As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa...As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.展开更多
Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with...Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with 11 participants, refugee women residing in the state of Rio de Janeiro, Brazil. Results: The meanings and feelings evidenced in the life narratives of refugee women expressed the insecurities and weaknesses with food in the resettlement. Final Considerations: Given the meanings and feelings regarding food in the refuge, it is expected that the present study will contribute to the elaboration of new action plans and intersectoral public policies of agile action to meet the demands of the refugee population, in the attempt to mitigate starvation, poverty, social differences and the compromised health status of the refugee population.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavio...The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavior of vulnerability with respect to time will give us a great advantage. Such understanding will help us to avoid exploitations and introduce patches for a particular vulnerability before the attacker takes the advantage. Utilizing the proposed model one can identify the risk factor of a specific vulnerability being exploited as a function of time. Measuring of the risk factor of a given vulnerability will also help to improve the security level of software and to make appropriate decisions to patch the vulnerability before an exploitation takes place.展开更多
AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed m...AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed mood. METHODS: Participants were 67 patients diagnosed with International Classification of Diseases, Tenth edition AJD with depressed mood, who completed standardised self-report questionnaires measuring study variables. Mean scores and SDs were computed for the outcome and predictor measures. Pearson correlations among the measures were computed. The study hypotheses were tested using analysis of variance(ANOVA) and multiple regression analyses. All analyses were performed using the SPSS-17 software package(SPSS Inc., Chicago, IL, United States).RESULTS: ANOVA showed a significant main effect of the insecure attachment styles on depression symptom severity and life satisfaction scores. The results suggestthat depressive symptoms were more severe(F = 4.13, df = 2.67, P < 0.05) and life satisfaction was poorer(F = 5.69, df = 2.67, P < 0.01) in both anxious-ambivalently and avoidantly attached patients compared with their securely attached counterparts, whereas the two insecure groups did not significantly differ by these variables. The anxious/ambivalent attachment style and depression symptom severity significantly contributed to HRQo L, accounting for 21.4% and 29.7% of the total variance, respectively [R2 = 0.79; Adjusted R2 = 0.77; F(5, 67) = 33.68, P < 0.0001], even after controlling for gender, marital and employment status confounders.CONCLUSION: The results show that the anxious/ambivalent attachment style together with depression symptom severity substantially and independently predict the HRQo L outcome in AJD with depressed mood.展开更多
To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in t...To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in the world, has great significance. Through deep investigation in ten cities, the thesis has normatively evaluated current situations, characteristics, advantages and disadvantages of basic life security program for land-expropriated farmers in Zhejiang. Furthermore, it put forward some academic suggestions to further perfect and improve the system.展开更多
Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average tha...Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average than their food secure counterparts. Since the Great Recession, more attention has been given to the topic of hunger and food insecurity among college students;however, the literature still lacks a comprehensive examination of various issues facing today’s college students. Using a multi-systems life course (MSLC) perspective, this paper provides a conceptual explanation of the lived experience of college students by offering a better understanding of the unique challenges faced by this population. Findings from this study will assist researchers, practitioners, and university administrators in their efforts to address hunger among this population.展开更多
Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrat...Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.展开更多
The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Rece...The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.展开更多
Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing s...Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.展开更多
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user...The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.展开更多
