoA(rPoA)consensus to enhance securitywithout sacrificing throughput.In particular,rPoA can incentivize nodes to autonomously form committees based on reputation authority,which prevents block generation from being tracked through the randomness of reputation variation.Moreover,we develop a reputation-aided fork-choice rule for rPoA to promote the network’s liveness.Finally,experimental results show that the proposed rPoA achieves higher security performance while retaining transaction throughput compared to traditional PoA.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hos...This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment.展开更多
Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless conne...Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.展开更多
Soft tissue sarcoma(STS)accounts for 1%of all malignant neoplasms in adults.Their diagnosis and management constitute a challenging target.They originate from the mesenchyme,and 50 subtypes with various cytogenetic pr...Soft tissue sarcoma(STS)accounts for 1%of all malignant neoplasms in adults.Their diagnosis and management constitute a challenging target.They originate from the mesenchyme,and 50 subtypes with various cytogenetic profiles concerning soft tissue and bones have been recognized.These tumors mainly affect middle-aged adults but may be present at any age.Half of the patients have metastatic disease at the time of diagnosis and require systemic therapy.Tumors above 3-5 cm in size must be suspected of potential malignancy.A thorough history,clinical examination and imaging that must precede biopsy are necessary.Modern imaging techniques include ultrasound,computed tomography(CT),new magnetic resonance imaging(MRI),and positron emission tomography/CT.MRI findings may distinguish low-grade from high-grade STS based on a diagnostic score(tumor heterogeneity,intratumoral and peritumoral enhancement).A score≥2 indicates a high-grade lesion,and a score≤1 indicates a lowgrade lesion.For disease staging,abdominal imaging is recommended to detect early abdominal or retroperitoneal metastases.Liquid biopsy by detecting genomic material in serum is a novel diagnostic tool.A preoperative biopsy is necessary for diagnosis,prognosis and optimal planning of surgical intervention.Core needle biopsy is the most indicative and effective.Its correct performance influences surgical management.An unsuccessful biopsy means the dissemination of cancer cells into healthy anatomical structures that ultimately affect resectability and survival.Complete therapeutic excision(R0)with an acceptable resection margin of 1 cm is the method of choice.However,near significant structures,i.e.,vessels,nerves,an R2 resection(macroscopic margin involvement)preserving functionality but having a risk of local recurrence can be an acceptable choice,after informing the patient,to prevent an unavoidable amputation.For borderline resectability of the tumor,neoadjuvant chemo/radiotherapy has a place.Likewise,after surgical excision,adjuvant therapy is indicated,but chemotherapy in nonmetastatic disease is still debatable.The five-year survival rate reaches up to 55%.Reresection is considered after positive or uncertain resection margins.Current strategies are based on novel chemotherapeutic agents,improved radiotherapy applications to limit local side effects and targeted biological therapy or immunotherapy,including vaccines.Young age is a risk factor for distant metastasis within 6 mo following primary tumor resection.Neoadjuvant radiotherapy lasting 5-6 wk and surgical resection are indicated for highgrade STS(grade 2 or 3).Wide surgical excision alone may be acceptable for patients older than 70 years.However,locally advanced disease requires a multidisciplinary task of decision-making for amputation or limb salvage.展开更多
Background: Maxillofacial injury may vary from simple soft tissue lacerations to complex fractures of the orofacial region. Soft tissue injuries, whether isolated or in combination with other injuries, form part of th...Background: Maxillofacial injury may vary from simple soft tissue lacerations to complex fractures of the orofacial region. Soft tissue injuries, whether isolated or in combination with other injuries, form part of the frequent traumatic craniofacial injuries seen at the emergency department. The force of impact and the injury type is directly related to the severity of the injury sustained. This study aimed to analyze the etiological factors, prevalence, and management of oral and maxillofacial soft tissue injuries at the Komfo Anokye Teaching Hospital. Methods: This was a prospective study that involved children presenting with oral and maxillofacial injuries at the Accident and Emergency Department and the Oral and Maxillofacial Surgery unit of the Komfo Anokye Teaching Hospital in Kumasi between the period of April to October 2020 (6 months). Patient selection was by convenience sampling targeting all children with injuries who met the inclusion criteria. Inclusion criteria were children below the age of 18 years whose parents or caregivers consent to participation. Children with maxillofacial injuries as a result of burns were excluded from the study. Results: During the study period a total of 134 children were reviewed with oral and maxillofacial injuries at KATH. Of these, 107 (78.9%) were recorded cases of orofacial soft tissue injuries. There were 63 (58.9%) males and 44 (41.1%) females and the male-to-female ratio was 1.5:1. The age range of patients studied was 8 months – 17 years, with mean age ± SD being 9.5 ± 5.3 years. Road Traffic Crash (50.5%) was the most common etiology of which Motor cycle crash constituted 24.3% and Pedestrian knockdown was 19.6%. Falls (42.1%) were the next most common etiology. The lips (19.8%) and the forehead (18.5%) were the most frequently injured sites on the face whiles the tongue (3.3%) had the most injuries intraorally. Laceration (45.7%) was the most frequent injury reviewed, followed by abrasions (35.8%). Most of the soft tissue injuries underwent primary closure (56.3%). A complication rate of 21.2% was recorded in this study and hypertrophic scarring (11.3%) was the most observed.展开更多
