Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq...Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.展开更多
With the development of minimally invasive gynecological technology,hysteroscopic surgery has been widely used in the treatment of gynecological diseases due to its advantages of rapid recovery and minimal trauma.From...With the development of minimally invasive gynecological technology,hysteroscopic surgery has been widely used in the treatment of gynecological diseases due to its advantages of rapid recovery and minimal trauma.From the perspective of patients undergoing hysteroscopic surgery,this paper explores the influence of their psychological security on quality of life,analyzes the mediating effect of social support,and puts forward specific countermeasures and suggestions.The purpose is to improve the psychological security and quality of life of patients undergoing hysteroscopic surgery,and provide reference for the subsequent development of hysteroscopic surgery.展开更多
The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavio...The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavior of vulnerability with respect to time will give us a great advantage. Such understanding will help us to avoid exploitations and introduce patches for a particular vulnerability before the attacker takes the advantage. Utilizing the proposed model one can identify the risk factor of a specific vulnerability being exploited as a function of time. Measuring of the risk factor of a given vulnerability will also help to improve the security level of software and to make appropriate decisions to patch the vulnerability before an exploitation takes place.展开更多
AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed m...AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed mood. METHODS: Participants were 67 patients diagnosed with International Classification of Diseases, Tenth edition AJD with depressed mood, who completed standardised self-report questionnaires measuring study variables. Mean scores and SDs were computed for the outcome and predictor measures. Pearson correlations among the measures were computed. The study hypotheses were tested using analysis of variance(ANOVA) and multiple regression analyses. All analyses were performed using the SPSS-17 software package(SPSS Inc., Chicago, IL, United States).RESULTS: ANOVA showed a significant main effect of the insecure attachment styles on depression symptom severity and life satisfaction scores. The results suggestthat depressive symptoms were more severe(F = 4.13, df = 2.67, P < 0.05) and life satisfaction was poorer(F = 5.69, df = 2.67, P < 0.01) in both anxious-ambivalently and avoidantly attached patients compared with their securely attached counterparts, whereas the two insecure groups did not significantly differ by these variables. The anxious/ambivalent attachment style and depression symptom severity significantly contributed to HRQo L, accounting for 21.4% and 29.7% of the total variance, respectively [R2 = 0.79; Adjusted R2 = 0.77; F(5, 67) = 33.68, P < 0.0001], even after controlling for gender, marital and employment status confounders.CONCLUSION: The results show that the anxious/ambivalent attachment style together with depression symptom severity substantially and independently predict the HRQo L outcome in AJD with depressed mood.展开更多
To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in t...To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in the world, has great significance. Through deep investigation in ten cities, the thesis has normatively evaluated current situations, characteristics, advantages and disadvantages of basic life security program for land-expropriated farmers in Zhejiang. Furthermore, it put forward some academic suggestions to further perfect and improve the system.展开更多
Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average tha...Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average than their food secure counterparts. Since the Great Recession, more attention has been given to the topic of hunger and food insecurity among college students;however, the literature still lacks a comprehensive examination of various issues facing today’s college students. Using a multi-systems life course (MSLC) perspective, this paper provides a conceptual explanation of the lived experience of college students by offering a better understanding of the unique challenges faced by this population. Findings from this study will assist researchers, practitioners, and university administrators in their efforts to address hunger among this population.展开更多
Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with...Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with 11 participants, refugee women residing in the state of Rio de Janeiro, Brazil. Results: The meanings and feelings evidenced in the life narratives of refugee women expressed the insecurities and weaknesses with food in the resettlement. Final Considerations: Given the meanings and feelings regarding food in the refuge, it is expected that the present study will contribute to the elaboration of new action plans and intersectoral public policies of agile action to meet the demands of the refugee population, in the attempt to mitigate starvation, poverty, social differences and the compromised health status of the refugee population.展开更多
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa...As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.展开更多