Objective: Improvement in cancer survival over recent decades has not been accompanied by a narrowing of socioeconomic disparities. This study aimed to quantify the loss of life expectancy(LOLE) resulting from a cance...Objective: Improvement in cancer survival over recent decades has not been accompanied by a narrowing of socioeconomic disparities. This study aimed to quantify the loss of life expectancy(LOLE) resulting from a cancer diagnosis and examine disparities in LOLE based on area-level socioeconomic status(SES).Methods: Data were collected for all people between 50 and 89 years of age who were diagnosed with cancer, registered in the NSW Cancer Registry between 2001 and 2019, and underwent mortality follow-up evaluations until December 2020. Flexible parametric survival models were fitted to estimate the LOLE by gender and area-level SES for 12 common cancers.Results: Of 422,680 people with cancer, 24% and 18% lived in the most and least disadvantaged areas, respectively. Patients from the most disadvantaged areas had a significantly greater average LOLE than patients from the least disadvantaged areas for cancers with high survival rates, including prostate [2.9 years(95% CI: 2.5±3.2 years) vs. 1.6 years(95% CI: 1.3±1.9 years)] and breast cancer [1.6 years(95% CI: 1.4±1.8 years) vs. 1.2 years(95% CI: 1.0±1.4 years)]. The highest average LOLE occurred in males residing in the most disadvantaged areas with pancreatic [16.5 years(95% CI: 16.1±16.8 years) vs. 16.2 years(95% CI: 15.7±16.7 years)] and liver cancer [15.5 years(95% CI: 15.0±16.0 years) vs. 14.7 years(95% CI: 14.0±15.5 years)]. Females residing in the least disadvantaged areas with thyroid cancer [0.9 years(95% CI: 0.4±1.4 years) vs. 0.6 years(95% CI: 0.2±1.0 years)] or melanoma [0.9 years(95% CI: 0.8±1.1 years) vs. 0.7 years(95% CI: 0.5±0.8 years)] had the lowest average LOLE.Conclusions: Patients from the most disadvantaged areas had the highest LOLE with SES-based differences greatest for patients diagnosed with cancer at an early stage or cancers with higher survival rates, suggesting the need to prioritise early detection and reduce treatment-related barriers and survivorship challenges to improve life expectancy.展开更多
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia...The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication.展开更多
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
Context: Kidney transplantation is today the standard treatment for patients suffering from chronic end-stage renal failure. Living kidney donation offers many advantages for the recipient, but requires a subject with...Context: Kidney transplantation is today the standard treatment for patients suffering from chronic end-stage renal failure. Living kidney donation offers many advantages for the recipient, but requires a subject without comorbidities to undergo surgery. The aim of this study was to assess the quality of life and psychosocial experience of living kidney donors after donation. Methods: This was a cross-sectional study with an analytical aim, involving living kidney donors during the period from January 2016 to April 2019 at CHUGA. (University Hospital Center of Grenoble Alpes in France). Results: Our study shows that out of 88 donors, 70 responded to our questionnaires, representing a prevalence of 80.5%. The average age of our donors was 55.6 years with a female predominance. Seven out of eight domains of the SF36 score had a good quality of life after donation and the donation did not alter their psychosocial experience. The majority of our donors expressed their pride and enthusiasm, did not regret having saved a life, and this experience was considered positive. Conclusion: Kidney donation does not have a negative impact on quality of life and psychosocial life. The majority of donors do not regret their donation. The dissemination of such results could make it possible to increase the number of kidney transplants from living donors in France, especially in our African countries where the management of ESRD remains a real public health problem.展开更多
Objective: To analyze the impact of combined Watson care theory intervention on the psychological state and quality of life in patients with terminal lung cancer. Methods: 72 patients with terminal lung cancer admitte...Objective: To analyze the impact of combined Watson care theory intervention on the psychological state and quality of life in patients with terminal lung cancer. Methods: 72 patients with terminal lung cancer admitted from March 2021 to January 2024 were selected, which were divided into research group (life review combined with Watson care theory intervention) and control group (conventional intervention), with 36 cases each. Compare the nursing effect between the two groups. Results: The anxiety self-rating scale (SAS) and depression self-rating scale (SDS) scores were significantly lower than those of the control group, and the quality of life score was significantly higher than that of the control group (P < 0.05). Conclusion: Life review combined with Watson care theory intervention can improve the psychological state and improve the quality of life of patients with terminal lung cancer.展开更多
