The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the regio...The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the region has witnessed significant land use/cover changes(LUCC), impacting ecosystem services(ES) and ecological security patterns(ESP). Investigating LUCC's effects on ES and ESP in the YRD is crucial for ecological security and sustainable development. This study utilized the PLUS model to simulate 2030 land use scenarios, including natural development(NDS), economic development(EDS), and ecological protection scenarios(EPS). Subsequently, the InVEST model and circuit theory were applied to assess ES and ESP under varying LUCC scenarios from 2010 to 2030. Findings indicate:(1) Notable LUCC from 2010 to 2030, marked by decreasing cropland and increasing construction land and water bodies.(2) From 2010 to 2020, improvements were observed in carbon storage,water yield, soil retention, and habitat quality, whereas 2020–2030 saw increases in water yield and soil retention but declines in habitat quality and carbon storage. Among the scenarios, EPS showed superior performance in all four ES.(3) Between 2010 and 2030, ecological sources, corridors, and pinchpoints expanded, displaying significant spatial heterogeneity. The EPS scenario yielded the most substantial increases in ecological sources,corridors, and pinchpoints, totaling 582.89 km^(2), 645.03 km^(2),and 64.43 km^(2), respectively. This study highlights the importance of EPS, offering insightful scientific guidance for the YRD's sustainable development.展开更多
The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecolo...The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecology research.This paper identifies the ecological source through the evaluation of the ecosystem service and ecosystem sensitivity of the Lanzhou-Xining(Lan-Xi)urban agglomeration.The minimum cumulative resistance(MCR)model modified by night light data NPP/VIIRS(National Polar-orbiting Operational Environmental Satellite System Preparatory Project/Visible Infrared Imaging Radiometer Suite)was used to measure the relative resistance of the materials and energy circulation between the source areas,and to establish the resistance surface of the ecological source area expansion.Then ecological corridors were identified based on ecological sources and resistance surface.The ecological strategic node is the ecological fragile point in the ecological corridors.The ecological strategic node is identified with hydrological module by superimposing the"ridge line"of cumulative ecological resistance with the ecological corridor.Combined with ecological sources,corridors and strategic nodes,the ESP of the Lan-Xi urban agglomeration can be constructed.The ecological source of the Lan-Xi urban agglomeration accounts for 28.42%of the total area,most of which is distributed within Qinghai Province.The nature reserves in the area are all located within the ecological source area.A total of 41 potential ecological corridors have been identified in the study area.The total length of the potential corridors is 1201.03 km,comprising 23 source corridors and 18 radiation corridors.There are 30 strategic nodes identified in the Lan-Xi urban agglomeration.These locations are the most vulnerable areas of the ecological corridors.Ecological engineering should be applied in the construction of corridors.Affected by the ecological source,the potential ecological corridor extends from the northwest to the southeast,which is basically consistent with the direction trend of the mountains in the region.展开更多
Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study ...Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study explored ecological planning and design of waterfront from the perspective of landscape security pattern,analyzed current waterfront in Xianghe County and construction of landscape security pattern for waterfront,provided a basis for the ecological planning and design of landscape.展开更多
Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so ...Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so as to optimize the distributions of rural settlement would be the key challenge for rural areas in ecologically fragile regions. From the perspective of maintaining regional ecological security, this paper takes Da’an City, a typical ecological fragile region in Jilin Province, as the case area, constructing the comprehensive ecological security pattern(ESP) on basis of landscape ecology, and applying the landscape pattern indexes to quantitative analysis the spatial distribution characteristics of rural settlements. Then, different optimization directions and management strategies are put forward for rural settlements in each secure zone under the comprehensive ESP. The experimental results showed that 1) the area of the low security zone, the general security zone, the moderate security zone and the extreme security zone was 1570.18 km^2, 1463.36 km^2, 1215.80 km^2 and 629.77 km^2, representing 32.18%, 29.99%, 24.92% and 12.91% of the total area of the target area, respectively. 