期刊文献+
共找到7,052篇文章
< 1 2 250 >
每页显示 20 50 100
A Collaborative Protection Mechanism for System-on-Chip Functional Safety and Information Security in Autonomous Driving
1
作者 Zhongyi Xu Lei Xin +1 位作者 Zhongbai Huang Deguang Wei 《Journal of Electronic Research and Application》 2025年第2期226-232,共7页
This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It i... This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It includes an introduction to the functions and information security of autonomous driving SoCs,as well as the main design strategies for the collaborative prevention and control mechanism of SoC functional safety and information security in autonomous driving.The research shows that in the field of autonomous driving,there is a close connection between the functional safety of SoCs and their information security.In the design of the safety collaborative protection mechanism,the overall collaborative protection architecture,SoC functional safety protection mechanism,information security protection mechanism,the workflow of the collaborative protection mechanism,and its strategies are all key design elements.It is hoped that this analysis can provide some references for the collaborative protection of SoC functional safety and information security in the field of autonomous driving,so as to improve the safety of autonomous driving technology and meet its practical application requirements. 展开更多
关键词 Autonomous driving SoC functional safety Information security Collaborative protection mechanism Collaborative protection architecture
在线阅读 下载PDF
Research on Data Security and Privacy Protection in Corporate Human Resource Management in the Digital Era
2
作者 Biao Zhang Zhuoxin Li +2 位作者 Ke Xie Ting Li Binbin Huang 《Journal of Frontier in Economic and Management Research》 2025年第1期394-402,共9页
Against the backdrop of the global digital wave,human resource management(HRM)in innovation and entrepreneurship enterprises is undergoing profound transformation,with data emerging as a core asset driving corporate d... Against the backdrop of the global digital wave,human resource management(HRM)in innovation and entrepreneurship enterprises is undergoing profound transformation,with data emerging as a core asset driving corporate decision-making and development.However,issues related to data security and privacy protection have become increasingly prominent,serving as key factors restricting the sustainable development of enterprises.By analyzing the challenges faced by innovation and entrepreneurship enterprises in data security and privacy protection within HRM,this paper explores the importance of these issues and proposes countermeasures such as constructing a data security governance system,applying privacy computing technologies,and enhancing employees’data security awareness.The aim is to provide theoretical references and practical guidance on data security and privacy protection for innovation and entrepreneurship enterprises,helping them achieve a balance between security and development during digital transformation. 展开更多
关键词 Digital Era Data security Privacy protection
在线阅读 下载PDF
Protection path and security-metric-based resource allocation algorithm in quantum key distribution optical networks
3
作者 Li Liu Shengtong Zhai +1 位作者 Yao Pu Xu Zhang 《Chinese Physics B》 2025年第9期73-83,共11页
Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problem... Quantum key distribution(QKD)optical networks can provide more secure communications.However,with the increase of the QKD path requests and key updates,network blocking problems will become severe.The blocking problems in the network can become more severe because each fiber link has limited resources(such as wavelengths and time slots).In addition,QKD optical networks are also affected by external disturbances such as data interception and eavesdropping,resulting in inefficient network communication.In this paper,we exploit the idea of protection path to enhance the anti-interference ability of QKD optical network.By introducing the concept of security metric,we propose a routing wavelength and time slot allocation algorithm(RWTA)based on protection path,which can lessen the blocking problem of QKD optical network.According to simulation analysis,the security-metric-based RWTA algorithm(SM-RWTA)proposed in this paper can substantially improve the success rate of security key(SK)update and significantly reduce the blocking rate of the network.It can also improve the utilization rate of resources such as wavelengths and time slots.Compared with the non-security-metric-based RWTA algorithm(NSM-RWTA),our algorithm is robust and can enhance the anti-interference ability and security of QKD optical networks. 展开更多
关键词 quantum key distribution(QKD) optical network security metric protection path
原文传递
Research on Network Security Level Protection Measurement Strategy in the Context of Cloud Platforms