BACKGROUND The quality-adjusted life year(QALY)is a metric that is increasingly used today in the field of health economics to evaluate the value of different medical treatments and procedures.Surgical waiting lists(S...BACKGROUND The quality-adjusted life year(QALY)is a metric that is increasingly used today in the field of health economics to evaluate the value of different medical treatments and procedures.Surgical waiting lists(SWLs)represent a pressing problem in public healthcare.The QALY measure has rarely been used in the context of surgery.It would be interesting to know how many QALYs are lost by patients on SWLs.AIM To investigate the relationship between QALYs and SWLs in a systematic review of the scientific literature.METHODS The study was conducted in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Statement.An unlimited search was carried out in PubMed,updated on January 19,2024.Data on the following variables were investigated and analyzed:Specialty,country of study,procedure under study,scale used to measure QALYs,the use of a theoretical or real-life model,objectives of the study and items measured,the economic value assigned to the QALY in the country in question,and the results and conclusions published.RESULTS Forty-eight articles were selected for the study.No data were found regarding QALYs lost on SWLs.The specialties in which QALYs were studied the most in relation to the waiting list were urology and general surgery,with 15 articles each.The country in which the most studies of QALYs were carried out was the United States(n=21),followed by the United Kingdom(n=9)and Canada(n=7).The most studied procedure was organ transplantation(n=39),including 15 kidney,14 liver,5 heart,4 lung,and 1 intestinal.Arthroplasty(n=4),cataract surgery(n=2),bariatric surgery(n=1),mosaicplasty(n=1),and septoplasty(n=1)completed the surgical interventions included.Thirty-nine of the models used were theoretical(the most frequently applied being the Markov model,n=34),and nine were real-life.The survey used to measure quality of life in 11 articles was the European Quality of Life-5 dimensions,but in 32 articles the survey was not specified.The willingness-to-pay per QALY gained ranged from$100000 in the United States to€20000 in Spain.CONCLUSION The relationship between QALYs and SWLs has only rarely been studied in the literature.The rate of QALYs lost on SWLs has not been determined.Future research is warranted to address this issue.展开更多
In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding ...In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s.展开更多
Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algori...Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.展开更多
文摘As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.
文摘Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with 11 participants, refugee women residing in the state of Rio de Janeiro, Brazil. Results: The meanings and feelings evidenced in the life narratives of refugee women expressed the insecurities and weaknesses with food in the resettlement. Final Considerations: Given the meanings and feelings regarding food in the refuge, it is expected that the present study will contribute to the elaboration of new action plans and intersectoral public policies of agile action to meet the demands of the refugee population, in the attempt to mitigate starvation, poverty, social differences and the compromised health status of the refugee population.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavior of vulnerability with respect to time will give us a great advantage. Such understanding will help us to avoid exploitations and introduce patches for a particular vulnerability before the attacker takes the advantage. Utilizing the proposed model one can identify the risk factor of a specific vulnerability being exploited as a function of time. Measuring of the risk factor of a given vulnerability will also help to improve the security level of software and to make appropriate decisions to patch the vulnerability before an exploitation takes place.
基金Supported by(in part)The Ministry of Immigrant Absorption to Dr.Ponizovsky AM
文摘AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed mood. METHODS: Participants were 67 patients diagnosed with International Classification of Diseases, Tenth edition AJD with depressed mood, who completed standardised self-report questionnaires measuring study variables. Mean scores and SDs were computed for the outcome and predictor measures. Pearson correlations among the measures were computed. The study hypotheses were tested using analysis of variance(ANOVA) and multiple regression analyses. All analyses were performed using the SPSS-17 software package(SPSS Inc., Chicago, IL, United States).RESULTS: ANOVA showed a significant main effect of the insecure attachment styles on depression symptom severity and life satisfaction scores. The results suggestthat depressive symptoms were more severe(F = 4.13, df = 2.67, P < 0.05) and life satisfaction was poorer(F = 5.69, df = 2.67, P < 0.01) in both anxious-ambivalently and avoidantly attached patients compared with their securely attached counterparts, whereas the two insecure groups did not significantly differ by these variables. The anxious/ambivalent attachment style and depression symptom severity significantly contributed to HRQo L, accounting for 21.4% and 29.7% of the total variance, respectively [R2 = 0.79; Adjusted R2 = 0.77; F(5, 67) = 33.68, P < 0.0001], even after controlling for gender, marital and employment status confounders.CONCLUSION: The results show that the anxious/ambivalent attachment style together with depression symptom severity substantially and independently predict the HRQo L outcome in AJD with depressed mood.