2) The rural settlements in Da’an City were characterized by a high degree of fragmentation with a large number of small-scale patches. 3) The area of rural settlements in the ecological relocation zone, the in situ remediation zone, the limited development zone and the key development zone was 22.80 km^2, 42.31 km^2, 36.28 km^2 and 19.40 km^2, accounting for 18.88%, 35.03%, 30.04% and 16.06% of the total area of rural settlements, respectively. Then, different measures were proposed for settlements in different optimization zones in order to scientifically plan important ecological space, production space and living space in rural areas. This paper aims to provide fundamental support for rural settlements based on redistribution from the perspective of landscape ecology and provide insights for rural planning and rural habitat environmental improvement.展开更多
Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key mot...Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key motivating factor for embarking on this study. This study was necessitated by the damages and dangers posed by signature forgery coupled with the intractable nature of the problem. The aim and objectives of this study is to design a proactive and responsive system that could compare two signature samples and detect the correct signature against the forged one. Dynamic Signature verification is an important biometric technique that aims to detect whether a given signature is genuine or forged. In this research work, Convolutional Neural Networks (CNNsor ConvNet) which is a class of deep, feed forward artificial neural networks that has successfully been applied to analysing visual imagery was used to train the model. The signature images are stored in a file directory structure which the Keras Python library can work with. Then the CNN was implemented in python using the Keras with the TensorFlow backend to learn the patterns associated with the signature. The result showed that for the same CNNs-based network experimental result of average accuracy, the larger the training dataset, the higher the test accuracy. However, when the training dataset are insufficient, better results can be obtained. The paper concluded that by training datasets using CNNs network, 98% accuracy in the result was recorded, in the experimental part, the model achieved a high degree of accuracy in the classification of the biometric parameters used.展开更多
Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve rel...Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services.展开更多
Spring Security作为Web开发中十分重要的安全框架之一,常被用于Web应用的认证和授权。为了进一步了解SpringSecurity框架的设计和实现,加深对常见设计模式的理解,文章详细介绍了SpringSecurity框架中策略模式、代理模式、适配器模式、...Spring Security作为Web开发中十分重要的安全框架之一,常被用于Web应用的认证和授权。为了进一步了解SpringSecurity框架的设计和实现,加深对常见设计模式的理解,文章详细介绍了SpringSecurity框架中策略模式、代理模式、适配器模式、责任链模式、模板方法模式的运用,对上述设计模式的概念、基本原理、作用等进行描述,分析SpringSecurity中关键类库在设计模式中承担的作用及执行流程,为开发人员提供一定的学习参考。展开更多
A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organ...A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language.展开更多
With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and ...With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique.展开更多
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err...Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>展开更多
Low-slope hilly land( LSHL) refers to regions with relatively lower altitude,smaller topographic changes and gentler slopes. Exploitation and utilization of such areas is acting as an efficient approach to release the...Low-slope hilly land( LSHL) refers to regions with relatively lower altitude,smaller topographic changes and gentler slopes. Exploitation and utilization of such areas is acting as an efficient approach to release the intensity in land utilization for mountainous areas in China, and needs further study. By summarizing related domestic concepts regarding LSHL,and taking Lu County of Sichuan province as the sample,this paper defined the scope of LSHL and extracted a total coverage of 331. 71 km2 LSHL.Then based on the landscape ecological security patterns theory,we have established the landscape ecological security pattern of Lu County by the minimum cumulative resistance model,targeting to achieve ecological land protection. Moreover,LSHL of different landscape security levels is further classified through overlay analysis on the current utilization status of the LSHL. The LSHL is classified into four categories, including prioritized development type,moderate development type, limited development type and prohibited development type. Their scopes of areas are 108. 72,97. 03,68. 36 and 57. 60 km2 respectively. In addition,respective land utilization and exploitation plan for LSHL are proposed according to the analysis of characteristics of each type. The result has provided scientific references for the definition,establishment of landscape ecological security pattern as well as the appropriate exploitation and utilization of the LSHL.展开更多
