Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relation...Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems.展开更多
The fields of safety and security use different conceptual standards and methods. As a consequence, these two separate but related research areas utilize different approaches. Addressing the integration between safety...The fields of safety and security use different conceptual standards and methods. As a consequence, these two separate but related research areas utilize different approaches. Addressing the integration between safety and security concerns in this context, we would conduct a survey exploring approaches and standards that were created by the scholars to combine safety and security requirement engineering.展开更多
Nowadays, the most prominent risk assessment techniques are founded on the values of measuring and controlling the frequency and the consequences of risks in order to assure an "acceptable level" of "safeness" mai...Nowadays, the most prominent risk assessment techniques are founded on the values of measuring and controlling the frequency and the consequences of risks in order to assure an "acceptable level" of "safeness" mainly in the lines of environmental, health and hygiene and port product issues. This paper initially introduces risk assessment approaches within the emerging role of ports Thereafter, it qualitatively assesses their potential for ports by discussing issues challenging every safety and security approach within the maritime industry such as proactiveness, organization, transparency, cost-effectiveness and, when possible, calibration to specific experiences. Moreover, an empirical study was conducted in order to provide evidence for formal risk assessment for safety and security in the main Greek port container terminals of Piraeus and Thessaloniki. The empirical research is based on in-depth semi-structured interviews with the administrations of container terminals. The results include important findings, regarding the likelihood of appearance of certain risks and their perceived severity in Greek container terminals. The collected answers and their analysis are also important for confirming the suggested theoretical formal risk assessment framework for ports.展开更多
Following September 11, 2001, numerous security policies have been created which have caused a number of unique challenges in planning for transportation networks. Transportation policy and funding to improve the tran...Following September 11, 2001, numerous security policies have been created which have caused a number of unique challenges in planning for transportation networks. Transportation policy and funding to improve the transportation infrastructure has historically been addressed as individual modes not as intermodal transportation. As a consequence of this inopportune allocation, it is now apparent that the transportation modes are disconnected and have unequal levels of security and efficiency. Improved intermodal connectivity has therefore been identified as one of the main challenges to achieve a safer, secure, and productive transportation network. Tools need to be refined for collaboration and consensus building to serve as catalysts for efficient transportation solutions. In this study, a mathematical model using data envelopment analysis (DEA) was developed and investigated to assess the safety and security of intermodal transportation facilities. The model identifies the best and worst performers by assessing several safety and security-related variables. The DEA model can assess the efficiency level of safety and security of intermodal facilities and identify potential solutions for improvement. The DEA methodology presented is general in its framework and can be applied to any network of intermodal transportation systems. Availability of credible data, complemented with DEA methodology will help in management decisions making concrete safety and security decisions for intermodal transportation facilities.展开更多
In the process of green and smart mine construction under the context of carbon neutrality,China's coal safety situation has been continuously improved in recent years.In order to recognize the development of coal...In the process of green and smart mine construction under the context of carbon neutrality,China's coal safety situation has been continuously improved in recent years.In order to recognize the development of coal production in China and prepare for future monitoring and prevention of safety incidents,this study mainly elaborated on the basic situation of coal resources and national mining accidents over the past five years(2017-2021),from four dimensions(accident level,type,region,and time),and then proposed the preventive measures based on accident statistical laws.The results show that the storage of coal resources has obvious geographic characteristics,mainly concentrated in the Midwest,with coal resources in Shanxi and Shaanxi accounting for about 49.4%.The proportion of coal consumption has dropped from 70.2%to 56%between 2011 and 2021,but still accounts for more than half of the all.Meanwhile,the accident-prone areas are positively correlated with the amount of coal production.Among different levels of coal mine accidents,general accidents had the highest number of accidents and deaths,with 692 accidents and 783 deaths,accounting for 87.6%and 54.64%respectively.The frequency of roof,gas,and transportation accidents is relatively high,and the number of single fatalities caused by gas accidents is the largest,about 4.18.In terms of geographical distribution of accidents,the safety situation in Shanxi Province is the most severe.From the time distribution of coal mine accidents,the accidents mainly occurred in July and August,and rarely occurred in February and December.Finally,the"4+4"safety management model is proposed,combining the statistical results with coal production in China.Based on the existing health and safety management systems,the manage-ments are divided into four sub-categories,and more specific measures are suggested.展开更多
The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the developm...The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed.展开更多
In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to...In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s safety.The exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and security.At the time of the attack,it appears the women were immobilized and needed immediate support.Only self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or button.The proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud Technology.It is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud database.WSG can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location settings.WSG has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 s.The average activation time is 2.079 s.展开更多
Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"...Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.展开更多
With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the syst...With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme.展开更多
Container vessels navigate among the world's ports, frequently passing through narrow and congested waters. Due to the many layers of containers on a container vessel's decks, it is difficult for the crew to be awar...Container vessels navigate among the world's ports, frequently passing through narrow and congested waters. Due to the many layers of containers on a container vessel's decks, it is difficult for the crew to be aware of all fishing vessels and other obstacles in a container vessel's radar observation blind zone. This greatly increases the risk of collisions and other accidents. Given such great challenges to safe navigation and safety management with container vessels, their security risks are severe. An effective visual monitoring system can improve the safety of the water area surrounding container vessel by eliminating a vessel's observation blind zone, providing an effective safety measure for vessels navigating fishing zones and other troublesome areas. The system has other functions, such as accident recording, ship security, and monitoring of loading and unloading operations, thus ensuring the ship operates safely. Six months' trial operation showed that the system facilitates safe navigation of container vessels.展开更多
As the maritime sector embraces more technology to increase efficiency, lower carbon emissions, and adapt to meet modern challenges, cyber and cyber-physical safety become a more significant issue. However, unfortunat...As the maritime sector embraces more technology to increase efficiency, lower carbon emissions, and adapt to meet modern challenges, cyber and cyber-physical safety become a more significant issue. However, unfortunately, much of past research view cyber-security issues in transportation as primarily information technology problems. This paper designs and uses a case study to illustrate how cyber-security and physical safety should be viewed together, cyber and physical (</span><i><span style="font-family:Verdana;">i.e.</span></i><span style="font-family:Verdana;"> cyber-physical), when considering ship-to-ship</span></span><span style="font-family:Verdana;"> and ship-to-shore interactions. While there is some scenario designing, this case study is built with real port data and ship systems to demonstrate a real-world cyber-attack on a ship. It shows plausible physical effects that affect the safety of those involved. This case study is also made realistic with a novel hybrid cyber range and hardware testbed environment, designed to examine the different effects a ship-based cyber-attack could potentially have on a port. This informs several solutions, technical and social, that could enhance cyber-physical safety in marine transportation.展开更多
With the continuous development of economy in our country, the level of science and technology requirements are also become greater. In the process of scientific and technological progress, ensuring that technology ca...With the continuous development of economy in our country, the level of science and technology requirements are also become greater. In the process of scientific and technological progress, ensuring that technology can serve the public better is a problem that needs to be faced in our study. In our daily life, computer networks have become essential to everyone, and the use of computers can bring a lot of convenience to the public which is also an important guarantee for the continuous development of society. However, when we use computers, we will face the problems related to computer network security. These problems will bring a lot of negative results for users or industries. Based on these considerations, in the process of using a computer network, we have to maintain the network system. In this paper, we discussed the development situation and problems of computer network security at the present stage. And in the process, we are looking for more solutions to maintain the security of computer network.展开更多
Crime is often associated with urban development as urban areas tend to be at greater risk security-wise as compared with other areas. This is the reality of an increasing population crowding into the cities, and fome...Crime is often associated with urban development as urban areas tend to be at greater risk security-wise as compared with other areas. This is the reality of an increasing population crowding into the cities, and fomenting crime in the process. The physical design of the environment also contributes to the escalating crime rate, resulting in fear and anxiety among the residents. The "Safe Township" concept is an approach to resolving the issue of security in urban areas. It is an agenda within the concept of liveable cities that focuses principally on the problems of urban security. The development of properties within the concept of Gated Community housing is considered a step towards protecting residents in a residential area. The development of fenced Gated Community housing equipped with full-time security facilities is among the strategies in implementing the concept of the Safe Township. This paper discusses the security features in the Gated Community housing development as measures to combat crime in line with the implementation of the Safe Township concept. This study adopts an investigative methodology that combines theory with case studies. The compilation of data was made through literature search, interviews with representatives from the Town Planning Department and data were also collected through observations of Gated Community housing schemes in Johor Bahru.展开更多
Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethe...Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.展开更多
The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="fon...The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems.展开更多