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr...Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework.展开更多
Healthy life expectancy is a pivotal measure of population health by integrating both life expectancy and the quality of years lived.A significant increase in life expectancy was evident in most populations during the...Healthy life expectancy is a pivotal measure of population health by integrating both life expectancy and the quality of years lived.A significant increase in life expectancy was evident in most populations during the past decades worldwide[1],but the growth in healthy life expectancy has generally lagged behind[2].China has made substantial strides in enhancing both life expectancy and healthy life expectancy.展开更多
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)...Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives.展开更多
Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in ...Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in the middle reaches has degraded water quality.Rapid urbanization has further caused habitat fragmentation and biodiversity loss.Collectively,these challenges threaten human well-being and hinder sustainable development,making the construction and optimization of an ecological security pattern(ESP)urgently necessary.However,existing studies often fail to systematically integrate future landscape ecological risk(LER)assessment with ESP optimization.This study evaluated regional LER using the“ecological patches-ecological resistance surface(ERS)-ecological corridor”framework,combined with land-use predictions under three development scenarios,and optimized the ESP by adjusting the ERS and extracting ecological corridors.The results indicate that the LER in the WRB follows an“inverted N”distribution,with low-risk areas concentrated in forested mountain regions and high-risk areas mainly in cultivated land subject to intensive human activity.Across future scenarios,ESPs showed fewer ecological breakpoints and improved landscape connectivity than the 2020 baseline.Scenario-based differences emerged in the spatial configuration of ERS adjustments,with the ecological protection scenario yielding the lowest LER and most favorable ESP.This study demonstrates the deep integration of multi-scenario simulation with LER assessment,providing a new framework for ESP optimization.The findings have guiding significance for ecological protection and coordinated development in the WRB and offer a novel paradigm for sustainable development in ecologically fragile basins worldwide.展开更多
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B...Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years.展开更多
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser...The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.展开更多
In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced....In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced.Frequent regional conflicts and political instability have triggered a deep sense of insecurity,while latent risks have emerged one after another,exacerbating turbulence and disorder.Some countries still cling to a zero-sum mindset,selectively applying or discarding international rules based on their interests.Hegemonism and unilateralism have severely undermined the UN-centered international system,leading to a resurgence of geopolitical rivalry and intensified bloc confrontation.The provision of global public goods remains severely inadequate,security risks continue to accumulate,and the journey toward effective global security governance remains long and challenging.展开更多
Background:The level of premature deaths(deaths among those aged 30-69 years)caused by cancer is an important indicator of evaluating the level of cancer prevention and control.However,the current burden and temporal ...Background:The level of premature deaths(deaths among those aged 30-69 years)caused by cancer is an important indicator of evaluating the level of cancer prevention and control.However,the current burden and temporal trends in cancer-related premature deaths,and their impact on life expectancy at the global,regional,and national levels are not clear.Methods:Cancer mortality data for 185 countries were obtained from the GLOBOCAN 2022 database.High-quality cancer mortality data and national population statistics for 47 countries were extracted from the United Nations and national cancer registry databases,covering the period 2003-2022.Countries were classified based on the human development index(HDI).The death probability,the year of life lost(YLL),and the potential gain in life expectancy(PGLE)attributable to premature deaths from site-specific and all-cancers combined were calculated.Results:Globally,the probability of premature cancer deaths was 6.49%(95%UI 6.49-6.50).The YLLs caused by cancer-related premature death were 163.86 million(95%UI 163.70-164.03),constituting 65.58%of the total cancer-related YLLs.The PGLEs were 1.16 years(95%UI 1.16-1.16).The premature death probability increased with higher HDI levels in men,but decreased in women.Cancer-related premature deaths as a proportion of total cancer deaths varied from 18.31%(95%UI 18.20-18.43)in Japan to 84.44%(95%UI 76.10-91.16)in São Toméand Príncipe.Lung cancer was the leading cause of cancer-related premature deaths in men,and breast cancer ranked first in women.By eradicating premature deaths attributable to lung,liver,colorectal,and stomach cancer in men,and to breast,cervical,and lung cancer in women,0.55 years(95%UI 0.55-0.55)and 0.49 years(95%UI 0.49-0.49)of PGLEs could be achieved,accounting for 48.67%and 42.24%of the total PGLEs,respectively.Cancer-related premature deaths decreased significantly in 38 countries during 2003-2022(P<0.05).The probability of premature cancer-related deaths decreased by more than 15.50%from 2015 to 2022 in 16 countries.Conclusions:Cancer-related premature deaths declined in many countries,with 16 of them having achieved the expected reduction by 2022.The current burden of cancer-related premature deaths is profound but varies around the world.Eliminating premature deaths from major cancer types could substantially increase life expectancy,underscoring the importance of prevention and treatment efforts for these cancers.展开更多