A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed ba...A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed based on field programmable gate array (FPGA) platform. The principle of ultra-weak fiber Bragg grating high-speed demodulation and signal recognition method were analyzed theoretically, and the Support Vector Machine model was introduced to optimize the event recognition accuracy of the system. A perimeter security experimental system containing 1000 ultra-weak fiber Bragg gratings, ultra-weak fiber Bragg grating sense optical cables with a diameter of 2.0 mm and a reflectivity of 0.01%, steel space frames and demodulation equipments was built to recognize four typical events such as knocking, shaking, wind blowing and rainfall. The experimental resulted show that the system has a spatial resolution of 1m and an acquisition frequency of 200 Hz. The joint time-frequency domain detection method is used to achieve 99.2% alarm accuracy, and 98% recognition accuracy of two intrusion events, which has good anti-interference performance.展开更多
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o...As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.展开更多
The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study ...The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study area. The records of each crime incidence were geocoded. Microsoft Excel was used to collate and organise the crime entries before they were imported into the ArcGIS Pro 2.0 environment. A geodatabase was created where the spatial and aspatial data were encoded and geospatial analysis was performed. The study reveals that the crime distribution pattern is generally clustered with a Global Moran’s I index of 0.097, a Z-score of 1.87, and a P-value < 0.06. Furthermore, the study reveals that armed robbery (61), kidnapping (40), car theft (33), culpable homicide (31), rape (29), and robbery (13) cases rank the highest in crime rate. Equally, findings of the study show that Chaza, Kwamba, Madalla, Suleja central, and Gaboda are the major crime hotspot zones at 90% confidence, as analysed using the Getis-Ord Gi* (Hot spot analysis) spatial statistics tool in ArcGIS Pro 2.0. The research therefore recommends that more effort be put into fighting crime, especially in areas where there are low-security formations, as they mostly have the highest record of crimes committed. Also, the patrol units should be equipped with GPS for better surveillance and real-time tracking of criminal activities.展开更多
基金financially supported by the National Natural Science Foundation of China (Grant No. 41461011)。
文摘The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the region has witnessed significant land use/cover changes(LUCC), impacting ecosystem services(ES) and ecological security patterns(ESP). Investigating LUCC's effects on ES and ESP in the YRD is crucial for ecological security and sustainable development. This study utilized the PLUS model to simulate 2030 land use scenarios, including natural development(NDS), economic development(EDS), and ecological protection scenarios(EPS). Subsequently, the InVEST model and circuit theory were applied to assess ES and ESP under varying LUCC scenarios from 2010 to 2030. Findings indicate:(1) Notable LUCC from 2010 to 2030, marked by decreasing cropland and increasing construction land and water bodies.(2) From 2010 to 2020, improvements were observed in carbon storage,water yield, soil retention, and habitat quality, whereas 2020–2030 saw increases in water yield and soil retention but declines in habitat quality and carbon storage. Among the scenarios, EPS showed superior performance in all four ES.(3) Between 2010 and 2030, ecological sources, corridors, and pinchpoints expanded, displaying significant spatial heterogeneity. The EPS scenario yielded the most substantial increases in ecological sources,corridors, and pinchpoints, totaling 582.89 km^(2), 645.03 km^(2),and 64.43 km^(2), respectively. This study highlights the importance of EPS, offering insightful scientific guidance for the YRD's sustainable development.