Pesticides have been an essential part of agriculture to protect crops and livestock from pest infestations and yield reduction for many decades. Despite their usefulness, pesticides could pose potential risks to food...Pesticides have been an essential part of agriculture to protect crops and livestock from pest infestations and yield reduction for many decades. Despite their usefulness, pesticides could pose potential risks to food safety and the environment as well as human health. This paper reviews the positive benefits of agricultural pesticide use as well as some potential negative impacts on the environment and food safety. In addition, using the case of California, we discuss the need for both residue monitoring and effective pest management to promote food safety. Twenty years' pesticide residue data from California's pesticide residue monitoring program were analyzed. Results showed that more than 95% of food samples were in compliance with US pesticide residue standards (tolerances). However, certain commodities from certain sources had high percentages of residues above tolerance levels. Even when residues above tolerance levels were detected, most were at levels well below 1 mg kg^-1, and most posed negligible acute health risk. However, a few detected residues had the potential to cause health effects. Therefore, establishing an effective food residue monitoring program is important to ensure food quality throughout the marketplace.展开更多
In this paper, intrinsic safety and positive security distance control for an up/down elevator which extracts the materials from an underground coal mine is approached. For a better understanding of intrinsic safety a...In this paper, intrinsic safety and positive security distance control for an up/down elevator which extracts the materials from an underground coal mine is approached. For a better understanding of intrinsic safety and positive security, the first part of the paper describes the potential risk the workers are facing while working in dangerous environments like coal mining with “grisou” atmospheres and what the conditions of an unfortunate event to take place are. We presented the diagram and working principle for intrinsic safety equipment used in potential explosive areas based on which we modeled and simulated the intrinsic and positive security distance control in order to get a software solution for it. We created an algorithm and simulated the process in Matlab Simulink. The simulation results done in Matlab Simulink were then entered into a Moeller PLC using a ladder-type programming language. For protection against explosive atmospheres, the PLC is inserted into a metal housing with intrinsic protection and Positive Security.展开更多
In order to increase checkpoint throughput and reduce variance in waiting time, the current security process of an airport in the United States has been taken as an example. Depending on the survey data, we use the qu...In order to increase checkpoint throughput and reduce variance in waiting time, the current security process of an airport in the United States has been taken as an example. Depending on the survey data, we use the queuing model to review airport security checkpoints and staffing and to identify potential bottlenecks which disrupt passenger throughput. And the method of improving the traffic volume and reducing the waiting time is deduced by the mathematical formula. The influence of the cultural difference of the passenger security process is analyzed by sensitivity. Based on the security optimization model, the security system is put forward to a certain extent to adapt to different cultural differences. The model takes into account the impact of parameter changes on the airport security process.展开更多
Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number ...Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet,and thus raising security concerns.First of all,we introduce the basic principle of PLC in this paper.Then we analyze the PLC code security,firmware security,network security,virus vulnerability and Modbus communication protocol by reviewing the previous related work.Finally,we make a summary of the current security protection methods.展开更多
Security is an essential aspect for mobile systems. Usually, mobile system modeling and its security policies specification are realized in different techniques. So when constructed a mobile system using formal method...Security is an essential aspect for mobile systems. Usually, mobile system modeling and its security policies specification are realized in different techniques. So when constructed a mobile system using formal methods it is difficult to verify if the system comply with any given security policies. A method was introduced to express security automata which specifying enforceable security policies as processes in an extended π-calculus. In this extended π-calculus, an exception termination process was introduced, called bad. Any input which violating a security automaton will correspond to a step of transformation of the process that specifying the security automaton to exception termination process. Our method shows that any security automata which specifying enforceable security policies would decide a process in the extended π-calculus.展开更多
基金one of the research fruits of“A Study of the Public Interest Litigation and Security Mechanism for the Quality and Safety of Agricultural Products”(15BGL135)general project granted by the National Social Sciences Planning Office
文摘Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems.
文摘The fields of safety and security use different conceptual standards and methods. As a consequence, these two separate but related research areas utilize different approaches. Addressing the integration between safety and security concerns in this context, we would conduct a survey exploring approaches and standards that were created by the scholars to combine safety and security requirement engineering.
文摘Nowadays, the most prominent risk assessment techniques are founded on the values of measuring and controlling the frequency and the consequences of risks in order to assure an "acceptable level" of "safeness" mainly in the lines of environmental, health and hygiene and port product issues. This paper initially introduces risk assessment approaches within the emerging role of ports Thereafter, it qualitatively assesses their potential for ports by discussing issues challenging every safety and security approach within the maritime industry such as proactiveness, organization, transparency, cost-effectiveness and, when possible, calibration to specific experiences. Moreover, an empirical study was conducted in order to provide evidence for formal risk assessment for safety and security in the main Greek port container terminals of Piraeus and Thessaloniki. The empirical research is based on in-depth semi-structured interviews with the administrations of container terminals. The results include important findings, regarding the likelihood of appearance of certain risks and their perceived severity in Greek container terminals. The collected answers and their analysis are also important for confirming the suggested theoretical formal risk assessment framework for ports.