The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by Ch...The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by China provides theoretical guidance and practical paths for China’s participation in Middle East security governance.China’s engagement in Middle East security governance not only meets the expectations of Middle East countries but also fully demonstrates its responsibility as a major country,which is of great significance for China to explore participation in global security governance and address the global security deficit.展开更多
Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects ...Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens.展开更多
中国语际翻译的历史最早可以追溯到西汉时期,但当时翻译的主要内容都是佛经,直到清朝才出现了第一首被译成中文的英语诗歌——A Psalm of Life。而清朝至今,这首诗已有多个译本。在20世纪70年代,德国学者凯瑟琳娜·赖斯在其著作《...中国语际翻译的历史最早可以追溯到西汉时期,但当时翻译的主要内容都是佛经,直到清朝才出现了第一首被译成中文的英语诗歌——A Psalm of Life。而清朝至今,这首诗已有多个译本。在20世纪70年代,德国学者凯瑟琳娜·赖斯在其著作《翻译批评——潜力与制约》中,提出了以文本类型为导向,结合语言内因素(语言范畴)、语言外因素(语用范畴)和功能因素(功能范畴)的翻译批评模式。因此,基于赖斯的翻译批评模式,文章从文本类型、语言范畴、语用范畴和功能范畴四方面对黄新渠、黄杲炘和黄一宁三人的译本进行对比赏析。通过分析发现,三人的译本基本都再现了原文的内容和风格,句式、节奏上也基本与原文保持一致;而在语义、词汇、语法和文体上,每一译本都有其各自的优点。此外,译本的语用和功能因素也显著影响了翻译策略的选择。展开更多
文摘Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.
文摘With the development of minimally invasive gynecological technology,hysteroscopic surgery has been widely used in the treatment of gynecological diseases due to its advantages of rapid recovery and minimal trauma.From the perspective of patients undergoing hysteroscopic surgery,this paper explores the influence of their psychological security on quality of life,analyzes the mediating effect of social support,and puts forward specific countermeasures and suggestions.The purpose is to improve the psychological security and quality of life of patients undergoing hysteroscopic surgery,and provide reference for the subsequent development of hysteroscopic surgery.
文摘The objective of the present study is to propose a risk evaluation statistical model for a given vulnerability by examining the Vulnerability Life Cycle and the CVSS score. Having a better understanding of the behavior of vulnerability with respect to time will give us a great advantage. Such understanding will help us to avoid exploitations and introduce patches for a particular vulnerability before the attacker takes the advantage. Utilizing the proposed model one can identify the risk factor of a specific vulnerability being exploited as a function of time. Measuring of the risk factor of a given vulnerability will also help to improve the security level of software and to make appropriate decisions to patch the vulnerability before an exploitation takes place.
基金Supported by(in part)The Ministry of Immigrant Absorption to Dr.Ponizovsky AM
文摘AIM: To examine the individual contributions of insecure attachment styles and depression symptom severity to health-related quality of life(HRQo L) in patients diagnosed with adjustment disorder(AJD) with depressed mood. METHODS: Participants were 67 patients diagnosed with International Classification of Diseases, Tenth edition AJD with depressed mood, who completed standardised self-report questionnaires measuring study variables. Mean scores and SDs were computed for the outcome and predictor measures. Pearson correlations among the measures were computed. The study hypotheses were tested using analysis of variance(ANOVA) and multiple regression analyses. All analyses were performed using the SPSS-17 software package(SPSS Inc., Chicago, IL, United States).RESULTS: ANOVA showed a significant main effect of the insecure attachment styles on depression symptom severity and life satisfaction scores. The results suggestthat depressive symptoms were more severe(F = 4.13, df = 2.67, P < 0.05) and life satisfaction was poorer(F = 5.69, df = 2.67, P < 0.01) in both anxious-ambivalently and avoidantly attached patients compared with their securely attached counterparts, whereas the two insecure groups did not significantly differ by these variables. The anxious/ambivalent attachment style and depression symptom severity significantly contributed to HRQo L, accounting for 21.4% and 29.7% of the total variance, respectively [R2 = 0.79; Adjusted R2 = 0.77; F(5, 67) = 33.68, P < 0.0001], even after controlling for gender, marital and employment status confounders.CONCLUSION: The results show that the anxious/ambivalent attachment style together with depression symptom severity substantially and independently predict the HRQo L outcome in AJD with depressed mood.
基金This project was supported by China Postdoctoral Science Foundation(2003034067) and Ministry of Education Philosophy and Social Science Importance Program of China. Thanks Mr. Naizhong Huang and Mr. Yongshui Zhou, the division chief of rural life security in the Department of Zhejiang Labor and Social Security for their support.
