Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr...Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework.展开更多
This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obsta...This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments.展开更多
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)...Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives.展开更多
The concept of Cyber-Physical Systems(CPS)enables the creation of a complex network that includes sensors integrated into vehicles and infrastructure,facilitating seamless data acquisition and transfer.This review exa...The concept of Cyber-Physical Systems(CPS)enables the creation of a complex network that includes sensors integrated into vehicles and infrastructure,facilitating seamless data acquisition and transfer.This review examines the convergence of CPS and Industry 4.0 in the smart transportation sector,highlighting their transformative impact on Intelligent Transportation Systems(ITS)operations.It explores the integration of Industry 4.0 and CPS technologies in intelligent transportation,highlighting their roles in enhancing efficiency,safety,and sustainability.A systematic framework is proposed for developing,implementing,and managing these technologies in the transportation industry.Moreover,the review discusses frequent obstacles during technology integration in transportation and presents future research trends and innovations in intelligent transportation operations post-Industry 4.0 and CPS integration.Lastly,it emphasizes the critical need for standardized protocols and encryption methodologies to enhance the security of communication and data exchange among CPS components in transportation infrastructure.展开更多
The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare I...The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare IoT(H-IoT)technology,which also provides proactive statistical findings and precise medical diagnoses that enhance healthcare performance.This study examines how ML might support IoT-based health care systems,namely in the areas of prognostic systems,disease detection,patient tracking,and healthcare operations control.The study looks at the benefits and drawbacks of several machine learning techniques for H-IoT applications.It also examines the fundamental problems,such as data security and cyberthreats,as well as the high processing demands that these systems face.Alongside this,the essay discusses the advantages of all the technologies,including machine learning,deep learning,and the Internet of Things,as well as the significant difficulties and problems that arise when integrating the technology into healthcare forecasts.展开更多
The article addresses the problem of the absence of a common language in international communication.Using the example of the UN Security Council session of March 2,2026,dedicated to children in armed conflicts,it ana...The article addresses the problem of the absence of a common language in international communication.Using the example of the UN Security Council session of March 2,2026,dedicated to children in armed conflicts,it analyzes a paradox:all participants speak about the same values but do not hear one another.As a solution,the Philosophical Matrix is proposed-a system of maximally general comparative concepts(the identical,the different,the correlative,the opposite,the orthogonal)that explicates a universal language of thinking,which the author calls the“language of Elohim”.The cultural-historical roots of this language are traced in the first chapter of Genesis,in Heraclitus,in Laozi,and in the Sefer Yetzirah.An analysis of the March 2 speeches allows us to diagnose at which levels of thinking(reason,practical mind,pure mind,wisdom)today’s educators and politicians operate.The conclusion proposes the“Wise School”project as a practical path for returning to the“language of Elohim”through education starting from early childhood.展开更多
In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow t...In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow the Málaga distribution.Further,we scrutinize the influence of non-zero boresight pointing errors and angle-of-arrival fluctuations on the PLS performance for the first time.We derived the probability density function and cumulative density function of the FSO link,followed by the closed-form expressions of the secrecy outage probability(SOP)and the probability of strictly positive secrecy capacity(SPSC).The asymptotic SOP expression at the high signal-to-noise ratio regime and diversity order are also provided to reveal the physical mechanism of the PLS of the considered system.Finally,Monte Carlo simulation results are presented to verify the correctness of the analytical expressions.The results afford helpful insights for the future design of satellite FSO communication systems.展开更多
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin...As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results.展开更多
The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)...The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments.展开更多
Understanding the local ecological security status and its underlying drivers can be used as an effective reference for balancing ecosystem development with societal needs. This study assesses the ecological security ...Understanding the local ecological security status and its underlying drivers can be used as an effective reference for balancing ecosystem development with societal needs. This study assesses the ecological security of the Loess Plateau(LP) by integrating ecosystem health and ecosystem services, explores the varying impacts of ecosystem structure, quality, and services on ecological security index(ESI), and identifies the key driving factors of ESI using the Geodetector model. The results show that:(1) the average ESI indicates a relatively safe ecological status in LP with a significant increase in ESI observed in 50.21% of the region, largely due to the ecological restoration programs.(2) Natural factors predominantly influence ESI, although human factors play a significant role in the earthy-rocky mountain region and plateau wind-sand region.(3) The interactions between driving factors have a much greater impact on ESI than any single factor, with the interactions between precipitation and human factors being the most influential combination. This study provides a novel perspective on assessing ecological security in LP. We recommend that future ecological restoration efforts should consider the varying roles of ecosystem structure, quality, and services in ESI while tailoring strategies to the primary driving factors based on local conditions.展开更多
