6,300 results on '"Countermeasures"'
Search Results
2. Applying the Health Belief Model to mobile device distracted driving
- Author
-
Cox, Aimee E., Cicchino, Jessica B., Reagan, Ian J., and Zuby, David S.
- Published
- 2024
- Full Text
- View/download PDF
3. Characteristics and mechanisms of as well as evaluation methods and countermeasures for thermal runaway propagation in lithium-ion batteries
- Author
-
Ouyang, Dongxu, Chung, Yi-Hong, Liu, Jialong, Bai, Jinlong, Zhou, Yuxin, Chen, Shichen, Wang, Zhirong, and Shu, Chi-Min
- Published
- 2025
- Full Text
- View/download PDF
4. Washing with buffered vitamin C after corrosive chemical (sodium hypochlorite) exposure reduces ocular depth of injury
- Author
-
Lebrun, Stewart, Nguyen, Linda, Romero, Joana, and Chan, Roxanne
- Published
- 2025
- Full Text
- View/download PDF
5. Anticipatory vibrotactile cues reduce motion sickness in car passengers during stop-and-go driving
- Author
-
Kehl, Leonie, Brietzke, Adrian, Pham Xuan, Rebecca, and Hecht, Heiko
- Published
- 2024
- Full Text
- View/download PDF
6. Developing improved crash prevention approaches through in-depth investigation of motorcycle crash causation patterns
- Author
-
Kome Fondzenyuy, Stephen, Shingo Usami, Davide, González-Hernández, Brayan, Brown, Laurie, Morris, Andrew, and Persia, Luca
- Published
- 2024
- Full Text
- View/download PDF
7. Development of a policy and regulatory framework for mitigating cyberfraud in the South African banking industry
- Author
-
Akinbowale, Oluwatoyin Esther, Klingelhöfer, Heinz Eckart, Zerihun, Mulatu Fekadu, and Mashigo, Polly
- Published
- 2024
- Full Text
- View/download PDF
8. Can the deposit-return scheme promote recycling of waste PV modules in China? Analysis of an evolutionary game
- Author
-
Miao, Shule, Zhang, Qin, Liu, Caijie, and Wang, Lei
- Published
- 2023
- Full Text
- View/download PDF
9. Research on the Application and Countermeasures of Metaverse Technology in Retail Service
- Author
-
Li, Yulin, Cheng, Liangbin, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Xing, Chunxiao, editor, Lai, Jiacai, editor, and Zhang, Liang-Jie, editor
- Published
- 2025
- Full Text
- View/download PDF
10. An Overview of Security Issues for Blockchain Based Distributed Applications
- Author
-
Papageorgiou, Konstantinos, Fakis, Alexandros, Spathoulas, Georgios, Kakarountas, Athanasios, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Pitropakis, Nikolaos, editor, and Katsikas, Sokratis, editor
- Published
- 2025
- Full Text
- View/download PDF
11. 城市轨道交通运营期可持续发展 困境及对策.