基金This project was supported by China Postdoctoral Science Foundation(2003034067) and Ministry of Education Philosophy and Social Science Importance Program of China. Thanks Mr. Naizhong Huang and Mr. Yongshui Zhou, the division chief of rural life security in the Department of Zhejiang Labor and Social Security for their support.
文摘To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in the world, has great significance. Through deep investigation in ten cities, the thesis has normatively evaluated current situations, characteristics, advantages and disadvantages of basic life security program for land-expropriated farmers in Zhejiang. Furthermore, it put forward some academic suggestions to further perfect and improve the system.
文摘Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average than their food secure counterparts. Since the Great Recession, more attention has been given to the topic of hunger and food insecurity among college students;however, the literature still lacks a comprehensive examination of various issues facing today’s college students. Using a multi-systems life course (MSLC) perspective, this paper provides a conceptual explanation of the lived experience of college students by offering a better understanding of the unique challenges faced by this population. Findings from this study will assist researchers, practitioners, and university administrators in their efforts to address hunger among this population.
文摘Global and international security cannot be provided from a single point or a set of separate points whatever powerful these might be(even with quantum supercomputers!).It should rather be deeply embedded and integrated with bodies of real systems wherever in physical,virtual,or combined spaces they may exist.So global security capabilities should not only be distributed,but rather be really spatial,self-organized,and dynamic,also exhibiting overall integrity,awareness,and consciousness features.The paper describes applicability of the patented and revealed in 10 books Spatial Grasp Model and Technology(SGT)and its basic Spatial Grasp Language(SGL)which conceptually and functionally match security problems of large distributed and heterogeneous systems.It investigates very practical security solutions for finding and tracing distribution of forbidden items,world roaming criminals,recovery from natural and human-made disasters,tracing and elimination of moving dangerous objects in terrestrial and celestial spaces,as well as analysis and restoration of damaged transport networks.It advises how different security infrastructures can be organized and managed,and how to cooperate and integrate within global security systems with higher awareness and consciousness levels over them.The provided security-oriented version of SGL can be quickly implemented and integrated with existing distributed management and security systems.
基金supported by the Research Program funded by the SeoulTech(Seoul National University of Science and Technology).
文摘The emergence of various technologies such as terahertz communications,Reconfigurable Intelligent Surfaces(RIS),and AI-powered communication services will burden network operators with rising infrastructure costs.Recently,the Open Radio Access Network(O-RAN)has been introduced as a solution for growing financial and operational burdens in Beyond 5G(B5G)and 6G networks.O-RAN promotes openness and intelligence to overcome the limitations of traditional RANs.By disaggregating conventional Base Band Units(BBUs)into O-RAN Distributed Units(O-DU)and O-RAN Centralized Units(O-CU),O-RAN offers greater flexibility for upgrades and network automation.However,this openness introduces new security challenges compared to traditional RANs.Many existing studies overlook these security requirements of the O-RAN networks.To gain deeper insights into the O-RAN system and security,this paper first provides an overview of the general O-RAN architecture and its diverse use cases relevant to B5G and 6G applications.We then delve into specifications of O-RAN security threats and requirements,aiming to mitigate security vulnerabilities effectively.By providing a comprehensive understanding of O-RAN architecture,use cases,and security considerations,thisworkserves as a valuable resource for future research in O-RAN and its security.
基金funded by the European Union’s Horizon 2020 Research and Innovation Programme under the Marie Skłodowska-Curie Action(MSCA)grant agreement No.101109961.
文摘Videos represent the most prevailing form of digital media for communication,information dissemination,and monitoring.However,theirwidespread use has increased the risks of unauthorised access andmanipulation,posing significant challenges.In response,various protection approaches have been developed to secure,authenticate,and ensure the integrity of digital videos.This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality,integrity,and availability of video content,and examining how it can be manipulated.It then investigates current developments in the field of video security by exploring two critical research questions.First,it examine the techniques used by adversaries to compromise video data and evaluate their impact.Understanding these attack methodologies is crucial for developing effective defense mechanisms.Second,it explores the various security approaches that can be employed to protect video data,enhancing its transparency,integrity,and trustworthiness.It compares the effectiveness of these approaches across different use cases,including surveillance,video on demand(VoD),and medical videos related to disease diagnostics.Finally,it identifies potential research opportunities to enhance video data protection in response to the evolving threat landscape.Through this investigation,this study aims to contribute to the ongoing efforts in securing video data,providing insights that are vital for researchers,practitioners,and policymakers dedicated to enhancing the safety and reliability of video content in our digital world.
