This paper analyzes and compares the key factors influencing food security in two populous countries(China and India),and cate-gorizes them into three types:agricultural production,economic development and income leve...This paper analyzes and compares the key factors influencing food security in two populous countries(China and India),and cate-gorizes them into three types:agricultural production,economic development and income level,and income distribution.Using the prevalence of undernourishment as an indicator of food security,the paper empirically tests the degree of impact of various factors on food security in both countries using Tobit regression and Newey regression methods.The study finds that improving the level of economic development can significantly enhance food security in both countriesꎻreducing the Gini coefficient has a significant impact on India,but not on Chinaꎻincreasing the agricultural production per capita has a much greater effect on China than on India.Therefore,both countries should take measures that are both similar and different according to their national conditions to improve their food security level.展开更多
Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situatio...Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hosp...BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hospitalization costs and structure,and explored the impact of China Healthcare Security Diagnosis Related Groups(CHS-DRG)management on patient costs.It aimed to provide medical institutions with ways to reduce costs,optimize cost structures,reduce patient burden,and improve service efficiency.AIM To study the CHS-DRG payment system’s impact on breast cancer surgery costs.METHODS Using the CHS-DRG(version 1.1)grouping criteria,4073 patients,who underwent the radical resection of breast malignant tumors from January to December 2023,were included in the JA29 group;1028 patients were part of the CHS-DRG payment system,unlike the rest.Through an independent sample t-test,the length of hospital stay as well as total hospitalization,medicine and consumables,medical,nursing,medical technology,and management expenses were compared.Pearson’s correlation coefficient was used to test the cost correlation.RESULTS In terms of hospitalization expenses,patients in the CHS-DRG payment group had lower medical,nursing,and management expenses than those in the diagnosis-related group(DRG)non-payment group.For patients in the DRG payment group,the factors affecting the total hospitalization cost,in descending order of relevance,were medicine and consumable costs,consumable costs,medicine costs,medical costs,medical technology costs,management costs,nursing costs,and length of hospital stay.For patients in the DRG nonpayment group,the factors affecting the total hospitalization expenses in descending order of relevance were medicines and consumable expenses,consumable expenses,medical technology expenses,the cost of medicines,medical expenses,nursing expenses,length of hospital stay,and management expenses.CONCLUSION The CHS-DRG system can help control and reduce unnecessary medical expenses by controlling medicine costs,medical consumable costs,and the length of hospital stay while ensuring medical safety.展开更多
BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers account...BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers accounted for the highest number of new cases.Real-world data(RWD)is now widely preferred to traditional clinical trials in various fields of medicine and healthcare,as the traditional research approach often involves highly selected populations and interventions and controls that are strictly regulated.Additionally,research results from the RWD match global reality better than those from traditional clinical trials.AIM To analyze the cost disparity between surgical treatments for liver and pancreatic cancer under various factors.METHODS This study analyzed RWD 1137 cases within the HB1 group(patients who underwent pancreatectomy,hepatectomy,and/or shunt surgery)in 2023.It distinguished different expenditure categories,including medical,nursing,technical,management,drug,and consumable costs.Additionally,it assessed the contribution of each expenditure category to total hospital costs and performed cross-group comparisons using the non-parametric Kruskal–Wallis test.This study used the Steel–Dwass test for post-hoc multiple comparisons and the Spearman correlation coefficient to examine the relationships between variables.RESULTS The study found that in HB11 and HB13,the total hospitalization costs were significantly higher for pancreaticoduodenectomy than for pancreatectomy and hepatectomy.Although no significant difference was observed in the length of hospital stay between patients who underwent pancreaticoduodenectomy and pancreatectomy,both were significantly longer than those who underwent liver resection.In HB15,no significant difference was observed in the total cost of hospitalization between pancreaticoduodenectomy and pancreatectomy;however,both were significantly higher than those in hepatectomy.Additionally,the length of hospital stay was significantly longer for patients who underwent pancreaticoduodenectomy than for those who underwent pancreatectomy or liver resection.CONCLUSION China Healthcare Security Diagnosis Related Groups payment system positively impacts liver and pancreatic cancer surgeries by improving medical quality and controlling costs.Further research could refine this grouping system and ensure continuous effectiveness and sustainability.展开更多
To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take ti...To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take timely and proper countermeasures. In my personal view, two principles should be taken into consideration. The first principle is展开更多
The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated netw...The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes.展开更多