- Author
-
石凤蓉
- Abstract
Copyright of Modern Urban Transit is the property of Modern Urban Transit Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2025
- Full Text
- View/download PDF
12. НАПРЯМИ ОТРИМАННЯ ОПЕРАТИВНО-РОЗШУКОВОЇ ІНФОРМАЦІЇ ОПЕРАТИВНИМИ ПРАЦІВНИКАМИ У ПРОТИДІЇ ЗЛОЧИНАМ, ЩО ВЧИНЯЮТЬСЯ МОЛОДДЮ В УМОВАХ ВОЄННОГО СТАНУ
- Author
-
В. М., Бабакін and Ю. Д., Борисенко
- Subjects
JUVENILE delinquency ,MARTIAL law ,LAW enforcement agencies ,CRIME forecasting ,INTERAGENCY coordination - Abstract
This article explores the vital issue of obtaining actionable operational and investigative information by law enforcement operatives to combat crimes committed by youth under the conditions of martial law. The study examines the challenges faced in implementing operational and investigative measures during wartime and outlines strategies to address these difficulties. Particular attention is given to the need for adapting operational approaches to wartime realities and strengthening coordination among operational units in combating youth crime. The authors analyze the specific dynamics of the operational environment that have emerged as a result of military actions. The article highlights the necessity of conducting systematic assessments of the operational situation, including the analysis and forecasting of crime trends within service areas. This enables the development and implementation of targeted operational and investigative measures to counteract youth crime effectively. Timely identification of new threats, both internal and external, is critical for adjusting operational tactics to martial law conditions. The study examines key methods for obtaining operationally significant information, such as confidential informants, undercover operations, strategic operational combinations, and advanced technical measures. It identifies problematic aspects of operational and investigative activities under martial law and proposes methods to overcome these challenges. The authors stress the importance of establishing robust interagency cooperation among law enforcement agencies and other relevant entities. The timely exchange of information and coordinated operational-preventive actions are essential for preventing and solving youth crimes. The article also discusses contentious issues in the field and offers recommendations for improving operational practices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. ФІНАНСУВАННЯ ТЕРОРИЗМУ: МІЖНАРОДНІ СТРАТЕГІЇ ПРОТИДІЇ ТА ЇХНІЙ ВПЛИВ НА УКРАЇНУ
- Author
-
І. В., Ткачов and Ю. О., Ільченко
- Subjects
INTERNATIONAL cooperation ,GOVERNMENT agencies ,INTERNATIONAL relations ,INTERNATIONAL agencies ,FINANCIAL security ,MONEY laundering ,TERRORIST organizations - Abstract
The financing of terrorism is one of the most pressing issues of modernity, requiring a comprehensive approach to counteract. This paper examines the primary mechanisms by which terrorist organizations acquire resources, as well as the effectiveness of international regulation in this area. Special attention is given to the activities of international organizations such as FATF, G20, and IMF, which set standards and recommendations for countries seeking to ensure financial security. The study explores how these organizations shape the frameworks for national financial monitoring systems and emphasizes the importance of international cooperation in preventing terrorist financing. The article also analyzes the regulatory frameworks governing the financing of terrorism, including United Nations Security Council resolutions and FATF recommendations. It is revealed that these documents outline the fundamental principles and requirements for countries to pursue effective financial monitoring policies. However, despite active efforts at the international level, many countries face significant challenges. The paper investigates issues related to insufficient technical infrastructure for detecting complex financial schemes, corruption, and poor coordination among state agencies. The existence of such challenges significantly complicates the implementation of effective strategies to counter terrorist financing. Examples of financing for terrorist organizations and their international regulation are discussed, demonstrating the need for further enhancement of legal mechanisms and practices in this area. Ensuring effective countermeasures against terrorist financing can only be achieved through the collective efforts of states, international organizations, and financial institutions, highlighting the importance of global responsibility in this matter. The article reveals the objective and subjective side of the crime «financing of terrorism», material support of a terrorist group or organization is characterized. The recommendations of the Financial Action Task Force to Combat Money Laundering (FATF) are analyzed and their influence on the formation of states' approaches, including of Ukraine to combat the financing of ter rorism. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Lower Body Negative Pressure Exposure—as Perspective Countermeasure for Moon Missions.