基金funded by the Improvement Plan of Scientific Research Ability in Northwest Normal University(NWNU-LKQN2020-16)National Science Foundation of China(Grant No.41771130)。
文摘The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecology research.This paper identifies the ecological source through the evaluation of the ecosystem service and ecosystem sensitivity of the Lanzhou-Xining(Lan-Xi)urban agglomeration.The minimum cumulative resistance(MCR)model modified by night light data NPP/VIIRS(National Polar-orbiting Operational Environmental Satellite System Preparatory Project/Visible Infrared Imaging Radiometer Suite)was used to measure the relative resistance of the materials and energy circulation between the source areas,and to establish the resistance surface of the ecological source area expansion.Then ecological corridors were identified based on ecological sources and resistance surface.The ecological strategic node is the ecological fragile point in the ecological corridors.The ecological strategic node is identified with hydrological module by superimposing the"ridge line"of cumulative ecological resistance with the ecological corridor.Combined with ecological sources,corridors and strategic nodes,the ESP of the Lan-Xi urban agglomeration can be constructed.The ecological source of the Lan-Xi urban agglomeration accounts for 28.42%of the total area,most of which is distributed within Qinghai Province.The nature reserves in the area are all located within the ecological source area.A total of 41 potential ecological corridors have been identified in the study area.The total length of the potential corridors is 1201.03 km,comprising 23 source corridors and 18 radiation corridors.There are 30 strategic nodes identified in the Lan-Xi urban agglomeration.These locations are the most vulnerable areas of the ecological corridors.Ecological engineering should be applied in the construction of corridors.Affected by the ecological source,the potential ecological corridor extends from the northwest to the southeast,which is basically consistent with the direction trend of the mountains in the region.
基金Supported by National Natural Science Foundation(51208338)Research Funds of Humanities and Social Sciences of Ministry of Education(10YJCZH144)
文摘Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study explored ecological planning and design of waterfront from the perspective of landscape security pattern,analyzed current waterfront in Xianghe County and construction of landscape security pattern for waterfront,provided a basis for the ecological planning and design of landscape.
基金the auspices of the National Natural Science Foundation of China(No.41571152,41771179)the Social Science Foundation of Jilin Province,China(No.2019B56)。
文摘Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so as to optimize the distributions of rural settlement would be the key challenge for rural areas in ecologically fragile regions. From the perspective of maintaining regional ecological security, this paper takes Da’an City, a typical ecological fragile region in Jilin Province, as the case area, constructing the comprehensive ecological security pattern(ESP) on basis of landscape ecology, and applying the landscape pattern indexes to quantitative analysis the spatial distribution characteristics of rural settlements. Then, different optimization directions and management strategies are put forward for rural settlements in each secure zone under the comprehensive ESP. The experimental results showed that 1) the area of the low security zone, the general security zone, the moderate security zone and the extreme security zone was 1570.18 km^2, 1463.36 km^2, 1215.80 km^2 and 629.77 km^2, representing 32.18%, 29.99%, 24.92% and 12.91% of the total area of the target area, respectively. 2) The rural settlements in Da’an City were characterized by a high degree of fragmentation with a large number of small-scale patches. 3) The area of rural settlements in the ecological relocation zone, the in situ remediation zone, the limited development zone and the key development zone was 22.80 km^2, 42.31 km^2, 36.28 km^2 and 19.40 km^2, accounting for 18.88%, 35.03%, 30.04% and 16.06% of the total area of rural settlements, respectively. Then, different measures were proposed for settlements in different optimization zones in order to scientifically plan important ecological space, production space and living space in rural areas. This paper aims to provide fundamental support for rural settlements based on redistribution from the perspective of landscape ecology and provide insights for rural planning and rural habitat environmental improvement.
文摘Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key motivating factor for embarking on this study. This study was necessitated by the damages and dangers posed by signature forgery coupled with the intractable nature of the problem. The aim and objectives of this study is to design a proactive and responsive system that could compare two signature samples and detect the correct signature against the forged one. Dynamic Signature verification is an important biometric technique that aims to detect whether a given signature is genuine or forged. In this research work, Convolutional Neural Networks (CNNsor ConvNet) which is a class of deep, feed forward artificial neural networks that has successfully been applied to analysing visual imagery was used to train the model. The signature images are stored in a file directory structure which the Keras Python library can work with. Then the CNN was implemented in python using the Keras with the TensorFlow backend to learn the patterns associated with the signature. The result showed that for the same CNNs-based network experimental result of average accuracy, the larger the training dataset, the higher the test accuracy. However, when the training dataset are insufficient, better results can be obtained. The paper concluded that by training datasets using CNNs network, 98% accuracy in the result was recorded, in the experimental part, the model achieved a high degree of accuracy in the classification of the biometric parameters used.