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ...Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.展开更多
The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the explo...The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas.展开更多
To solve the contradiction between supply and demand of land, the con- struction of land resource security guarantee system is an important part to coordi- nate the economic development and cultivated land protection ...To solve the contradiction between supply and demand of land, the con- struction of land resource security guarantee system is an important part to coordi- nate the economic development and cultivated land protection in the core grain pro- duction region. Based on the deep analysis on the land resources characteristics and problems using the combined method of literature review method with qualita- tive and quantitative analysis, we constructed the land resource security system for different categories according to the land use principles of optimization, intensivism, improvement, and overall planning, and proposed the corresponding supporting mea- sures. The results showed that controlling the new increase, promoting the reclama- tion and improvement of land are the basis for land resource security, clearing the idle, improving the utilization rate of stock are the core of the efficient use of land resources, and establishing a unified urban and rural construction land market is the key to promoting the economical and intensive utilization of land resources, provid- ing scientific basis for the sustainable utilization of land resources in the core grain production regions.展开更多
Based on the characteristics of ATM system and the special requirement of financial transaction, an overall design of hardware and software structure of ATM was made. For software structure, the pattern of modules and...Based on the characteristics of ATM system and the special requirement of financial transaction, an overall design of hardware and software structure of ATM was made. For software structure, the pattern of modules and table? drive is adopted to realize the security of financial transaction and the diagnosis of communication fault. A new method, which is based on the application layer, transport layer and network layer, is used for diagnosing communication fault. Supporting both magnetic card and IC card, the system has been put into use in real financial systems, and has brought about both economic and social effects.展开更多
The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium lev...The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare.展开更多
The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological securit...The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological security dynamic monitoring,ecological security appraisal,ecological security forecast and ecological security decision-making management. The synthetic evaluation indicator system of the ecological security quality were initially established,which includes ecological environment pollution,land use and land cover change,geological hazard and epidemic outbreaks. At the same time,29 evaluating indicators were selected,divides into the basic factors,response factors and inducing factors,which need to be Real-time monitored.展开更多
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.展开更多
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec...ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions.Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.展开更多
How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computatio...How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.展开更多
Ecological security provides the basis of maintaining both a sustainable regional ecosystem and economic development.However,few studies have focused on how the features such as topography and geomorphology,lithologic...Ecological security provides the basis of maintaining both a sustainable regional ecosystem and economic development.However,few studies have focused on how the features such as topography and geomorphology,lithologic stratigraphic assemblages,and geohazard distribution affect the construction of ecological security patterns and the layout of optimization measures.In order to comprehensively reveal the key areas and key objects of ecological restoration in karst basins,this study takes the Beipan River Basin(BRB)as an example,constructs an ecological security pattern(ESP)based on the methods of morphological spatial pattern analysis(MSPA),landscape connectivity analysis and circuit theory,and lays out the optimization measures in combination with the spatial distribution characteristics of topographic and geomorphological differences and lithological stratigraphic combinations.The results show that 151 ecological sources,343 ecological corridors,121 pinch points and 178 barriers constitute the ESP of the BRB.Lithology is closely related to the spatial distribution characteristics of ecological source sites.Level 1 and 2 ecological sources(The ecological sources were categorized into level 1,level 2,and level 3 source from high to low importance.)are concentrated in the Emeishan basalt region of the upstream and the clastic and impure carbonate rock region of the downstream part of the BRB;level 3ecological sources are concentrated in the carbonate rock region of the midstream.Taking into account the outstanding ecological problems in the basin,and based on the characteristics of lithology and geohazard distribution,we propose the optimization scheme of“three axes,three zones and multiple points”for the ESP and the layout of specific measures of the BRB.The results can provide scientific references for maintaining ecological security maintenance in karst ecologically fragile areas.展开更多
基金supported by scientific research projects of China Academy of Railway Sciences Co.,Ltd.(grant no.2024YJ117).