In the rural areas where most of the world's hungry people live, women produce most of the locally consumed food. Their contribution could be much greater if they had equal access to essential resources and services,...In the rural areas where most of the world's hungry people live, women produce most of the locally consumed food. Their contribution could be much greater if they had equal access to essential resources and services, such as land, credit, and training. In Sudan, women have always been active in agriculture and food security, constituting 17% to agricultural labor force. However, culture coupled with imperfections of official data underestimates their contribution. Accordingly, this study was carried out in the western part of Sudan, namely, North Kordofan State in order to identify and assess the role of women in agriculture and food security and identify the main factors and constraints affecting their contribution to agricultural production in the state. The findings confirm that women contribute 74% to the monthly agricultural income, 65% to total income, 62% to the labor work, and 65% to the household activities. Their average daily working hours are 14, while, those of men are only 8. The study suggests that the removal of the obstacles those women face could increase their contribution to and enhances the livelihood of the people in the state. Hence, a review to the relevant government policies is needed, so that women are empowered by improving their access to resources and credit.展开更多
This article discusses the security of the NGN service platform in terms of the open service interface and service deployment. It thinks that security of the open service interface can be solved by adding the service ...This article discusses the security of the NGN service platform in terms of the open service interface and service deployment. It thinks that security of the open service interface can be solved by adding the service access gateway and service management platform. The service access gateway provides security features to the open service interface concerning ID authentication, authorization, audit, encryption and integrity protection. For service deployment, its security can be solved by issuing related user digital certificates, deploying a firewall or an intrusion detection system, implementing load control, managing users' home location and displaying users' real-time IP addresses.展开更多
In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. The...In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS.展开更多
The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological securit...The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological security dynamic monitoring,ecological security appraisal,ecological security forecast and ecological security decision-making management. The synthetic evaluation indicator system of the ecological security quality were initially established,which includes ecological environment pollution,land use and land cover change,geological hazard and epidemic outbreaks. At the same time,29 evaluating indicators were selected,divides into the basic factors,response factors and inducing factors,which need to be Real-time monitored.展开更多
The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as seriou...The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as serious social crimes The first was from terrorist threat, and the global Jihad network in Eurasia was looming in the early 21st century, which was guided by radical ideologies; the second threat was from ethnic separatist groups; the third threat was related with foreign personnel and diplomats' security; the fourth threat was from mass disturbances, and the fifth was from serious social crimes. China's measures to these potential multi-faceted challenges were serious and various, including preventing terrorist attacks through international cooperation, lessening ethnic separatists' dissatisfaction and avoiding possible mass demonstration, reducing the chance of domestic mass disturbances, guaranteeing public transportation and aerospace security, making extensive use of advanced technologies and referring to other countries' expertise in security check, seeking help from other provinces bordering Shanghai, and strengthening control over explosive materials, etc.. Nevertheless, the efficacy of the above-mentioned countermeasures was problematic, for they were more defensive than offensive, more passive than proactive, and more tactical than strategic.展开更多
Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs ...Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs to curb various NTS threats, given a countryslimited resources and capacities? By raising thought-provoking questions, the author triesto explain the perplexity concerning NTS issues, arguing that NTS is important in economic,political and security sense, but that more efforts are needed from the academics in order toreach a consensus in understanding and dealing with NTS issues.展开更多
基金Supported by the MOE(Ministry of Education in China)Project of Humanities and Social Sciences(19YJA790105).
文摘This paper analyzes and compares the key factors influencing food security in two populous countries(China and India),and cate-gorizes them into three types:agricultural production,economic development and income level,and income distribution.Using the prevalence of undernourishment as an indicator of food security,the paper empirically tests the degree of impact of various factors on food security in both countries using Tobit regression and Newey regression methods.The study finds that improving the level of economic development can significantly enhance food security in both countriesꎻreducing the Gini coefficient has a significant impact on India,but not on Chinaꎻincreasing the agricultural production per capita has a much greater effect on China than on India.Therefore,both countries should take measures that are both similar and different according to their national conditions to improve their food security level.