文摘Following September 11, 2001, numerous security policies have been created which have caused a number of unique challenges in planning for transportation networks. Transportation policy and funding to improve the transportation infrastructure has historically been addressed as individual modes not as intermodal transportation. As a consequence of this inopportune allocation, it is now apparent that the transportation modes are disconnected and have unequal levels of security and efficiency. Improved intermodal connectivity has therefore been identified as one of the main challenges to achieve a safer, secure, and productive transportation network. Tools need to be refined for collaboration and consensus building to serve as catalysts for efficient transportation solutions. In this study, a mathematical model using data envelopment analysis (DEA) was developed and investigated to assess the safety and security of intermodal transportation facilities. The model identifies the best and worst performers by assessing several safety and security-related variables. The DEA model can assess the efficiency level of safety and security of intermodal facilities and identify potential solutions for improvement. The DEA methodology presented is general in its framework and can be applied to any network of intermodal transportation systems. Availability of credible data, complemented with DEA methodology will help in management decisions making concrete safety and security decisions for intermodal transportation facilities.
基金supported by the National Key R&D Program of China (2022YFC3004701)the National Natural Science Foundation of China (52274242,51904293)+1 种基金the Natural Science Foundation of Jiangsu Province (BK20190627)the China Postdoctoral Science Foundation (2019M661998).
文摘In the process of green and smart mine construction under the context of carbon neutrality,China's coal safety situation has been continuously improved in recent years.In order to recognize the development of coal production in China and prepare for future monitoring and prevention of safety incidents,this study mainly elaborated on the basic situation of coal resources and national mining accidents over the past five years(2017-2021),from four dimensions(accident level,type,region,and time),and then proposed the preventive measures based on accident statistical laws.The results show that the storage of coal resources has obvious geographic characteristics,mainly concentrated in the Midwest,with coal resources in Shanxi and Shaanxi accounting for about 49.4%.The proportion of coal consumption has dropped from 70.2%to 56%between 2011 and 2021,but still accounts for more than half of the all.Meanwhile,the accident-prone areas are positively correlated with the amount of coal production.Among different levels of coal mine accidents,general accidents had the highest number of accidents and deaths,with 692 accidents and 783 deaths,accounting for 87.6%and 54.64%respectively.The frequency of roof,gas,and transportation accidents is relatively high,and the number of single fatalities caused by gas accidents is the largest,about 4.18.In terms of geographical distribution of accidents,the safety situation in Shanxi Province is the most severe.From the time distribution of coal mine accidents,the accidents mainly occurred in July and August,and rarely occurred in February and December.Finally,the"4+4"safety management model is proposed,combining the statistical results with coal production in China.Based on the existing health and safety management systems,the manage-ments are divided into four sub-categories,and more specific measures are suggested.
基金National Natural Science Foundation of China(No.61941114 and No.61521003)Key Universities and Academic Disciplines Contruction Project。
文摘The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed.
基金The authors extend their appreciation to the deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through project number(IFP-2020-19).
文摘In recent years,the growth of female employees in the commercial market and industries has increased.As a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s safety.The exponential increase in assaults and attacks on women,on the other hand,is posing a threat to women’s growth,development,and security.At the time of the attack,it appears the women were immobilized and needed immediate support.Only self-defense isn’t sufficient against abuse;a new technological solution is desired and can be used as quickly as hitting a switch or button.The proposed Women Safety Gadget(WSG)aims to design a wearable safety device model based on Internet-of-Things(IoT)and Cloud Technology.It is designed in three layers,namely layer-1,having an android app;layer-2,with messaging and location tracking system;and layer-3,which updates information in the cloud database.WSG can detect an unsafe condition by the pressure sensor of the finger on the artificial nail,consequently diffuses a pepper spray,and automatically notifies the saved closest contacts and police station through messaging and location settings.WSG has a response time of 1000 ms once the nail is pressed;the average time for pulse rate measure is 0.475 s,and diffusing the pepper spray is 0.2–0.5 s.The average activation time is 2.079 s.