文摘Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework.
基金supported by the National Science and Technology Council of under Grant NSTC 114-2221-E-130-007.
文摘This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments.
基金appreciation to the National Natural Science Foundation of China(72071074)Natural Science Foundation of Hunan Province,China(2025JJ30031)for their financial support。
文摘Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives.
文摘The concept of Cyber-Physical Systems(CPS)enables the creation of a complex network that includes sensors integrated into vehicles and infrastructure,facilitating seamless data acquisition and transfer.This review examines the convergence of CPS and Industry 4.0 in the smart transportation sector,highlighting their transformative impact on Intelligent Transportation Systems(ITS)operations.It explores the integration of Industry 4.0 and CPS technologies in intelligent transportation,highlighting their roles in enhancing efficiency,safety,and sustainability.A systematic framework is proposed for developing,implementing,and managing these technologies in the transportation industry.Moreover,the review discusses frequent obstacles during technology integration in transportation and presents future research trends and innovations in intelligent transportation operations post-Industry 4.0 and CPS integration.Lastly,it emphasizes the critical need for standardized protocols and encryption methodologies to enhance the security of communication and data exchange among CPS components in transportation infrastructure.
文摘The integration of machine learning(ML)technology with Internet of Things(IoT)systems produces essential changes in healthcare operations.Healthcare personnel can track patients around the clock thanks to healthcare IoT(H-IoT)technology,which also provides proactive statistical findings and precise medical diagnoses that enhance healthcare performance.This study examines how ML might support IoT-based health care systems,namely in the areas of prognostic systems,disease detection,patient tracking,and healthcare operations control.The study looks at the benefits and drawbacks of several machine learning techniques for H-IoT applications.It also examines the fundamental problems,such as data security and cyberthreats,as well as the high processing demands that these systems face.Alongside this,the essay discusses the advantages of all the technologies,including machine learning,deep learning,and the Internet of Things,as well as the significant difficulties and problems that arise when integrating the technology into healthcare forecasts.
文摘The article addresses the problem of the absence of a common language in international communication.Using the example of the UN Security Council session of March 2,2026,dedicated to children in armed conflicts,it analyzes a paradox:all participants speak about the same values but do not hear one another.As a solution,the Philosophical Matrix is proposed-a system of maximally general comparative concepts(the identical,the different,the correlative,the opposite,the orthogonal)that explicates a universal language of thinking,which the author calls the“language of Elohim”.The cultural-historical roots of this language are traced in the first chapter of Genesis,in Heraclitus,in Laozi,and in the Sefer Yetzirah.An analysis of the March 2 speeches allows us to diagnose at which levels of thinking(reason,practical mind,pure mind,wisdom)today’s educators and politicians operate.The conclusion proposes the“Wise School”project as a practical path for returning to the“language of Elohim”through education starting from early childhood.
基金National Natural Science Foundation of China(Grant No.62271202,62027802)Zhejiang Provincial Natural Science Foundation of China(Grant No.LZ25F010004)。
文摘In this paper,we analyze the physical layer security(PLS)performance of a free-space optical(FSO)communication system composed of a transmitting satellite and ground users.Specifically,the FSO fading channels follow the Málaga distribution.Further,we scrutinize the influence of non-zero boresight pointing errors and angle-of-arrival fluctuations on the PLS performance for the first time.We derived the probability density function and cumulative density function of the FSO link,followed by the closed-form expressions of the secrecy outage probability(SOP)and the probability of strictly positive secrecy capacity(SPSC).The asymptotic SOP expression at the high signal-to-noise ratio regime and diversity order are also provided to reveal the physical mechanism of the PLS of the considered system.Finally,Monte Carlo simulation results are presented to verify the correctness of the analytical expressions.The results afford helpful insights for the future design of satellite FSO communication systems.
文摘As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results.
基金funded and supported by the Ongoing Research Funding program(ORF-2025-314),King Saud University,Riyadh,Saudi Arabia.
文摘The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments.