- Author
-
Fomina, Elena, Romanov, Pavel, Burakova, Anna, Ganicheva, Anna, Senatorova, Natalia, Bakhtereva, Vera, Kokueva, Maria, Alferova, Irina, Shushunova, Tatiana, Grishin, Alexey, Vasin, Alexandr, Polyakov, Alexey, Yarmanova, Zhana, Lemeshko, Yegor, Vasilevskaya, Marina, Kharlamov, Maksim, and Orlov, Oleg
- Abstract
According to the existing scenarios of interplanetary missions, the Moon is considered as an intermediate base on the way to deep space. In order to prepare for landing and work on the Moon, it is important to study the applicability of countermeasures in such missions. The paper presents the results of a pilot study performed during a short-term spaceflight (12 days). A new experience of using countermeasure impacts of lower body negative pressure (LBNP) at the early stages of adaptation to microgravity conditions has been gained. To assess the effectiveness of LBNP and changes in human physical performance after the spaceflight, we conducted tests on a treadmill, a bicycle ergometer, and testing with model tasks of on-planetary activity "express test". Regulatory mechanisms of the cardiovascular system proved to be quite effective when creating decompression up to -20 mm Hg, which is less than in preparation for returning to Earth. In the treadmill test, a lower speed was achieved after the spaceflight than before (13 km/h and 15 km/h, respectively) and cardiovascular system response to the change in load was slower. At the same time changes in such physiological parameters as oxygen consumption, respiratory rate and pulmonary ventilation were minimal. In the bicycle ergometer test, peak heart rate values were higher after the spaceflight than before, the physiological value of the standard exercise increased. «Express test» showed the positive dynamics from the first day to the third after returning to Earth: the performance of a dual task, the task of controlling the movement of the non-leading hand, and getting up from the supine position improved. Thus, assessment of the state of gravity-dependent physiological systems after short-term flight indicates the decrease of functional reserves of the organism and the necessity to develop appropriate countermeasures. The study was one of the first steps in the development of new medical control operations at the stage of paradigm shift from orbital flights to deep space exploration. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Key challenges and countermeasures: a review of undergraduate teaching of neurology in outpatient settings
- Author
-
Jiaqian Zhu, Jingyi Huang, Yunhan Cao, and Liming Cao
- Subjects
Neurology ,Outpatient setting ,Teaching ,Current situation ,Countermeasures ,Special aspects of education ,LC8-6691 ,Medicine - Abstract
Abstract In the modern medical education system, teaching of clinical neurology in outpatient settings is crucial for training future neurologists. The neurology outpatient clinic is a pivotal setting for both initial consultations and follow-up visits. It plays a significant role in the prevention, diagnosis, treatment, and ongoing monitoring of neurological disorders, and is a critical platform for clinical education. Under the guidance of experienced physicians during their clinical rotations, medical students enhance their clinical reasoning ability and skills by learning about the diagnosis and treatment of neurological diseases, thereby laying a solid foundation for becoming competent doctors. Despite the advancements in this field, there is a lack of comprehensive reports on the current status and challenges of teaching neurology in outpatient settings. This gap significantly impedes the development of scientific policies to improve teaching standards. We need to clarify the existing issues to develop effective strategies, such as actively embracing advanced educational achievements and experiences, continuously refining teaching models and methods, and enhancing the quality of education, to cultivate more outstanding medical professionals. This article summarizes the current state and issues of teaching clinical neurology in outpatient settings, and analyzes countermeasures to provide a foundation for future practice and study.
- Published
- 2025
- Full Text
- View/download PDF
16. Safeguarding Nigeria: strategies for combating insurgency and terrorism
- Author
-
O. O. Awotayo, N. O. Yusuf, and S. O. Adedayo
- Subjects
strategies ,security ,insurgency ,banditry ,terrorism ,countermeasures ,peace and development. ,Law in general. Comparative and uniform law. Jurisprudence ,K1-7720 - Abstract
The paper appraises the strategic responses by Nigeria’s government to the intractable difficulties posed by insurgency, banditry, and terrorism experienced largely in its northern parts, identifying key initiatives such as the establishment of the 7th Division of the Nigerian Army, among other international and local collaborations and initiatives like the Civilian Joint Task Force. Another contentious issue is the vote of support by the National Assembly for a proposal to engage mercenaries in defence, reflecting the ongoing debate over security measures. The methodological approach of the paper is qualitative, with thematic analysis of data from secondary sources such as newspapers, books, and academic journals. The findings indicate that Nigeria’s security strategy is largely reactive, failing to address the fundamental root causes of violence, which are socio-economic disparities, political marginalisation, and historical grievances. The limitations of ad hoc security policies are evident; they tend to favour short-term solutions over long-term stability. Notably, it is such options for employing mercenaries that have been strongly challenged, especially regarding the implications of the alternatives on national sovereignty and in adequately addressing the root causes of such a challenge. In the absence of such a policy intervening into the root causes, which this study strongly calls for, inclusive national dialogue among and between the diverse ethnic groupings should be pursued. This could resolve not only the ethno-religious tensions that breed but also the systemic marginalisation of Nigeria’s diverse ethnic groups. The paper concludes by emphasising that what is needed is a coherent strategy beyond immediate security responses, which would integrate socio-economic development with good governance. It warns that unless these foundational issues are resolved, even if terrorism is resolved, the cycle of violence and the threat of separatist agitations will probably continue. A holistic approach toward national security is imperative for long-term peace and stability in Nigeria.