基金supported by the National Natural Science Foundation Innovation Group Project(61521003)。
文摘Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace.This paper analyzes the philosophical and technical causes of the existence of so-called"dark functions"such as system vulnerabilities and backdoors,and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels;rather,it is necessary to develop or utilize the endogenous security functions of the system architecture itself.In addition,this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace,introduces endogenous safety and security mechanisms and characteristics based on dynamic heterogeneous redundancy(DHR)architecture,and describes the theoretical implications of a coding channel based on DHR.
文摘With the rapid development of the Internet of Things (IoT), non-Orthogonal Multiple Access (NOMA) technology and cognitive wireless network are two promising technologies to improve the spectral efficiency of the system, which have been widely concerned in the field of wireless communication. However, due to the importance of ownership and privacy protection, the IoT system must provide corresponding security mechanisms. From the perspective of improving the transmission security of CR-NOMA system based on cognitive wireless network, and considering the shortcomings of traditional relay cooperative NOMA system, this paper mainly analyzes the eavesdropping channel model of multi-user CR-NOMA system and derives the expressions of system security and rate to improve the security performance of CR-NOMA system. The basic idea of DC planning algorithm and the scheme of sub-carrier power allocation to improve the transmission security of the system were introduced. An algorithm for DC-CR-NOMA was proposed to maximize the SSR of the system and minimize the energy loss. The simulation results show that under the same complexity, the security and speed of the system can be greatly improved compared with the traditional scheme.
基金the Shanghai Leading Academic Discipline Project Foundation under Grant No.T0603
文摘Container vessels navigate among the world's ports, frequently passing through narrow and congested waters. Due to the many layers of containers on a container vessel's decks, it is difficult for the crew to be aware of all fishing vessels and other obstacles in a container vessel's radar observation blind zone. This greatly increases the risk of collisions and other accidents. Given such great challenges to safe navigation and safety management with container vessels, their security risks are severe. An effective visual monitoring system can improve the safety of the water area surrounding container vessel by eliminating a vessel's observation blind zone, providing an effective safety measure for vessels navigating fishing zones and other troublesome areas. The system has other functions, such as accident recording, ship security, and monitoring of loading and unloading operations, thus ensuring the ship operates safely. Six months' trial operation showed that the system facilitates safe navigation of container vessels.
文摘As the maritime sector embraces more technology to increase efficiency, lower carbon emissions, and adapt to meet modern challenges, cyber and cyber-physical safety become a more significant issue. However, unfortunately, much of past research view cyber-security issues in transportation as primarily information technology problems. This paper designs and uses a case study to illustrate how cyber-security and physical safety should be viewed together, cyber and physical (</span><i><span style="font-family:Verdana;">i.e.</span></i><span style="font-family:Verdana;"> cyber-physical), when considering ship-to-ship</span></span><span style="font-family:Verdana;"> and ship-to-shore interactions. While there is some scenario designing, this case study is built with real port data and ship systems to demonstrate a real-world cyber-attack on a ship. It shows plausible physical effects that affect the safety of those involved. This case study is also made realistic with a novel hybrid cyber range and hardware testbed environment, designed to examine the different effects a ship-based cyber-attack could potentially have on a port. This informs several solutions, technical and social, that could enhance cyber-physical safety in marine transportation.
文摘With the continuous development of economy in our country, the level of science and technology requirements are also become greater. In the process of scientific and technological progress, ensuring that technology can serve the public better is a problem that needs to be faced in our study. In our daily life, computer networks have become essential to everyone, and the use of computers can bring a lot of convenience to the public which is also an important guarantee for the continuous development of society. However, when we use computers, we will face the problems related to computer network security. These problems will bring a lot of negative results for users or industries. Based on these considerations, in the process of using a computer network, we have to maintain the network system. In this paper, we discussed the development situation and problems of computer network security at the present stage. And in the process, we are looking for more solutions to maintain the security of computer network.
文摘Crime is often associated with urban development as urban areas tend to be at greater risk security-wise as compared with other areas. This is the reality of an increasing population crowding into the cities, and fomenting crime in the process. The physical design of the environment also contributes to the escalating crime rate, resulting in fear and anxiety among the residents. The "Safe Township" concept is an approach to resolving the issue of security in urban areas. It is an agenda within the concept of liveable cities that focuses principally on the problems of urban security. The development of properties within the concept of Gated Community housing is considered a step towards protecting residents in a residential area. The development of fenced Gated Community housing equipped with full-time security facilities is among the strategies in implementing the concept of the Safe Township. This paper discusses the security features in the Gated Community housing development as measures to combat crime in line with the implementation of the Safe Township concept. This study adopts an investigative methodology that combines theory with case studies. The compilation of data was made through literature search, interviews with representatives from the Town Planning Department and data were also collected through observations of Gated Community housing schemes in Johor Bahru.