基金National Natural Science Foundation of China,No.42371103Natural Science Basic Research Plan in Shaanxi Province of China,No.2023-JC-YB-229。
文摘Understanding the local ecological security status and its underlying drivers can be used as an effective reference for balancing ecosystem development with societal needs. This study assesses the ecological security of the Loess Plateau(LP) by integrating ecosystem health and ecosystem services, explores the varying impacts of ecosystem structure, quality, and services on ecological security index(ESI), and identifies the key driving factors of ESI using the Geodetector model. The results show that:(1) the average ESI indicates a relatively safe ecological status in LP with a significant increase in ESI observed in 50.21% of the region, largely due to the ecological restoration programs.(2) Natural factors predominantly influence ESI, although human factors play a significant role in the earthy-rocky mountain region and plateau wind-sand region.(3) The interactions between driving factors have a much greater impact on ESI than any single factor, with the interactions between precipitation and human factors being the most influential combination. This study provides a novel perspective on assessing ecological security in LP. We recommend that future ecological restoration efforts should consider the varying roles of ecosystem structure, quality, and services in ESI while tailoring strategies to the primary driving factors based on local conditions.
基金supported in part by Vietnam National Foundation for Science and Technology Development(NAFOSTED)under Grant 102.04-2021.57in part by Culture,Sports and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture,Sports and Tourism in 2024(Project Name:Global Talent Training Program for Copyright Management Technology in Game Contents,Project Number:RS-2024-00396709,Contribution Rate:100%).
文摘Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.
基金Gerhard Hellstern is partly funded by the Ministry of Economic Affairs,Labour and Tourism Baden-Württemberg in the frame of the Competence Center Quantum Computing Baden-Württemberg(QORA Ⅱ).
文摘The rapid advancement of quantum computing has sparked a considerable increase in research attention to quantum technologies.These advances span fundamental theoretical inquiries into quantum information and the exploration of diverse applications arising from this evolving quantum computing paradigm.The scope of the related research is notably diverse.This paper consolidates and presents quantum computing research related to the financial sector.The finance applications considered in this study include portfolio optimization,fraud detection,and Monte Carlo methods for derivative pricing and risk calculation.In addition,we provide a comprehensive analysis of quantum computing’s applications and effects on blockchain technologies,particularly in relation to cryptocurrencies,which are central to financial technology research.As discussed in this study,quantum computing applications in finance are based on fundamental quantum physics principles and key quantum algorithms.This review aims to bridge the research gap between quantum computing and finance.We adopt a two-fold methodology,involving an analysis of quantum algorithms,followed by a discussion of their applications in specific financial contexts.Our study is based on an extensive review of online academic databases,search tools,online journal repositories,and whitepapers from 1952 to 2023,including CiteSeerX,DBLP,Research-Gate,Semantic Scholar,and scientific conference publications.We present state-of-theart findings at the intersection of finance and quantum technology and highlight open research questions that will be valuable for industry practitioners and academicians as they shape future research agendas.
文摘To solve the contradiction between supply and demand of land, the con- struction of land resource security guarantee system is an important part to coordi- nate the economic development and cultivated land protection in the core grain pro- duction region. Based on the deep analysis on the land resources characteristics and problems using the combined method of literature review method with qualita- tive and quantitative analysis, we constructed the land resource security system for different categories according to the land use principles of optimization, intensivism, improvement, and overall planning, and proposed the corresponding supporting mea- sures. The results showed that controlling the new increase, promoting the reclama- tion and improvement of land are the basis for land resource security, clearing the idle, improving the utilization rate of stock are the core of the efficient use of land resources, and establishing a unified urban and rural construction land market is the key to promoting the economical and intensive utilization of land resources, provid- ing scientific basis for the sustainable utilization of land resources in the core grain production regions.
文摘Based on the characteristics of ATM system and the special requirement of financial transaction, an overall design of hardware and software structure of ATM was made. For software structure, the pattern of modules and table? drive is adopted to realize the security of financial transaction and the diagnosis of communication fault. A new method, which is based on the application layer, transport layer and network layer, is used for diagnosing communication fault. Supporting both magnetic card and IC card, the system has been put into use in real financial systems, and has brought about both economic and social effects.
基金The National Natural Science Foundation of China(No.71071033)
文摘The impact of risk correlation on firm's investments in information system security is studied by using quantification models combining the ideas of the risk management theory and the game theory. The equilibrium levels of self-protection and insurance coverage under the non- cooperative condition are compared with socially optimal solutions, and the associated coordination mechanisms are proposed. The results show that self-protection investment increases in response to an increase in potential loss when the interdependent risk is small; the interdependent risk of security investments often induce firms to underinvest in security relative to the socially efficient level by ignoring marginal external costs or benefits conferred on others. A subsidy on self-protection investment from the government can help coordinate a firm's risk management decision and, thereby, improve individual security level and overall social welfare.