文摘To set up basic life security program (BLSP) for land-expropriated farmers in the process of urbanization is an effective measure to solve existing issues in China. Theprogram, which Zhejiang Province initiated in the world, has great significance. Through deep investigation in ten cities, the thesis has normatively evaluated current situations, characteristics, advantages and disadvantages of basic life security program for land-expropriated farmers in Zhejiang. Furthermore, it put forward some academic suggestions to further perfect and improve the system.
文摘Empirical studies have shown a distinct relationship between academic performance and food insecurity in college students. Specifically, food-insecure students are more likely to report a lower grade point average than their food secure counterparts. Since the Great Recession, more attention has been given to the topic of hunger and food insecurity among college students;however, the literature still lacks a comprehensive examination of various issues facing today’s college students. Using a multi-systems life course (MSLC) perspective, this paper provides a conceptual explanation of the lived experience of college students by offering a better understanding of the unique challenges faced by this population. Findings from this study will assist researchers, practitioners, and university administrators in their efforts to address hunger among this population.
文摘Objective: To understand, based on the life narratives of refugee women, food and nutritional security. Method: Qualitative, descriptive, exploratory study, Narratives of life method, by Daniel Bertaux. Conducted with 11 participants, refugee women residing in the state of Rio de Janeiro, Brazil. Results: The meanings and feelings evidenced in the life narratives of refugee women expressed the insecurities and weaknesses with food in the resettlement. Final Considerations: Given the meanings and feelings regarding food in the refuge, it is expected that the present study will contribute to the elaboration of new action plans and intersectoral public policies of agile action to meet the demands of the refugee population, in the attempt to mitigate starvation, poverty, social differences and the compromised health status of the refugee population.
文摘As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.
基金supported by scientific research projects of China Academy of Railway Sciences Co.,Ltd.(grant no.2024YJ117).
文摘Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework.
文摘Healthy life expectancy is a pivotal measure of population health by integrating both life expectancy and the quality of years lived.A significant increase in life expectancy was evident in most populations during the past decades worldwide[1],but the growth in healthy life expectancy has generally lagged behind[2].China has made substantial strides in enhancing both life expectancy and healthy life expectancy.
基金appreciation to the National Natural Science Foundation of China(72071074)Natural Science Foundation of Hunan Province,China(2025JJ30031)for their financial support。
文摘Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives.
基金supported by the National Natural Science Foundation of China[Grant No.42361040].
文摘Under the influence of human activities,landscape fragmentation in the Wei River Basin(WRB)has become increasingly severe.Upstream development has intensified soil erosion,and industrial and agricultural pollution in the middle reaches has degraded water quality.Rapid urbanization has further caused habitat fragmentation and biodiversity loss.Collectively,these challenges threaten human well-being and hinder sustainable development,making the construction and optimization of an ecological security pattern(ESP)urgently necessary.However,existing studies often fail to systematically integrate future landscape ecological risk(LER)assessment with ESP optimization.This study evaluated regional LER using the“ecological patches-ecological resistance surface(ERS)-ecological corridor”framework,combined with land-use predictions under three development scenarios,and optimized the ESP by adjusting the ERS and extracting ecological corridors.The results indicate that the LER in the WRB follows an“inverted N”distribution,with low-risk areas concentrated in forested mountain regions and high-risk areas mainly in cultivated land subject to intensive human activity.Across future scenarios,ESPs showed fewer ecological breakpoints and improved landscape connectivity than the 2020 baseline.Scenario-based differences emerged in the spatial configuration of ERS adjustments,with the ecological protection scenario yielding the lowest LER and most favorable ESP.This study demonstrates the deep integration of multi-scenario simulation with LER assessment,providing a new framework for ESP optimization.The findings have guiding significance for ecological protection and coordinated development in the WRB and offer a novel paradigm for sustainable development in ecologically fragile basins worldwide.
文摘Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years.
文摘The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation.
文摘In 2025,the global landscape has undergone profound transformations,with the international architecture continuing to adjust.The fragility and uncertainty of international security have become increasingly pronounced.Frequent regional conflicts and political instability have triggered a deep sense of insecurity,while latent risks have emerged one after another,exacerbating turbulence and disorder.Some countries still cling to a zero-sum mindset,selectively applying or discarding international rules based on their interests.Hegemonism and unilateralism have severely undermined the UN-centered international system,leading to a resurgence of geopolitical rivalry and intensified bloc confrontation.The provision of global public goods remains severely inadequate,security risks continue to accumulate,and the journey toward effective global security governance remains long and challenging.