4
作者 Lin Ma 《Journal of Electronic Research and Application》 2024年第3期221-229,共9页
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak... Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them. 展开更多
关键词 Cloud platform Cyber security Level protection measurement
在线阅读 下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
5
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 Digital economy Universities and colleges Network information security protection status COUNTERMEASURES
在线阅读 下载PDF
The Looming Threat Blackout of the National Grid and Critical Infrastructure (A National Security Crisis) 被引量:1
6
作者 Bahman Zohuri 《Journal of Energy and Power Engineering》 2025年第1期31-35,共5页
The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by phy... The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by physical attacks,EMP(electromagnetic pulse)events,or cyberattacks,such disruptions could cripple essential services like water supply,healthcare,communication,and transportation.Research indicates that an attack on just nine key substations could result in a coast-to-coast blackout lasting up to 18 months,leading to economic collapse,civil unrest,and a breakdown of public order.This paper explores the key vulnerabilities of the grid,the potential impacts of prolonged blackouts,and the role of AI(artificial intelligence)and ML(machine learning)in mitigating these threats.AI-driven cybersecurity measures,predictive maintenance,automated threat response,and EMP resilience strategies are discussed as essential solutions to bolster grid security.Policy recommendations emphasize the need for hardened infrastructure,enhanced cybersecurity,redundant power systems,and AI-based grid management to ensure national resilience.Without proactive measures,the nation remains exposed to a catastrophic power grid failure that could have dire consequences for society and the economy. 展开更多
关键词 National grid blackout critical infrastructure security EMP cyberattack resilience AI-powered grid protection ML in energy security power grid vulnerabilities physical attacks on infrastructure predictive maintenance for power grids energy crisis and national security
在线阅读 下载PDF
Research on Cybersecurity Threats and Defenses in the Context of Financial Technology
7
作者 Sishan Li Wei Li 《Journal of Electronic Research and Application》 2025年第3期20-24,共5页
With the rapid development of information technology, the deep integration of the financial sector and the internet has become a key driving force for economic growth. However, while this trend brings convenience, it ... With the rapid development of information technology, the deep integration of the financial sector and the internet has become a key driving force for economic growth. However, while this trend brings convenience, it also poses significant cybersecurity challenges to the financial sector. This study comprehensively analyzes the current state, challenges, and protective measures of cybersecurity in the financial sector, aiming to provide important references for financial institutions in formulating cybersecurity strategies and enhancing risk management. 展开更多
关键词 Financial sector CYBERsecurity protective measures Data security
在线阅读 下载PDF
Financial Data Security Management in the Era of Big Data
8
作者 Yanling Liu Yun Li 《Proceedings of Business and Economic Studies》 2025年第2期37-42,共6页
In the era of big data,the financial industry is undergoing profound changes.By integrating multiple data sources such as transaction records,customer interactions,market trends,and regulatory requirements,big data te... In the era of big data,the financial industry is undergoing profound changes.By integrating multiple data sources such as transaction records,customer interactions,market trends,and regulatory requirements,big data technology has significantly improved the decision-making efficiency,customer insight,and risk management capabilities of financial institutions.The financial industry has become a pioneer in the application of big data technology,which is widely used in scenarios such as fraud detection,risk management,customer service optimization,and smart transactions.However,financial data security management also faces many challenges,including data breaches,privacy protection,compliance requirements,the complexity of emerging technologies,and the balance between data access and security.This article explores the major challenges of financial data security management,coping strategies,and the evolution of the regulatory environment,and it looks ahead to future trends,highlighting the important role of artificial intelligence and machine learning in financial data security. 展开更多
关键词 Big data Artificial intelligence Data security Privacy protection
在线阅读 下载PDF
GWO-LightGBM:A Hybrid Grey Wolf Optimized Light Gradient Boosting Model for Cyber-Physical System Security