文摘Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
基金Research Center for Capital Health Management and Policy,No.2024JD09.
文摘BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hospitalization costs and structure,and explored the impact of China Healthcare Security Diagnosis Related Groups(CHS-DRG)management on patient costs.It aimed to provide medical institutions with ways to reduce costs,optimize cost structures,reduce patient burden,and improve service efficiency.AIM To study the CHS-DRG payment system’s impact on breast cancer surgery costs.METHODS Using the CHS-DRG(version 1.1)grouping criteria,4073 patients,who underwent the radical resection of breast malignant tumors from January to December 2023,were included in the JA29 group;1028 patients were part of the CHS-DRG payment system,unlike the rest.Through an independent sample t-test,the length of hospital stay as well as total hospitalization,medicine and consumables,medical,nursing,medical technology,and management expenses were compared.Pearson’s correlation coefficient was used to test the cost correlation.RESULTS In terms of hospitalization expenses,patients in the CHS-DRG payment group had lower medical,nursing,and management expenses than those in the diagnosis-related group(DRG)non-payment group.For patients in the DRG payment group,the factors affecting the total hospitalization cost,in descending order of relevance,were medicine and consumable costs,consumable costs,medicine costs,medical costs,medical technology costs,management costs,nursing costs,and length of hospital stay.For patients in the DRG nonpayment group,the factors affecting the total hospitalization expenses in descending order of relevance were medicines and consumable expenses,consumable expenses,medical technology expenses,the cost of medicines,medical expenses,nursing expenses,length of hospital stay,and management expenses.CONCLUSION The CHS-DRG system can help control and reduce unnecessary medical expenses by controlling medicine costs,medical consumable costs,and the length of hospital stay while ensuring medical safety.
基金Research Center for Capital Health Management and Policy,No.2024JD09.
文摘BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers accounted for the highest number of new cases.Real-world data(RWD)is now widely preferred to traditional clinical trials in various fields of medicine and healthcare,as the traditional research approach often involves highly selected populations and interventions and controls that are strictly regulated.Additionally,research results from the RWD match global reality better than those from traditional clinical trials.AIM To analyze the cost disparity between surgical treatments for liver and pancreatic cancer under various factors.METHODS This study analyzed RWD 1137 cases within the HB1 group(patients who underwent pancreatectomy,hepatectomy,and/or shunt surgery)in 2023.It distinguished different expenditure categories,including medical,nursing,technical,management,drug,and consumable costs.Additionally,it assessed the contribution of each expenditure category to total hospital costs and performed cross-group comparisons using the non-parametric Kruskal–Wallis test.This study used the Steel–Dwass test for post-hoc multiple comparisons and the Spearman correlation coefficient to examine the relationships between variables.RESULTS The study found that in HB11 and HB13,the total hospitalization costs were significantly higher for pancreaticoduodenectomy than for pancreatectomy and hepatectomy.Although no significant difference was observed in the length of hospital stay between patients who underwent pancreaticoduodenectomy and pancreatectomy,both were significantly longer than those who underwent liver resection.In HB15,no significant difference was observed in the total cost of hospitalization between pancreaticoduodenectomy and pancreatectomy;however,both were significantly higher than those in hepatectomy.Additionally,the length of hospital stay was significantly longer for patients who underwent pancreaticoduodenectomy than for those who underwent pancreatectomy or liver resection.CONCLUSION China Healthcare Security Diagnosis Related Groups payment system positively impacts liver and pancreatic cancer surgeries by improving medical quality and controlling costs.Further research could refine this grouping system and ensure continuous effectiveness and sustainability.
文摘To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take timely and proper countermeasures. In my personal view, two principles should be taken into consideration. The first principle is
文摘The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes.