文摘Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services.
基金"China National Science Foundation"under grant No: 2001AA412010
文摘A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language.
文摘With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique.
文摘Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span>
基金National Natural Science Foundation of China(No.41401198)Soft Science Research Program in Sichuan Province,China(No.2015ZR0121)Scientific Research Project of Land and Resources Department of Sichuan Province,China(No.KJ-2015-5)
文摘Low-slope hilly land( LSHL) refers to regions with relatively lower altitude,smaller topographic changes and gentler slopes. Exploitation and utilization of such areas is acting as an efficient approach to release the intensity in land utilization for mountainous areas in China, and needs further study. By summarizing related domestic concepts regarding LSHL,and taking Lu County of Sichuan province as the sample,this paper defined the scope of LSHL and extracted a total coverage of 331. 71 km2 LSHL.Then based on the landscape ecological security patterns theory,we have established the landscape ecological security pattern of Lu County by the minimum cumulative resistance model,targeting to achieve ecological land protection. Moreover,LSHL of different landscape security levels is further classified through overlay analysis on the current utilization status of the LSHL. The LSHL is classified into four categories, including prioritized development type,moderate development type, limited development type and prohibited development type. Their scopes of areas are 108. 72,97. 03,68. 36 and 57. 60 km2 respectively. In addition,respective land utilization and exploitation plan for LSHL are proposed according to the analysis of characteristics of each type. The result has provided scientific references for the definition,establishment of landscape ecological security pattern as well as the appropriate exploitation and utilization of the LSHL.
文摘A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed based on field programmable gate array (FPGA) platform. The principle of ultra-weak fiber Bragg grating high-speed demodulation and signal recognition method were analyzed theoretically, and the Support Vector Machine model was introduced to optimize the event recognition accuracy of the system. A perimeter security experimental system containing 1000 ultra-weak fiber Bragg gratings, ultra-weak fiber Bragg grating sense optical cables with a diameter of 2.0 mm and a reflectivity of 0.01%, steel space frames and demodulation equipments was built to recognize four typical events such as knocking, shaking, wind blowing and rainfall. The experimental resulted show that the system has a spatial resolution of 1m and an acquisition frequency of 200 Hz. The joint time-frequency domain detection method is used to achieve 99.2% alarm accuracy, and 98% recognition accuracy of two intrusion events, which has good anti-interference performance.
文摘As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.
文摘The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study area. The records of each crime incidence were geocoded. Microsoft Excel was used to collate and organise the crime entries before they were imported into the ArcGIS Pro 2.0 environment. A geodatabase was created where the spatial and aspatial data were encoded and geospatial analysis was performed. The study reveals that the crime distribution pattern is generally clustered with a Global Moran’s I index of 0.097, a Z-score of 1.87, and a P-value < 0.06. Furthermore, the study reveals that armed robbery (61), kidnapping (40), car theft (33), culpable homicide (31), rape (29), and robbery (13) cases rank the highest in crime rate. Equally, findings of the study show that Chaza, Kwamba, Madalla, Suleja central, and Gaboda are the major crime hotspot zones at 90% confidence, as analysed using the Getis-Ord Gi* (Hot spot analysis) spatial statistics tool in ArcGIS Pro 2.0. The research therefore recommends that more effort be put into fighting crime, especially in areas where there are low-security formations, as they mostly have the highest record of crimes committed. Also, the patrol units should be equipped with GPS for better surveillance and real-time tracking of criminal activities.