9
作者 Adeel Munawar Muhammad Nadeem Ali +1 位作者 Awais Qasim Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第10期1189-1211,共23页
Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,t... Cyber-physical systems(CPS)represent a sophisticated integration of computational and physical components that power critical applications such as smart manufacturing,healthcare,and autonomous infrastructure.However,their extensive reliance on internet connectivity makes them increasingly susceptible to cyber threats,potentially leading to operational failures and data breaches.Furthermore,CPS faces significant threats related to unauthorized access,improper management,and tampering of the content it generates.In this paper,we propose an intrusion detection system(IDS)optimized for CPS environments using a hybrid approach by combining a natureinspired feature selection scheme,such as Grey Wolf Optimization(GWO),in connection with the emerging Light Gradient Boosting Machine(LightGBM)classifier,named as GWO-LightGBM.While gradient boosting methods have been explored in prior IDS research,our novelty lies in proposing a hybrid approach targeting CPS-specific operational constraints,such as low-latency response and accurate detection of rare and critical attack types.We evaluate GWO-LightGBM against GWO-XGBoost,GWO-CatBoost,and an artificial neural network(ANN)baseline using the NSL-KDD and CIC-IDS-2017 benchmark datasets.The proposed models are assessed across multiple metrics,including accuracy,precision,recall,and F1-score,with an emphasis on class-wise performance and training efficiency.The proposed GWO-LightGBM model achieves the highest overall accuracy(99.73%)for NSL-KDD and(99.61%)for CIC-IDS-2017,demonstrating superior performance in detecting minority classes such as Remote-to-Local(R2L)and Other attacks—commonly overlooked by other classifiers.Moreover,the proposed model consumes lower training time,highlighting its practical feasibility and scalability for real-time CPS deployment. 展开更多
关键词 Cyber-physical systems intrusion detection system machine learning digital contents copyright protection grey wolf optimization gradient boosting network security content protection LightGBM
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
10
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERsecurity data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
A Dynamic Social Network Graph Anonymity Scheme with Community Structure Protection
11
作者 Yuanjing Hao Xuemin Wang +2 位作者 Liang Chang Long Li Mingmeng Zhang 《Computers, Materials & Continua》 2025年第2期3131-3159,共29页
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ... Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL. 展开更多
关键词 Dynamic social network graph k-composition anonymity community structure protection graph publishing security and privacy
在线阅读 下载PDF
Effect of terminal boundary protection on the spread of computer viruses:modeling and simulation
12
作者 Kai GAO Lixin ZHANG +2 位作者 Yabing YAO Yang YANG Fuzhong NIAN 《Frontiers of Information Technology & Electronic Engineering》 2025年第9期1637-1648,共12页
The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses ... The diversity and complexity of the user population on the campus network increase the risk of computer virus infection during terminal information interactions.Therefore,it is crucial to explore how computer viruses propagate between terminals in such a network.In this study,we establish a novel computer virus spreading model based on the characteristics of the basic network structure and a classical epidemic-spreading dynamics model,adapted to real-world university scenarios.The proposed model contains six groups:susceptible,unisolated latent,isolated latent,infection,recovery,and crash.We analyze the proposed model's basic reproduction number and disease-free equilibrium point.Using real-world university terminal computer virus propagation data,a basic computer virus infection rate,a basic computer virus removal rate,and a security protection strategy deployment rate are proposed to define the conversion probability of each group and perceive each group's variation tendency.Furthermore,we analyze the spreading trend of computer viruses in the campus network in terms of the proposed computer virus spreading model.We propose specific measures to suppress the spread of computer viruses in terminals,ensuring the safe and stable operation of the campus network terminals to the greatest extent. 展开更多
关键词 Campus network terminal security Spread of computer virus MODEL Analogue simulation Terminal protection measures
原文传递
Legal Research on the Protection of the Rights and Interests of Small and Medium-sized Shareholders: Based on the Response of Two-Tier Shareholding Structure
13
作者 Yuji Lin 《Proceedings of Business and Economic Studies》 2025年第3期153-159,共7页