The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define ...The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define the sets of security issues, controls and organisation’s commitment for seamless integration with knowledge based platforms in order to protect critical assets and data. Such platforms are needed to evaluate and share violations which can create security loop-hole. The lack of rules-based approaches for discovering potential threats at organisation’s context, poses a challenge for many organisations in safeguarding their critical assets. To address the challenge, this paper introduces a Platform for Organisation Security Threat Analytic and Management (POSTAM) using rule-based approach. The platform enhances strategies for combating information security threats and thus improves organisations’ commitment in protecting their critical assets. R scripting language for data visualization and java-based scripts were used to develop a prototype to run on web protocol. MySQL database management system was used as back-end for data storage during threat analytic processes.展开更多
This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contr...This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contractors to implement the BIM-aided construction management. Application of BIM technology would bring many beneficial changes to the security management in construction.展开更多
In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept an...In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept and next generation smart living. Various case examples have been studied and a brief summary has been provided.Furthermore, a statistical analysis has been provided in terms of security management in smart living where it is found that young technocrats give the highest importance to security management in smart living. Last but not the least, current limitation, constraints, and future scope of security implementation have been discussed in terms of crowd energy clustered with next generation smart living.展开更多
According to the current development status and requirements of meteorological observation equipment security work in Jiangxi Province,a security management system of meteorological observation equipment was developed...According to the current development status and requirements of meteorological observation equipment security work in Jiangxi Province,a security management system of meteorological observation equipment was developed to improve the scientific and precise level of current security management business. The system was elaborated in terms of design ideas,functional modules,and realization of functions. The system adopts the C/S architecture to realize the information management of security business of meteorological observation equipment such as radar and automatic weather stations. It provides functions such as maintenance registration,data statistics and table generation.展开更多
The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ...Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.展开更多
Realized new break-through on the basis of existing security management theory, tentatively and creatively carried out "realizing management theory of mine security production" and proposed "bridge" mode of realiz...Realized new break-through on the basis of existing security management theory, tentatively and creatively carried out "realizing management theory of mine security production" and proposed "bridge" mode of realizing green management theory. Green management theory has an integrated system structure. The green management system of mine security production includes three parts, the foundation of green system, the supervision system of green system operation and the safeguard system of green system. The key of "bridge" mode is to analyze the existing insecurity factors in the process of security production and establish corresponding regulations.展开更多
文摘The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,such as low participation of residents,and low efficiency of fund use.Taking the exploration of standardization of community security fund management in Wuhou district,Chengdu city,as an example,this paper suggests further strengthening the use and management of community security funds by means of standardization,ensuring the democratic,open,and transparent use of funds,and effectively enhancing the supporting role of community security funds in community governance.
文摘With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk management has become an important criterion to measure a good person.Therefore,the importance of e-commerce security and risk management courses in college education is self-evident.This course can not only help students master the basic knowledge of e-commerce,but also enable them to understand how to deal with various risks in practical work and ensure the safe operation of e-commerce.At the same time,through the study of e-commerce security and risk management,students can better understand the operation mode and law of e-commerce,and lay a solid foundation for their future career.In general,e-commerce security and risk management occupy an important position in the curriculum of colleges and universities,and play a crucial role in cultivating e-commerce professionals with practical operation ability and innovative thinking.