- Published
- 2024
- Full Text
- View/download PDF
17. SEPARATE ORGANIZATIONAL AND LEGAL ASPECTS OF COMBATING ENVIRONMENTAL CRIME IN UKRAINE.
- Author
-
Marko, S. I.
- Subjects
LEGAL norms ,ENVIRONMENTAL degradation ,ENVIRONMENTAL protection ,INTERNATIONAL law ,NATIONAL unification ,ENVIRONMENTAL crimes ,INTERNATIONAL crimes - Abstract
The scientific article is devoted to the analysis of organizational and legal aspects of combating environmental crime in Ukraine. Arguments are presented regarding the relevance in the global, international dimension: criminalization of environmental damage at the level of the European Union and its member states; detailing the shortcomings of international legislation and revising the relevant directive on environmental crimes; establishment of functioning of the International Registry of Losses. It was emphasized that the introduction of appropriate changes to international legislation will allow creating a comprehensive system of measures to combat environmental crime, ensure the unification of national legislative systems in terms of terminology, composition of crimes, as well as sanctions applied for their commission in armed conflicts. The need to take comprehensive measures to combat ecocide at the national level, to develop a unified state policy in this area, to establish an effective system for monitoring the state of the environment and fixing the amount of damages, in particular for the systematic presentation of legal claims for the payment of reparations, is substantiated. In the opinion of the author, the National Post-War Recovery Plan should include measures to restore and preserve ecosystems, in particular, based on the analysis of normative legal acts in the field of environmental protection. It is noted that the relevant mechanisms should be universal and effectively prevent crimes against the environment in the world, be reflected in the relevant resolutions of the General Assembly of the United Nations and other documents of the international law system. The author emphasizes that the need and importance of improving legislation concerns not only countries in a state of military conflict, but also the rest of the world. Taking into account the fact that environmental damage is mainly transboundary in nature, the international community should focus on the formation of a clear understanding of the legal norms dedicated to crimes against the environment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. 国家级职业教育教师教学创新团队建设困境与对策.
- Author
-
赵聪
- Abstract
Copyright of Journal of Hubei Open Vocational College is the property of Journal of Hubei Open Vocational College Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
19. 地方高校助力乡村振兴人才培养的困境与对策研究.
- Author
-
王 挺, 彭佳媛, 刘慧芳, 许 慧, 郑百花, and 王酉琪
- Abstract
With the deepening implementation of the country's rural revitalization strategy, the demand for talents with professional knowledge and practical skills is becoming increasingly strong. As regional higher education institutions, local universities shoulder the important mission of providing talent support for rural revitalization. At present, local universities are facing challenges such as insufficient communication with the government, lack of systematic service platforms and mechanisms, mismatch between talent cultivation and rural revitalization needs, and weak teaching staff. These problems not only affect the quality of talent cultivation in local universities, but they also constrain the in-depth implementation of the rural revitalization strategy. Local universities should strengthen the communication with local governments and agricultural enterprises, carry out professional construction based on rural revitalization according to the actual needs of rural revitalization, intensify the introduction and training of teaching staff, and improve the overall quality and teaching level of the teaching staff. The aim of this study is to provide theoretical support and practical guidance for local universities to better serve the talent cultivation of rural revitalization, promote the deep integration of local universities with rural revitalization strategies, and provide a solid talent foundation for comprehensive rural revitalization. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. 伞具标准体系现状与标准化建议.
- Author
-
成松涛 and 邵皖燕
- Abstract
Copyright of China Fiber Inspection / Zhongguo Xian-Jian is the property of China Fiber Inspection and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
21. Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems.