文摘Smart distribution grid needs data communication systems as a support to complete their important functions. The smart distribution grid of the data and information are increasingly adopting internet protocol and Ethernet technology. The IP addresses are more and more important for the smart distribution grid equipment. The current IPv4 protocol occupies a dominant position; therefore, the challenges of the evolution to IPv6 and network security are faced by data communication systems of the smart distribution grid. The importance of data communications network and its main bearer of business were described. The data communications network from IPv4 to IPv6 evolution of the five processes and four stages of the transition were analyzed. The smart distribution grid data communications network security and types of their offensive and defensive were discussed. And the data communications network security architecture was established. It covers three dimensions, the security level, the communications network security engineering and the communications network security management. The security architecture safeguards the evolution to IPv6 for the smart distribution grid data communication systems.
文摘The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems.
基金the Sino-US Joint Research Center for Food Safety for special fund (A200021501)Start-up Funds (Z111021403) for Talents in Northwest A&F University, China
文摘Pesticides have been an essential part of agriculture to protect crops and livestock from pest infestations and yield reduction for many decades. Despite their usefulness, pesticides could pose potential risks to food safety and the environment as well as human health. This paper reviews the positive benefits of agricultural pesticide use as well as some potential negative impacts on the environment and food safety. In addition, using the case of California, we discuss the need for both residue monitoring and effective pest management to promote food safety. Twenty years' pesticide residue data from California's pesticide residue monitoring program were analyzed. Results showed that more than 95% of food samples were in compliance with US pesticide residue standards (tolerances). However, certain commodities from certain sources had high percentages of residues above tolerance levels. Even when residues above tolerance levels were detected, most were at levels well below 1 mg kg^-1, and most posed negligible acute health risk. However, a few detected residues had the potential to cause health effects. Therefore, establishing an effective food residue monitoring program is important to ensure food quality throughout the marketplace.
文摘In this paper, intrinsic safety and positive security distance control for an up/down elevator which extracts the materials from an underground coal mine is approached. For a better understanding of intrinsic safety and positive security, the first part of the paper describes the potential risk the workers are facing while working in dangerous environments like coal mining with “grisou” atmospheres and what the conditions of an unfortunate event to take place are. We presented the diagram and working principle for intrinsic safety equipment used in potential explosive areas based on which we modeled and simulated the intrinsic and positive security distance control in order to get a software solution for it. We created an algorithm and simulated the process in Matlab Simulink. The simulation results done in Matlab Simulink were then entered into a Moeller PLC using a ladder-type programming language. For protection against explosive atmospheres, the PLC is inserted into a metal housing with intrinsic protection and Positive Security.
文摘In order to increase checkpoint throughput and reduce variance in waiting time, the current security process of an airport in the United States has been taken as an example. Depending on the survey data, we use the queuing model to review airport security checkpoints and staffing and to identify potential bottlenecks which disrupt passenger throughput. And the method of improving the traffic volume and reducing the waiting time is deduced by the mathematical formula. The influence of the cultural difference of the passenger security process is analyzed by sensitivity. Based on the security optimization model, the security system is put forward to a certain extent to adapt to different cultural differences. The model takes into account the impact of parameter changes on the airport security process.
基金This work is funded by the National Key Research and Development Plan(Grant No.2018YFB0803504)the National Natural Science Foundation of China(Nos.61702223,61702220,61871140,U1636215)the Opening Project of Shanghai Trusted Industrial Control Platform.
文摘Programmable Logic Controllers(PLC),core of industrial control systems,is widely used in industrial control systems.The security of PLC is the key to the security of industrial control systems.Nowadays,a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet,and thus raising security concerns.First of all,we introduce the basic principle of PLC in this paper.Then we analyze the PLC code security,firmware security,network security,virus vulnerability and Modbus communication protocol by reviewing the previous related work.Finally,we make a summary of the current security protection methods.
文摘Security is an essential aspect for mobile systems. Usually, mobile system modeling and its security policies specification are realized in different techniques. So when constructed a mobile system using formal methods it is difficult to verify if the system comply with any given security policies. A method was introduced to express security automata which specifying enforceable security policies as processes in an extended π-calculus. In this extended π-calculus, an exception termination process was introduced, called bad. Any input which violating a security automaton will correspond to a step of transformation of the process that specifying the security automaton to exception termination process. Our method shows that any security automata which specifying enforceable security policies would decide a process in the extended π-calculus.