基金The 2023 Langfang Science and Technology Support Plan Project:Design and Implementation of Earthquake Disaster Emergency Support Decision System in the Beijing-Tianjin-Hebei Region(Project number:2023013134)。
文摘This study introduces an innovative approach by integrating AnyLogic simulation into emergency evacuation strategies to enhance security protocols.The research focuses on leveraging advanced computational models to simulate and optimize evacuation scenarios in various settings,including public venues,residential areas,and urban environments.By integrating real-world data and behavioral models,the simulation accurately represents human movements,decision-making processes,and traffic flow dynamics during evacuation scenarios.The study evaluates the effectiveness of various evacuation strategies,including route planning,crowd behavior,and emergency response coordination,using a scenario-driven approach within the AnyLogic simulation environment.Furthermore,this research contributes to the establishment of optimized emergency response protocols by systematically evaluating and refining evacuation plans.The research frameworks mentioned in the research imply the efficient use of the AnyLogic simulation model to be used in different sectors and fields to enhance the strategies for saving lives and implementing an efficient evacuation management system.
基金supported by the Science and Technology Project of State Grid Corporation of China under Grant Number 52094021N010 (5400-202199534A-05-ZN)。
文摘The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cannot be ignored.To address this issue,we firstly construct the models of DT model training and model poisoning attacks.An optimization problem is formulated to minimize the weighted sum of the DT loss function and DT model training delay.Then,the problem is transformed and solved by the proposed Multi-timescAle endogenouS securiTy-aware DQN-based rEsouRce management algorithm(MASTER)based on DT-assisted state information evaluation and attack detection.MASTER adopts multi-timescale deep Q-learning(DQN)networks to jointly schedule local training epochs and devices.It actively adjusts resource management strategies based on estimated attack probability to achieve endogenous security awareness.Simulation results demonstrate that MASTER has excellent performances in DT model training accuracy and delay.
文摘Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being.
文摘Today, the demand for security software is Six Sigma quality, i.e. practically zero-defects. A practical and stochastic method is proposed for a Six Sigma security software quality management. Monte Carlo Simulation is used in a Six Sigma DMAIC (Define, Measure, Analyze, Improve, Control) approach to security software testing. This elaboration used a published real project’s data from the final product testing lasted for 15 weeks, after which the product was delivered. The experiment utilised the first 12 weeks’ data to allow the results verification on the actual data from the last three weeks. A hypothetical testing project was applied, supposed to be completed in 15 weeks. The product due-date was Week 16 with zero-defects quality assurance aim. The testing project was analysed at the end of the 12th week with three weeks of testing remaining. Running a Monte Carlo Simulation with data from the first 12 weeks produced results which indicated that the product would not be able to meet its due-date with the desired zero-defects quality. To quantify an improvement, another simulation was run to find when zero-defects would be achieved. Simulation predicted that zero-defects would be achieved in week 35 with 56% probability, and there would be 82 defects from Weeks 16 - 35. Therefore, to meet the quality goals, either more resources should be allocated to the project, or the deadline for the project should be moved to Week 36. The paper concluded that utilising Monte Carlo Simulations in a Six Sigma DMAIC structured framework is better than conventional approaches using static analysis methods. When the simulation results were compared to the actual data, it was found to be accurate within ﹣3.5% to +1.3%. This approach helps to improve software quality and achieve the zero-defects quality assurance goal, while assigning quality confidence levels to scheduled product releases.
文摘In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it.
基金supported by the Shenzhen Science and Technology Program under Grants KCXST20221021111404010,JSGG20220831103400002,JSGGKQTD20221101115655027,JCYJ 20210324094609027the National KeyR&DProgram of China under Grant 2021YFB2700900+1 种基金the National Natural Science Foundation of China under Grants 62371239,62376074,72301083the Jiangsu Specially-Appointed Professor Program 2021.
文摘In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughput and fault tolerance.However,PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism.As a result,traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network.To address these issues,we propose a novel decentralized reputation management mechanism for permissioned blockchain networks to enhance security,promote liveness,and mitigate centralization while retaining the same throughput as traditional PoA.This paper aims to design an off-chain reputation evaluation and an on-chain reputation-aided consensus.First,we evaluate the nodes’reputation in the context of the blockchain networks and make the reputation globally verifiable through smart contracts.Second,building upon traditional PoA,we propose a reputation-aided PoA(rPoA)consensus to enhance securitywithout sacrificing throughput.In particular,rPoA can incentivize nodes to autonomously form committees based on reputation authority,which prevents block generation from being tracked through the randomness of reputation variation.Moreover,we develop a reputation-aided fork-choice rule for rPoA to promote the network’s liveness.Finally,experimental results show that the proposed rPoA achieves higher security performance while retaining transaction throughput compared to traditional PoA.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment.