- Author
-
Almaiah, Mohammed Amin, Saqr, Leen Mohammad, Al-Rawwash, Leen Ahmad, Altellawi, Layan Ahmed, Al-Ali, Romel, and Almomani, Omar
- Subjects
DATABASES ,DENIAL of service attacks ,CYBERTERRORISM ,AUDIT trails ,INFORMATION storage & retrieval systems ,RANSOMWARE - Abstract
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks. The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems, including classifying threats, vulnerabilities, impacts, and countermeasures. This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat. Additionally, this research aims to explore technical countermeasures to protect database systems from cyber threats. This study employs the content analysis method to collect, analyze, and classify data in terms of types of threats, vulnerabilities, and countermeasures. The results indicate that SQL injection attacks and Denial of Service (DoS) attacks were the most prevalent technical threats in database systems, each accounting for 9% of incidents. Vulnerable audit trails, intrusion attempts, and ransomware attacks were classified as the second level of technical threats in database systems, comprising 7% and 5% of incidents, respectively. Furthermore, the findings reveal that insider threats were the most common non-technical threats in database systems, accounting for 5% of incidents. Moreover, the results indicate that weak authentication, unpatched databases, weak audit trails, and multiple usage of an account were the most common technical vulnerabilities in database systems, each accounting for 9% of vulnerabilities. Additionally, software bugs, insecure coding practices, weak security controls, insecure networks, password misuse, weak encryption practices, and weak data masking were classified as the second level of security vulnerabilities in database systems, each accounting for 4% of vulnerabilities. The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Nursing Management Strategies to Improve the Qualified Rate of Clinical Microbial Specimens.
- Author
-
Hongmei Chen and Hui Cong
- Subjects
PRACTICAL nurses ,NURSES' attitudes ,PATHOLOGICAL laboratories ,MEDICAL microbiology ,NURSES ,UNIVERSITY hospitals ,MEDICAL laboratories - Abstract
Background: The purpose of clinical microbiology testing is to provide important information for clinical diagnosis and treatment. The correct collection, processing, and transportation of specimens are the key to the success of clinical microbiological examination. Methods: Retrospective analysis was done on the composition and causes of unqualified microbial samples submitted by clinical departments from 2019 to 2020 at the Affiliated Hospital of Nantong University. The solutions were proposed from the perspective of nursing management. Results: In 2019, the hospital received 64,244 clinical microbial specimens. The unqualified rate of samples was 8.96%, of which the unqualified sputum accounted for 84.74%. After strengthening the communication with the medical laboratory, increasing publicity and training, and improving the information system and other auxiliary monitoring functions, the unqualified rate of clinical microbial specimens was reduced to 6.05% in 2020. Conclusions: Continuously improving the theoretical and practical abilities of nurses can reduce the unqualified rate of samples. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. 新媒体背景下民办高校党建与思想政治工作: 现状、问题与对策.
- Author
-
张军
- Abstract
Copyright of Journal of Hubei Open Vocational College is the property of Journal of Hubei Open Vocational College Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
24. “Monitoring inflammatory, immune system mediators, and mitochondrial changes related to brain metabolism during space flight”.
- Author
-
Tocci, Darcy, Ducai, Tomas, Barry Stoute, C. A., Hopkins, Gabrielle, Sabbir, Mohammad G., Beheshti, Afshin, and Albensi, Benedict C.
- Subjects
NF-kappa B ,SPACE flight ,BRAIN metabolism ,EXTREME environments ,ASTROPHYSICAL radiation - Abstract
The possibility of impaired cognitive function during deep space flight missions or while living on a Martian colony is a critical point of concern and pleads for further research. In addition, a fundamental gap exists both in our understanding and application of countermeasures for the consequences of long duration space travel and/or living in an extreme environment such as on the Moon or Mars. Previous studies, while heavily analyzing pre-and post-flight conditions, mostly fail to appreciate the cognitive stressors associated with space radiation, microgravity, confinement, hostile or closed environments, and the long distances from earth. A specific understanding of factors that affect cognition as well as structural and/or physiological changes in the brains of those on a space mission in addition to new countermeasures should result in improved health of our astronauts and reduce risks. At the core of cognitive changes are mechanisms we typically associate with aging, such as inflammatory responses, changes in brain metabolism, depression, and memory impairments. In fact, space flight appears to accelerate aging. In this review, we will discuss the importance of monitoring inflammatory and immune system mediators such as nuclear factor kappa B (NF-kB), and mitochondrial changes related to brain metabolism. We conclude with our recommended countermeasures that include pharmacological, metabolic, and nutritional considerations for the risks on cognition during space missions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Beyond Technical Barriers: A Multidimensional Conceptual Framework for Understanding and Countering Cyber Scam Susceptibility.