基金supported by the Capital’s Funds for Health Improvement and Research(CFH2024-2G-40214)the CAMS Innovation Fund for Medical Sciences(2021-I2M-1-011,2021-I2M-1-061).
文摘Background:The level of premature deaths(deaths among those aged 30-69 years)caused by cancer is an important indicator of evaluating the level of cancer prevention and control.However,the current burden and temporal trends in cancer-related premature deaths,and their impact on life expectancy at the global,regional,and national levels are not clear.Methods:Cancer mortality data for 185 countries were obtained from the GLOBOCAN 2022 database.High-quality cancer mortality data and national population statistics for 47 countries were extracted from the United Nations and national cancer registry databases,covering the period 2003-2022.Countries were classified based on the human development index(HDI).The death probability,the year of life lost(YLL),and the potential gain in life expectancy(PGLE)attributable to premature deaths from site-specific and all-cancers combined were calculated.Results:Globally,the probability of premature cancer deaths was 6.49%(95%UI 6.49-6.50).The YLLs caused by cancer-related premature death were 163.86 million(95%UI 163.70-164.03),constituting 65.58%of the total cancer-related YLLs.The PGLEs were 1.16 years(95%UI 1.16-1.16).The premature death probability increased with higher HDI levels in men,but decreased in women.Cancer-related premature deaths as a proportion of total cancer deaths varied from 18.31%(95%UI 18.20-18.43)in Japan to 84.44%(95%UI 76.10-91.16)in São Toméand Príncipe.Lung cancer was the leading cause of cancer-related premature deaths in men,and breast cancer ranked first in women.By eradicating premature deaths attributable to lung,liver,colorectal,and stomach cancer in men,and to breast,cervical,and lung cancer in women,0.55 years(95%UI 0.55-0.55)and 0.49 years(95%UI 0.49-0.49)of PGLEs could be achieved,accounting for 48.67%and 42.24%of the total PGLEs,respectively.Cancer-related premature deaths decreased significantly in 38 countries during 2003-2022(P<0.05).The probability of premature cancer-related deaths decreased by more than 15.50%from 2015 to 2022 in 16 countries.Conclusions:Cancer-related premature deaths declined in many countries,with 16 of them having achieved the expected reduction by 2022.The current burden of cancer-related premature deaths is profound but varies around the world.Eliminating premature deaths from major cancer types could substantially increase life expectancy,underscoring the importance of prevention and treatment efforts for these cancers.
文摘The Middle East has long been in turmoil,and the new round of the Palestinian-Israeli conflict has further highlighted the urgency of security governance in the region.The Global Security Initiative(GSI)proposed by China provides theoretical guidance and practical paths for China’s participation in Middle East security governance.China’s engagement in Middle East security governance not only meets the expectations of Middle East countries but also fully demonstrates its responsibility as a major country,which is of great significance for China to explore participation in global security governance and address the global security deficit.
文摘Sea lines of communication(SLOCs)security has long been a strategic concern for major powers.Following the establishment of the People’s Republic of China,the country’s focus was on the traditional security aspects of its SLOCs.Since the reform and opening-up era-and especially after the end of the Cold War-China has shifted its emphasis toward economic security.China’s SLOCs security bears on multiple dimensions of a holistic approach to national security,encompassing economic security,the safety of its citizens.
文摘中国语际翻译的历史最早可以追溯到西汉时期,但当时翻译的主要内容都是佛经,直到清朝才出现了第一首被译成中文的英语诗歌——A Psalm of Life。而清朝至今,这首诗已有多个译本。在20世纪70年代,德国学者凯瑟琳娜·赖斯在其著作《翻译批评——潜力与制约》中,提出了以文本类型为导向,结合语言内因素(语言范畴)、语言外因素(语用范畴)和功能因素(功能范畴)的翻译批评模式。因此,基于赖斯的翻译批评模式,文章从文本类型、语言范畴、语用范畴和功能范畴四方面对黄新渠、黄杲炘和黄一宁三人的译本进行对比赏析。通过分析发现,三人的译本基本都再现了原文的内容和风格,句式、节奏上也基本与原文保持一致;而在语义、词汇、语法和文体上,每一译本都有其各自的优点。此外,译本的语用和功能因素也显著影响了翻译策略的选择。