基金supported in part by the Natural Science Foundation of Shaanxi Province under Grant Number 2021JM-143the Fundamental Research Funds for the Central Universities under Grant Number JB211502+5 种基金the Project of Key Laboratory of Science and Technology on Communication Network under Grant Number 6142104200412the National Natural Science Foundation of China under Grant Number 61672410the Academy of Finland under Grant Number 308087the China 111 project under Grant Number B16037JSPS KAKENHI under Grant Number JP20K14742and the Project of Cyber Security Establishment with Inter University Cooperation.
文摘Due to the broadcast nature of wireless communications,users’data transmitted wirelessly is susceptible to security/privacy threats.Meanwhile,as a result of the limitation of spectrum resources,massive wireless connections will incur serious interference,which may damage the efficiency of data transmission.Therefore,improving both efficiency and secrecy of data transmission is of research significance.In this paper,we propose a wireless transmission scheme by taking both Secure Communication(SC)and Interference Management(IM)into account,namely SCIM.With this scheme,an SCIM signal is generated by the legitimate transmitter(Tx)and sent along with the desired signal,so that the SCIM signal can interact with and suppress the environmental interference at the legitimate receiver(Rx).Meanwhile,the SCIM signal may interfere with the eavesdropper in the coverage of legitimate transmission so as to deteriorate the eavesdropping performance.Therefore,the secrecy of desired transmission is improved.In this way,both the transmission efficiency and privacy are enhanced.Then,by taking various transmission preferences into account,we develop different implementations of SCIM,including Interference Suppression First SCIM(ISF-SCIM),Data Transmission First SCIM(DTF-SCIM),Anti-Eavesdropping First SCIM(AEF-SCIM),and Secrecy Rate Maximization SCIM(SRM-SCIM).Our in-depth simulation results have shown the proposed methods to effectively improve the efficiency and secrecy of the legitimate transmission.
文摘Soft tissue sarcoma(STS)accounts for 1%of all malignant neoplasms in adults.Their diagnosis and management constitute a challenging target.They originate from the mesenchyme,and 50 subtypes with various cytogenetic profiles concerning soft tissue and bones have been recognized.These tumors mainly affect middle-aged adults but may be present at any age.Half of the patients have metastatic disease at the time of diagnosis and require systemic therapy.Tumors above 3-5 cm in size must be suspected of potential malignancy.A thorough history,clinical examination and imaging that must precede biopsy are necessary.Modern imaging techniques include ultrasound,computed tomography(CT),new magnetic resonance imaging(MRI),and positron emission tomography/CT.MRI findings may distinguish low-grade from high-grade STS based on a diagnostic score(tumor heterogeneity,intratumoral and peritumoral enhancement).A score≥2 indicates a high-grade lesion,and a score≤1 indicates a lowgrade lesion.For disease staging,abdominal imaging is recommended to detect early abdominal or retroperitoneal metastases.Liquid biopsy by detecting genomic material in serum is a novel diagnostic tool.A preoperative biopsy is necessary for diagnosis,prognosis and optimal planning of surgical intervention.Core needle biopsy is the most indicative and effective.Its correct performance influences surgical management.An unsuccessful biopsy means the dissemination of cancer cells into healthy anatomical structures that ultimately affect resectability and survival.Complete therapeutic excision(R0)with an acceptable resection margin of 1 cm is the method of choice.However,near significant structures,i.e.,vessels,nerves,an R2 resection(macroscopic margin involvement)preserving functionality but having a risk of local recurrence can be an acceptable choice,after informing the patient,to prevent an unavoidable amputation.For borderline resectability of the tumor,neoadjuvant chemo/radiotherapy has a place.Likewise,after surgical excision,adjuvant therapy is indicated,but chemotherapy in nonmetastatic disease is still debatable.The five-year survival rate reaches up to 55%.Reresection is considered after positive or uncertain resection margins.Current strategies are based on novel chemotherapeutic agents,improved radiotherapy applications to limit local side effects and targeted biological therapy or immunotherapy,including vaccines.Young age is a risk factor for distant metastasis within 6 mo following primary tumor resection.Neoadjuvant radiotherapy lasting 5-6 wk and surgical resection are indicated for highgrade STS(grade 2 or 3).Wide surgical excision alone may be acceptable for patients older than 70 years.However,locally advanced disease requires a multidisciplinary task of decision-making for amputation or limb salvage.
