Recently, a statement by the Beijing Administration for Industry and Commerce stopping restaurants and catering services from banning outside beverages has provoked heated debate among the public.
1Banff移植病理学会议的起源及其简要历程Banff移植病理学会议(Banff Conference on Allograft Pathology,简称“Banff会议”)创立于1991年,截止至2021年,已经走过了30年的历程^([1-5])。Banff会议及其移植病理学诊断标准的建立和不断更...1Banff移植病理学会议的起源及其简要历程Banff移植病理学会议(Banff Conference on Allograft Pathology,简称“Banff会议”)创立于1991年,截止至2021年,已经走过了30年的历程^([1-5])。Banff会议及其移植病理学诊断标准的建立和不断更新,是国际移植病理学发展中的里程碑,不仅极大地提高了器官移植术后并发症的诊断及其治疗水平,而且也形成了一个新的学科即移植病理学。展开更多
Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured...Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement.The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services.It has improved the real-time monitoring of patients by medical practitioners.Patients’data get stored at the central server on the cloud from where it is available to medical practitioners in no time.The centralisation of data on the server makes it more vulnerable to malicious attacks and causes a major threat to patients’privacy.In recent days,several schemes have been proposed to ensure the safety of patients’data.But most of the techniques still lack the practical implementation and safety of data.In this paper,a secure multi-factor authentication protocol using a hash function has been proposed.BAN(Body Area Network)logic has been used to formally analyse the proposed scheme and ensure that no unauthenticated user can steal sensitivepatient information.Security Protocol Animator(SPAN)–Automated Validation of Internet Security Protocols and Applications(AVISPA)tool has been used for simulation.The results prove that the proposed scheme ensures secure access to the database in terms of spoofing and identification.Performance comparisons of the proposed scheme with other related historical schemes regarding time complexity,computation cost which accounts to only 423 ms in proposed,and security parameters such as identification and spoofing prove its efficiency.展开更多
由于采用无线通信,基于无人机应用易受安全攻击。与蜂窝基站建立信任是增强无人机网络抵御安全攻击的有效措施。由于无人机的资源受限,传统的信任机制并不适用。提出基于最优路径的可扩展安全认证协议(scalable security authentication...由于采用无线通信,基于无人机应用易受安全攻击。与蜂窝基站建立信任是增强无人机网络抵御安全攻击的有效措施。由于无人机的资源受限,传统的信任机制并不适用。提出基于最优路径的可扩展安全认证协议(scalable security authentication protocol based on optimal path,SCOP)。SCOP协议利用Christofides算法构建最优路径,基站再依据此路径传输组合的认证消息,降低认证开销。同时,SCOP引用物理不可克函数和简易加密操作,确保物理层安全,降低无人机端的计算开销。通过BAN逻辑证明了SCOP协议的正确性。性能分析表明,相比于同类的认证协议,提出的SCOP协议降低了认证开销,减少了无人机端的运算时间。展开更多
The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information...The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information,perform analysis,and even come to meaningful conclusions without human capital intervention matters.Such circumstances require stringent security measures and,in particular,the extent of authentication.Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious,wrongly authenticated device finds its way into the IoT system.This research provides a clear and updated view of the trends in the IoT authentication area.Among the issues covered include a series of authentication protocols that have remained research gaps in various studies.This study applies a comparative evaluation of authentication protocols,including their strengths and weaknesses.Thus,it forms the foundation in the IoT authentication field of study.In that direction,a multi authentication architecture that involves secured means is proposed for protocol authentication.Informal analysis can affect the security of the protocols.Burrows-Abadi-Needham(BAN)logic provides proof of the attainment of mutual authentication.NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.展开更多
On November 5, 2015, the Fundão Dam breached (the “Event”), releasing water, tailings, dam construction material, and debris to downstream watercourses. Over 20 million cubic meters of fine particles from the t...On November 5, 2015, the Fundão Dam breached (the “Event”), releasing water, tailings, dam construction material, and debris to downstream watercourses. Over 20 million cubic meters of fine particles from the tailings, as well as scoured soil and sediments, reached the Rio Doce estuary and surrounding marine area 17 days later. Fishing was banned by the Federal Court of Espírito Santo in February 2016. The fishing ban area included the coastal area near the mouth of the Rio Doce and seaward to a depth of 25 meters, south to Barra do Riacho, and north to Degredo Beach. In June 2019, the Brazilian health agency, Anvisa, published a risk assessment for fish consumption which recommended daily consumption limits for fish of 200 grams for adults and 50 grams for children for both continental and coastal areas of the Rio Doce basin. Comparative analyses were performed between metal concentrations in marine fish and crustaceans collected in the banned fishing area to reference areas and commercialized seafood markets along the Brazilian coast. The results reveal that metals detected in seafood tissue collected in the fishing ban area are not significantly different than other reference areas or from commercially available seafood. This result indicates that elevated metal concentrations in seafood are a regional problem, unrelated to the Event. Higher concentrations of metals in fish in reference areas outside of the fishing ban area as well as in commercial seafood markets demonstrates that the risk management approach of a localized fishing ban is ineffective for reducing risk to the population related to seafood consumption. .展开更多
文摘Recently, a statement by the Beijing Administration for Industry and Commerce stopping restaurants and catering services from banning outside beverages has provoked heated debate among the public.