文摘In the rural areas where most of the world's hungry people live, women produce most of the locally consumed food. Their contribution could be much greater if they had equal access to essential resources and services, such as land, credit, and training. In Sudan, women have always been active in agriculture and food security, constituting 17% to agricultural labor force. However, culture coupled with imperfections of official data underestimates their contribution. Accordingly, this study was carried out in the western part of Sudan, namely, North Kordofan State in order to identify and assess the role of women in agriculture and food security and identify the main factors and constraints affecting their contribution to agricultural production in the state. The findings confirm that women contribute 74% to the monthly agricultural income, 65% to total income, 62% to the labor work, and 65% to the household activities. Their average daily working hours are 14, while, those of men are only 8. The study suggests that the removal of the obstacles those women face could increase their contribution to and enhances the livelihood of the people in the state. Hence, a review to the relevant government policies is needed, so that women are empowered by improving their access to resources and credit.
文摘This article discusses the security of the NGN service platform in terms of the open service interface and service deployment. It thinks that security of the open service interface can be solved by adding the service access gateway and service management platform. The service access gateway provides security features to the open service interface concerning ID authentication, authorization, audit, encryption and integrity protection. For service deployment, its security can be solved by issuing related user digital certificates, deploying a firewall or an intrusion detection system, implementing load control, managing users' home location and displaying users' real-time IP addresses.
文摘In this paper,a series of major policy decisions used to improve the power grid reliability,reduce the risk and losses of major power outages,and realize the modernization of 21st century power grid are discussed. These decisions were adopted by American government and would also be helpful for the strategic development of Chinese power grid. It is proposed that China should take precaution,carry out security research on the overall dynamic behaviour characteristics of the UHV grid using the complexity theory,and finally provide safeguard for the Chinese UHV grid. It is also pointed out that,due to the lack of matured approaches to controll a cascading failure,the primary duty of a system operator is to work as a "watchdog" for the grid operation security,eliminate the cumulative effect and reduce the risk and losses of major cascading outages with the help of EMS and WAMS.
基金funded by National Natural Science Foundation Project (40801077)Ministry of Education Key Project (209100)+1 种基金Natural Science Foundation of Chongqing ( CSTC, 2008BB7367 )Chongqing Municipal Education Commission of Science and Technology Research Grant Project (KJ070811)~~
文摘The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological security dynamic monitoring,ecological security appraisal,ecological security forecast and ecological security decision-making management. The synthetic evaluation indicator system of the ecological security quality were initially established,which includes ecological environment pollution,land use and land cover change,geological hazard and epidemic outbreaks. At the same time,29 evaluating indicators were selected,divides into the basic factors,response factors and inducing factors,which need to be Real-time monitored.
文摘The security threats to Shanghai World Expo were multi-faceted, ranging from terrorist threat to ethnic separatist threat, from foreign diplomatic and political disputes to domestic mass disturbances as well as serious social crimes The first was from terrorist threat, and the global Jihad network in Eurasia was looming in the early 21st century, which was guided by radical ideologies; the second threat was from ethnic separatist groups; the third threat was related with foreign personnel and diplomats' security; the fourth threat was from mass disturbances, and the fifth was from serious social crimes. China's measures to these potential multi-faceted challenges were serious and various, including preventing terrorist attacks through international cooperation, lessening ethnic separatists' dissatisfaction and avoiding possible mass demonstration, reducing the chance of domestic mass disturbances, guaranteeing public transportation and aerospace security, making extensive use of advanced technologies and referring to other countries' expertise in security check, seeking help from other provinces bordering Shanghai, and strengthening control over explosive materials, etc.. Nevertheless, the efficacy of the above-mentioned countermeasures was problematic, for they were more defensive than offensive, more passive than proactive, and more tactical than strategic.
文摘Non-traditional security, often abbreviated to NTS, is a popular but rather ambiguousconcept within and outside academic circles. How to accurately define this term? Whatshould be considered in prioritising the needs to curb various NTS threats, given a countryslimited resources and capacities? By raising thought-provoking questions, the author triesto explain the perplexity concerning NTS issues, arguing that NTS is important in economic,political and security sense, but that more efforts are needed from the academics in order toreach a consensus in understanding and dealing with NTS issues.