文摘Background: Maxillofacial injury may vary from simple soft tissue lacerations to complex fractures of the orofacial region. Soft tissue injuries, whether isolated or in combination with other injuries, form part of the frequent traumatic craniofacial injuries seen at the emergency department. The force of impact and the injury type is directly related to the severity of the injury sustained. This study aimed to analyze the etiological factors, prevalence, and management of oral and maxillofacial soft tissue injuries at the Komfo Anokye Teaching Hospital. Methods: This was a prospective study that involved children presenting with oral and maxillofacial injuries at the Accident and Emergency Department and the Oral and Maxillofacial Surgery unit of the Komfo Anokye Teaching Hospital in Kumasi between the period of April to October 2020 (6 months). Patient selection was by convenience sampling targeting all children with injuries who met the inclusion criteria. Inclusion criteria were children below the age of 18 years whose parents or caregivers consent to participation. Children with maxillofacial injuries as a result of burns were excluded from the study. Results: During the study period a total of 134 children were reviewed with oral and maxillofacial injuries at KATH. Of these, 107 (78.9%) were recorded cases of orofacial soft tissue injuries. There were 63 (58.9%) males and 44 (41.1%) females and the male-to-female ratio was 1.5:1. The age range of patients studied was 8 months – 17 years, with mean age ± SD being 9.5 ± 5.3 years. Road Traffic Crash (50.5%) was the most common etiology of which Motor cycle crash constituted 24.3% and Pedestrian knockdown was 19.6%. Falls (42.1%) were the next most common etiology. The lips (19.8%) and the forehead (18.5%) were the most frequently injured sites on the face whiles the tongue (3.3%) had the most injuries intraorally. Laceration (45.7%) was the most frequent injury reviewed, followed by abrasions (35.8%). Most of the soft tissue injuries underwent primary closure (56.3%). A complication rate of 21.2% was recorded in this study and hypertrophic scarring (11.3%) was the most observed.
文摘The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define the sets of security issues, controls and organisation’s commitment for seamless integration with knowledge based platforms in order to protect critical assets and data. Such platforms are needed to evaluate and share violations which can create security loop-hole. The lack of rules-based approaches for discovering potential threats at organisation’s context, poses a challenge for many organisations in safeguarding their critical assets. To address the challenge, this paper introduces a Platform for Organisation Security Threat Analytic and Management (POSTAM) using rule-based approach. The platform enhances strategies for combating information security threats and thus improves organisations’ commitment in protecting their critical assets. R scripting language for data visualization and java-based scripts were used to develop a prototype to run on web protocol. MySQL database management system was used as back-end for data storage during threat analytic processes.
基金Supported by the Ministry of Housing and Urban-Rural Development Science and Technology Project Program of China(2016-K8-045)
文摘This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contractors to implement the BIM-aided construction management. Application of BIM technology would bring many beneficial changes to the security management in construction.
基金the support provided by the University of Asia Pacific and Institute for Energy, Environment, Research and Development (IEERD)
文摘In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept and next generation smart living. Various case examples have been studied and a brief summary has been provided.Furthermore, a statistical analysis has been provided in terms of security management in smart living where it is found that young technocrats give the highest importance to security management in smart living. Last but not the least, current limitation, constraints, and future scope of security implementation have been discussed in terms of crowd energy clustered with next generation smart living.
文摘According to the current development status and requirements of meteorological observation equipment security work in Jiangxi Province,a security management system of meteorological observation equipment was developed to improve the scientific and precise level of current security management business. The system was elaborated in terms of design ideas,functional modules,and realization of functions. The system adopts the C/S architecture to realize the information management of security business of meteorological observation equipment such as radar and automatic weather stations. It provides functions such as maintenance registration,data statistics and table generation.
文摘The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.
文摘Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.
文摘Realized new break-through on the basis of existing security management theory, tentatively and creatively carried out "realizing management theory of mine security production" and proposed "bridge" mode of realizing green management theory. Green management theory has an integrated system structure. The green management system of mine security production includes three parts, the foundation of green system, the supervision system of green system operation and the safeguard system of green system. The key of "bridge" mode is to analyze the existing insecurity factors in the process of security production and establish corresponding regulations.