文摘The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.
基金supported by National Health and Research Council of Australia Leadership Investigator Grants (NHMRCAPP1194679)+1 种基金the ACPCC has received equipment and a funding contribution from Roche Molecular Diagnostics USAco-PI on a major implementation programme Elimination of Cervical Cancer in the Western Pacific,which has received support from the Minderoo Foundation。
文摘Objective: Improvement in cancer survival over recent decades has not been accompanied by a narrowing of socioeconomic disparities. This study aimed to quantify the loss of life expectancy(LOLE) resulting from a cancer diagnosis and examine disparities in LOLE based on area-level socioeconomic status(SES).Methods: Data were collected for all people between 50 and 89 years of age who were diagnosed with cancer, registered in the NSW Cancer Registry between 2001 and 2019, and underwent mortality follow-up evaluations until December 2020. Flexible parametric survival models were fitted to estimate the LOLE by gender and area-level SES for 12 common cancers.Results: Of 422,680 people with cancer, 24% and 18% lived in the most and least disadvantaged areas, respectively. Patients from the most disadvantaged areas had a significantly greater average LOLE than patients from the least disadvantaged areas for cancers with high survival rates, including prostate [2.9 years(95% CI: 2.5±3.2 years) vs. 1.6 years(95% CI: 1.3±1.9 years)] and breast cancer [1.6 years(95% CI: 1.4±1.8 years) vs. 1.2 years(95% CI: 1.0±1.4 years)]. The highest average LOLE occurred in males residing in the most disadvantaged areas with pancreatic [16.5 years(95% CI: 16.1±16.8 years) vs. 16.2 years(95% CI: 15.7±16.7 years)] and liver cancer [15.5 years(95% CI: 15.0±16.0 years) vs. 14.7 years(95% CI: 14.0±15.5 years)]. Females residing in the least disadvantaged areas with thyroid cancer [0.9 years(95% CI: 0.4±1.4 years) vs. 0.6 years(95% CI: 0.2±1.0 years)] or melanoma [0.9 years(95% CI: 0.8±1.1 years) vs. 0.7 years(95% CI: 0.5±0.8 years)] had the lowest average LOLE.Conclusions: Patients from the most disadvantaged areas had the highest LOLE with SES-based differences greatest for patients diagnosed with cancer at an early stage or cancers with higher survival rates, suggesting the need to prioritise early detection and reduce treatment-related barriers and survivorship challenges to improve life expectancy.
文摘The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication.
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
文摘Context: Kidney transplantation is today the standard treatment for patients suffering from chronic end-stage renal failure. Living kidney donation offers many advantages for the recipient, but requires a subject without comorbidities to undergo surgery. The aim of this study was to assess the quality of life and psychosocial experience of living kidney donors after donation. Methods: This was a cross-sectional study with an analytical aim, involving living kidney donors during the period from January 2016 to April 2019 at CHUGA. (University Hospital Center of Grenoble Alpes in France). Results: Our study shows that out of 88 donors, 70 responded to our questionnaires, representing a prevalence of 80.5%. The average age of our donors was 55.6 years with a female predominance. Seven out of eight domains of the SF36 score had a good quality of life after donation and the donation did not alter their psychosocial experience. The majority of our donors expressed their pride and enthusiasm, did not regret having saved a life, and this experience was considered positive. Conclusion: Kidney donation does not have a negative impact on quality of life and psychosocial life. The majority of donors do not regret their donation. The dissemination of such results could make it possible to increase the number of kidney transplants from living donors in France, especially in our African countries where the management of ESRD remains a real public health problem.