基金funded by National Natural Science Foundation Project (40801077)Ministry of Education Key Project (209100)+1 种基金Natural Science Foundation of Chongqing ( CSTC, 2008BB7367 )Chongqing Municipal Education Commission of Science and Technology Research Grant Project (KJ070811)~~
文摘The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological security dynamic monitoring,ecological security appraisal,ecological security forecast and ecological security decision-making management. The synthetic evaluation indicator system of the ecological security quality were initially established,which includes ecological environment pollution,land use and land cover change,geological hazard and epidemic outbreaks. At the same time,29 evaluating indicators were selected,divides into the basic factors,response factors and inducing factors,which need to be Real-time monitored.
文摘Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
文摘ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions.Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.
文摘How to comprehensively consider the power flow constraints and various stability constraints in a series of power system optimization problems without affecting the calculation speed is always a problem.The computational burden of probabilistic security assessment is even more unimaginable.In order to solve such problems,a security region(SR)methodology is proposed,which is a brand-new methodology developed on the basis of the classical point-wise method.Tianjin University has been studying the SR methodology since the 1980s,and has achieved a series of original breakthroughs that are described in this paper.The integrated SR introduced in this paper is mainly defined in the power injection space,and includes SRs to ensure steady-state security,transient stability,static voltage stability,and smalldisturbance stability.These SRs are uniquely determined for a given network topology(as well as location and clearing process for transient faults)and given system component parameters,and are irrelevant to operation states.This paper presents 11 facts and related remarks to introduce the basic concepts,composition,dynamics nature,and topological and geometric characteristics of SRs.It also provides a practical mathematical description of SR boundaries and fast calculation methods to determine them in a concise and systematic way.Thus,this article provides support for the systematic understanding,future research,and applications of SRs.The most critical finding on the topological and geometric characteristics of SRs is that,within the scope of engineering concern,the practical boundaries of SRs in the power injection space can be approximated by one or a few hyperplanes.Based on this finding,the calculation time for power system probabilistic security assessment(i.e.,risk analysis)and power system optimization with security constraints can be decreased by orders of magnitude.
基金jointly supported by the Key Project of the Natural Science Foundation of Guizhou Province(No.Qiankehe Jichu-ZK[2023]Zhongdian027)the Project of the Science and Technology Innovation Base Construction of Guizhou Province(No.Qiankehe Zhongyindi[2023]005)Philosophy and Social Science Planning Subjects in Guizhou Province in 2022(No.22GZYB53)。
文摘Ecological security provides the basis of maintaining both a sustainable regional ecosystem and economic development.However,few studies have focused on how the features such as topography and geomorphology,lithologic stratigraphic assemblages,and geohazard distribution affect the construction of ecological security patterns and the layout of optimization measures.In order to comprehensively reveal the key areas and key objects of ecological restoration in karst basins,this study takes the Beipan River Basin(BRB)as an example,constructs an ecological security pattern(ESP)based on the methods of morphological spatial pattern analysis(MSPA),landscape connectivity analysis and circuit theory,and lays out the optimization measures in combination with the spatial distribution characteristics of topographic and geomorphological differences and lithological stratigraphic combinations.The results show that 151 ecological sources,343 ecological corridors,121 pinch points and 178 barriers constitute the ESP of the BRB.Lithology is closely related to the spatial distribution characteristics of ecological source sites.Level 1 and 2 ecological sources(The ecological sources were categorized into level 1,level 2,and level 3 source from high to low importance.)are concentrated in the Emeishan basalt region of the upstream and the clastic and impure carbonate rock region of the downstream part of the BRB;level 3ecological sources are concentrated in the carbonate rock region of the midstream.Taking into account the outstanding ecological problems in the basin,and based on the characteristics of lithology and geohazard distribution,we propose the optimization scheme of“three axes,three zones and multiple points”for the ESP and the layout of specific measures of the BRB.The results can provide scientific references for maintaining ecological security maintenance in karst ecologically fragile areas.