The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier sharehol... The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier shareholding structure is that the company issues two classes of shares with different voting rights.It enables the concentration and stabilization of corporate control,which has a positive effect on the long-term development of the company and resistance to hostile takeovers.Against the background of the rapid development of the capital market and the continuous innovation of corporate governance structure,the two-tier shareholding structure has begun to be adopted by many enterprises.While this structure can improve the efficiency of corporate governance and promote corporate growth,it also raises a number of challenges.In particular,for small and medium-sized shareholders,their shareholdings may face the problem of limited or no voting rights,as well as the lack of an effective internal and external monitoring mechanism for the company.These issues may lead to the impairment of the rights of small and medium-sized shareholders.Currently,challenges in practice include inadequate laws and regulations,insufficient disclosure of information,and inadequate monitoring mechanisms.Therefore,exploring the path to protect the rights and interests of small and medium-sized shareholders and analyzing their current situation has become an important area in the study of two-tier shareholding structures.This paper starts from the actual situation,analyzes the problems exposed in the operation process of two-tier shareholding structure,and then explores the practical and feasible methods to protect the rights and interests of small and medium-sized shareholders on this basis,with a view to putting forward valuable references for the development of China’s securities market. 展开更多
关键词 Two-tier shareholding structure Small and medium-sized shareholders Rights and interests protection securities law Sunset clause Information disclosure
暂未订购
China's food security situation and key questions in the new era:A perspective of farmland protection 被引量:7
14
作者 LIANG Xinyuan JIN Xiaobin +5 位作者 HAN Bo SUN Rui XU Weiyi LI Hanbing HE Jie LI Jin 《Journal of Geographical Sciences》 SCIE CSCD 2022年第6期1001-1019,共19页
As the world’s largest developing country,the ability of China’s agricultural resource utilization to effectively support the current and future food security goals has been affected by a variety of factors(e.g.,tra... As the world’s largest developing country,the ability of China’s agricultural resource utilization to effectively support the current and future food security goals has been affected by a variety of factors(e.g.,transformed supply channels,tightening international situation and frequent emergencies)in recent years and has attracted extensive attention from the academic community subject to multiple factors.This study uses literature review,statistical analysis,and spatial analysis methods to systematically explore China’s food security situation in the context of farmland resource constraints.It is found that the demand-side pressures such as demographic changes,social class differentiation,and dietary structure adjustments derived from economic growth and rapid urbanization have placed extremely high expectations on food supply.However,the quantitative restrictions,utilization ways,and health risks of farmland resources on the supply side constitute a huge hidden concern that affects the stability of food production.Although China’s farmland protection system is undergoing a transition from focusing on quantity management to sustainable use,the matching and coordinating demand pressure and supply capacity for food security is unbalanced.Therefore,facing uncertain future development scenarios,policymakers should focus on building a resilient space for China’s farmland protection to withstand the interference of major emergencies.The existing farmland protection space policy can be integrated by establishing a national farmland strategic reserve system(based on resilient space),and further development of targeted use control measures for zoning,grading,and classification will help realize sustainable China’s farmland resources use. 展开更多
关键词 food security systematical analysis key questions farmland protection resilient space China
原文传递
Synergistic protection of Si anode based on multi-dimensional graphitic carbon skeletons 被引量:2
15
作者 Qitao Shi Haiming Wang +7 位作者 Junhua Zhou HuyQuang Ta Jiaqi Wang Xueyu Lian Klaudia Kurtyka Barbara Trzebicka Thomas Gemming Mark H.Rümmeli 《Nano Research》 SCIE EI CSCD 2022年第9期8146-8155,共10页