文摘Objective: To analyze the impact of combined Watson care theory intervention on the psychological state and quality of life in patients with terminal lung cancer. Methods: 72 patients with terminal lung cancer admitted from March 2021 to January 2024 were selected, which were divided into research group (life review combined with Watson care theory intervention) and control group (conventional intervention), with 36 cases each. Compare the nursing effect between the two groups. Results: The anxiety self-rating scale (SAS) and depression self-rating scale (SDS) scores were significantly lower than those of the control group, and the quality of life score was significantly higher than that of the control group (P < 0.05). Conclusion: Life review combined with Watson care theory intervention can improve the psychological state and improve the quality of life of patients with terminal lung cancer.
文摘BACKGROUND The quality-adjusted life year(QALY)is a metric that is increasingly used today in the field of health economics to evaluate the value of different medical treatments and procedures.Surgical waiting lists(SWLs)represent a pressing problem in public healthcare.The QALY measure has rarely been used in the context of surgery.It would be interesting to know how many QALYs are lost by patients on SWLs.AIM To investigate the relationship between QALYs and SWLs in a systematic review of the scientific literature.METHODS The study was conducted in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses Statement.An unlimited search was carried out in PubMed,updated on January 19,2024.Data on the following variables were investigated and analyzed:Specialty,country of study,procedure under study,scale used to measure QALYs,the use of a theoretical or real-life model,objectives of the study and items measured,the economic value assigned to the QALY in the country in question,and the results and conclusions published.RESULTS Forty-eight articles were selected for the study.No data were found regarding QALYs lost on SWLs.The specialties in which QALYs were studied the most in relation to the waiting list were urology and general surgery,with 15 articles each.The country in which the most studies of QALYs were carried out was the United States(n=21),followed by the United Kingdom(n=9)and Canada(n=7).The most studied procedure was organ transplantation(n=39),including 15 kidney,14 liver,5 heart,4 lung,and 1 intestinal.Arthroplasty(n=4),cataract surgery(n=2),bariatric surgery(n=1),mosaicplasty(n=1),and septoplasty(n=1)completed the surgical interventions included.Thirty-nine of the models used were theoretical(the most frequently applied being the Markov model,n=34),and nine were real-life.The survey used to measure quality of life in 11 articles was the European Quality of Life-5 dimensions,but in 32 articles the survey was not specified.The willingness-to-pay per QALY gained ranged from$100000 in the United States to€20000 in Spain.CONCLUSION The relationship between QALYs and SWLs has only rarely been studied in the literature.The rate of QALYs lost on SWLs has not been determined.Future research is warranted to address this issue.
基金the deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number(IFP-2022-34).
文摘In the cloud environment,ensuring a high level of data security is in high demand.Data planning storage optimization is part of the whole security process in the cloud environment.It enables data security by avoiding the risk of data loss and data overlapping.The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient.In our work,we propose a data scheduling model for the cloud environment.Themodel is made up of three parts that together help dispatch user data flow to the appropriate cloudVMs.The first component is the Collector Agent whichmust periodically collect information on the state of the network links.The second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the scheduler.The third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable paths.It should be noted that each part of the proposedmodel requires the development of its algorithms.In this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link state.These algorithms are based on the grouping of transmitted files and the iterative method.The proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)problem.The experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s.
文摘Cyber Defense is becoming a major issue for every organization to keep business continuity intact.The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm(ABC)as an Nature Inspired Cyber Security mechanism to achieve adaptive defense.It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node.Businesses today have adapted their service distribution models to include the use of the Internet,allowing them to effectively manage and interact with their customer data.This shift has created an increased reliance on online services to store vast amounts of confidential customer data,meaning any disruption or outage of these services could be disastrous for the business,leaving them without the knowledge to serve their customers.Adversaries can exploit such an event to gain unauthorized access to the confidential data of the customers.The proposed algorithm utilizes an Adaptive Defense approach to continuously select nodes that could present characteristics of a probable malicious entity.For any changes in network parameters,the cluster of nodes is selected in the prepared solution set as a probable malicious node and the traffic rate with the ratio of packet delivery is managed with respect to the properties of normal nodes to deliver a disaster recovery plan for potential businesses.