文摘1Banff移植病理学会议的起源及其简要历程Banff移植病理学会议(Banff Conference on Allograft Pathology,简称“Banff会议”)创立于1991年,截止至2021年,已经走过了30年的历程^([1-5])。Banff会议及其移植病理学诊断标准的建立和不断更新,是国际移植病理学发展中的里程碑,不仅极大地提高了器官移植术后并发症的诊断及其治疗水平,而且也形成了一个新的学科即移植病理学。
基金Taif University Researchers Supporting Project number(TURSP-2020/98),Taif University,Taif,Saudi Arabia。
文摘Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement.The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services.It has improved the real-time monitoring of patients by medical practitioners.Patients’data get stored at the central server on the cloud from where it is available to medical practitioners in no time.The centralisation of data on the server makes it more vulnerable to malicious attacks and causes a major threat to patients’privacy.In recent days,several schemes have been proposed to ensure the safety of patients’data.But most of the techniques still lack the practical implementation and safety of data.In this paper,a secure multi-factor authentication protocol using a hash function has been proposed.BAN(Body Area Network)logic has been used to formally analyse the proposed scheme and ensure that no unauthenticated user can steal sensitivepatient information.Security Protocol Animator(SPAN)–Automated Validation of Internet Security Protocols and Applications(AVISPA)tool has been used for simulation.The results prove that the proposed scheme ensures secure access to the database in terms of spoofing and identification.Performance comparisons of the proposed scheme with other related historical schemes regarding time complexity,computation cost which accounts to only 423 ms in proposed,and security parameters such as identification and spoofing prove its efficiency.
文摘由于采用无线通信,基于无人机应用易受安全攻击。与蜂窝基站建立信任是增强无人机网络抵御安全攻击的有效措施。由于无人机的资源受限,传统的信任机制并不适用。提出基于最优路径的可扩展安全认证协议(scalable security authentication protocol based on optimal path,SCOP)。SCOP协议利用Christofides算法构建最优路径,基站再依据此路径传输组合的认证消息,降低认证开销。同时,SCOP引用物理不可克函数和简易加密操作,确保物理层安全,降低无人机端的计算开销。通过BAN逻辑证明了SCOP协议的正确性。性能分析表明,相比于同类的认证协议,提出的SCOP协议降低了认证开销,减少了无人机端的运算时间。
文摘The Internet of Things(IoT)is a network of heterogeneous and smart devices that can make decisions without human intervention.It can connect millions of devices across the universe.Their ability to collect information,perform analysis,and even come to meaningful conclusions without human capital intervention matters.Such circumstances require stringent security measures and,in particular,the extent of authentication.Systems applied in the IoT paradigm point out high-interest levels since enormous damage will occur if a malicious,wrongly authenticated device finds its way into the IoT system.This research provides a clear and updated view of the trends in the IoT authentication area.Among the issues covered include a series of authentication protocols that have remained research gaps in various studies.This study applies a comparative evaluation of authentication protocols,including their strengths and weaknesses.Thus,it forms the foundation in the IoT authentication field of study.In that direction,a multi authentication architecture that involves secured means is proposed for protocol authentication.Informal analysis can affect the security of the protocols.Burrows-Abadi-Needham(BAN)logic provides proof of the attainment of mutual authentication.NS3 simulator tool is used to compare the performance of the proposed protocol to verify the formal security offered by the BAN logic.
文摘On November 5, 2015, the Fundão Dam breached (the “Event”), releasing water, tailings, dam construction material, and debris to downstream watercourses. Over 20 million cubic meters of fine particles from the tailings, as well as scoured soil and sediments, reached the Rio Doce estuary and surrounding marine area 17 days later. Fishing was banned by the Federal Court of Espírito Santo in February 2016. The fishing ban area included the coastal area near the mouth of the Rio Doce and seaward to a depth of 25 meters, south to Barra do Riacho, and north to Degredo Beach. In June 2019, the Brazilian health agency, Anvisa, published a risk assessment for fish consumption which recommended daily consumption limits for fish of 200 grams for adults and 50 grams for children for both continental and coastal areas of the Rio Doce basin. Comparative analyses were performed between metal concentrations in marine fish and crustaceans collected in the banned fishing area to reference areas and commercialized seafood markets along the Brazilian coast. The results reveal that metals detected in seafood tissue collected in the fishing ban area are not significantly different than other reference areas or from commercially available seafood. This result indicates that elevated metal concentrations in seafood are a regional problem, unrelated to the Event. Higher concentrations of metals in fish in reference areas outside of the fishing ban area as well as in commercial seafood markets demonstrates that the risk management approach of a localized fishing ban is ineffective for reducing risk to the population related to seafood consumption. .