Inspired by the natural corn structure,a Si@hollow graphene shell@graphene(Si@GS@G)anode material was prepared in which silicon nanoparticles were preliminarily anchored onto the surface of an elastic graphene shell a... Inspired by the natural corn structure,a Si@hollow graphene shell@graphene(Si@GS@G)anode material was prepared in which silicon nanoparticles were preliminarily anchored onto the surface of an elastic graphene shell and further constrained using graphene sheets.Hollow graphene oxide shells with abundant surficial hydrogen bonds,which were synthesized using a novel bottom-up method,were used as an intermediate material to anchor positively charged silicon nanoparticles via electrostatic attraction and achieve a rational spatial distribution.The inner hollow graphene shell anchorage and outer graphene constraint synergistically constituted a porous and robust conductive corn-like structure.The as-fabricated Si@GS@G anode afforded efficient electron and ion transport pathways and improved structural stability,thereby enhancing Li+storage capability(505 mAh·g^(−1)at 10 A·g^(−1))and extending the lifespan compared to the single hollow graphene shell or graphene sheet-protected Si anode(72%capacity retention after 500 cycles).The improved kinetics of the Si@GS@G anode were investigated using electro impedance spectroscopy,galvanostatic intermittent titration,and pseudocapacitance contribution rate analysis,and the structural evolution was analyzed using ex situ electron microscopy.This study proposes a novel hollow graphene oxide shell as an activated intermediate material for designing a porous electrode structure that facilitates an enhanced electrochemical performance. 展开更多
关键词 synergistic protection multi-dimensional graphitic carbons corn-like structure elastic skeleton Si/C anode
原文传递
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
16
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(Database security and protection System)
在线阅读 下载PDF
Study on the Priority and Interaction of Food Security,Food Safety and Environmental Protection 被引量:1
17
作者 Tang Bulong 《学术界》 CSSCI 北大核心 2017年第11期294-303,共10页
Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationshi... Food security,food safety and environmental protection are major livelihood issues in front of the Chinese people.The priorities of the three are different,and there is mutually dependent and contradictory relationship among them.Facing the triple pressures of food security,food safety,and environmental protection,this paper analyzes the priority of the three from the historical development,then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security,food safety and environmental protection,and the proper settlement of the three problems. 展开更多
关键词 FOOD security FOOD safety ENVIRONMENTAL protection PRIORITY INTERACTIVE RELATIONSHIP
在线阅读 下载PDF
Research of the Farmland Protection Based on Food Security——A Case Study of Anshan City in Liaoning Province, China 被引量:1
18
作者 YANG Rong-li 《Asian Agricultural Research》 2011年第1期93-96,共4页
The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the stu... The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the study area which has its own particularity in terms of protecting farmland. Based on the prediction of population, coupled with the relevant data concerning farmland area, the per unit area yield of grain, the prediction and analysis of the balance of supply and demand of farmland in Anshan City are conducted. The results show that in the year 2010, the maximum supply amount of farmland that the city can offer is 239 000 hm2, and in the year 2020 the maximum supply amount of farmland that the city can offer will be 238 000 hm2; in the year 2010, the maximum demand amount of farmland is 204 186.02 hm2, and in the year 2020 the maximum supply amount of farmland will be 226 409.61 hm2. So the supply amount of farmland that the city can offer can meet the need of grain production objective. Some problems concerning farmland protection are pointed out in order to provide beneficial exploration of the farmland protection based on the model of food security. 展开更多
关键词 Food security Farmland protection Production capacity Anshan City China
在线阅读 下载PDF
Trust Model Based on Structured Protection for High Level Security System 被引量:1
19
作者 Liao Jianhua Zhao Yong Zhan Jing 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 展开更多
关键词 trusted computing security assurance structured protection
在线阅读 下载PDF
Urban Market-Gardening in Parakou (Republic of Benin): Spatial Dynamics, Food Security, Protection of the Environment and Creation of Employments 被引量:1
20
作者 Abdoul-Ramane Abdoulaye Aboudou Yacoubou Mama Aboudou Ramanou 《Journal of Geoscience and Environment Protection》 2015年第5期93-103,共11页
Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of tho... Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments. 展开更多
关键词 URBAN Agriculture Food security Market-Gardening Channel Land Dynamics protection of the Environment Employment Parakou
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部