- Author
-
Darem, Abdulbasit A., Alkhaldi, Tareq M., Alahmari, Muteeb, Alhashmi, Asma A., Alashjaee, Abdullah M., Alanazi, Sultan M., and Ebad, Shouki A.
- Subjects
- *
SOCIAL engineering (Fraud) , *BANKING industry , *PSYCHOLOGICAL factors , *EVIDENCE gaps , *SOCIAL factors - Abstract
AbstractCyber-attacks have become a serious global cybersecurity issue, affecting sectors such as petroleum, finance, health, and industry. The financial and banking sectors are particularly vulnerable, experiencing disproportionate harm due to the escalating complexity of digital threats. Recent academic efforts have focused on developing countermeasures, but these have primarily concentrated on technical solutions, which alone are insufficient. The persistent success of cyber-attacks highlights the need for a better understanding of human susceptibility to cyber scams. This research addresses the gap by investigating the psychological and social factors that lead individuals to fall for scam emails and links. It also explores how hackers exploit social engineering tactics to target victims and seeks to reverse these tactics to enhance protection. By understanding why people fall for cyber scams, the research aims to develop more effective cybersecurity measures, contributing significantly to the ongoing battle against cyber-attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. 阿拉善盟肉苁蓉产业发展现状与对策.
- Author
-
张珺, 程建飞, 许浩翔, 石媛媛, 张健鑫, and 宋明发
- Abstract
In order to deeply understand the current situation and challenges of Cistanche deserticola industry in Alxa League, and formulate corresponding countermeasures to promote the high-quality development of this industry. This study investigated the production situation and relevant literature research, the development present characteristics of Cistanche deserticola industry in Alxa League were summarized, the current development shortcomings and the high quality implementation countermeasures of Cistanche deserticola industry were analyzed and explored, to realize the increasing of peasants' income and the sand industry efficiency, built ecological barrier for the "Three-North Shelterbelt". And it also has great historical significance to promote the modernization of the under-forest economy and implement the high-quality rural revitalization strategy. The research showed that the natural environment in Alxa League was suitable for the cultivation of Cistanche deserticola and the planting scale was constantly expanding. The planting and processing technology system, product system and brand promotion system were initially formed, and the industrial policy system was gradually improving. In the development process of Cistanche deserticola industry in Alxa League, the natural conditions were harsh, there were difficulties in standardized planting, shortcomings in the links such as short industrial value chain, the industrial cluster effect and brand benefits were not obvious, the deep processing of products was insufficient, the added value of products was low, and marketing construction was insufficient, resulting in the absence of products in the big health market. In view of above problems, the corresponding countermeasures and suggestions were put forward, in order to walk out of the road of high-quality development of Cistanche deserticola industry with the characteristics of Alxa League, and build the Cistanche deserticola industry into a sample industry of industrial ecology and ecological industrialization in Alxa League. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Shift-Invariance Robustness of Convolutional Neural Networks in Side-Channel Analysis.
- Author
-
Krček, Marina, Wu, Lichao, Perin, Guilherme, and Picek, Stjepan
- Subjects
- *
DATA augmentation , *CONVOLUTIONAL neural networks , *DEEP learning - Abstract
Convolutional neural networks (CNNs) offer unrivaled performance in profiling side-channel analysis. This claim is corroborated by numerous results where CNNs break targets protected with masking and hiding countermeasures. One hiding countermeasure commonly investigated in related works is desynchronization (misalignment). The conclusions usually state that CNNs can break desynchronization as they are shift-invariant. This paper investigates that claim in more detail and reveals that the situation is more complex. While CNNs have certain shift-invariance, it is insufficient for commonly encountered scenarios in deep learning-based side-channel analysis. We investigate data augmentation to improve the shift-invariance and, in a more powerful version, ensembles of data augmentation. Our results show that the proposed techniques work very well and improve the attack significantly, even for an order of magnitude. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. THE PROFOUND IMPACT OF ORGANIZED CRIME ON THE GLOBAL ECONOMY.
- Author
-
George-Marius, Țical
- Subjects
ORGANIZED crime ,ECONOMIC forecasting ,CIVIL society ,INFRASTRUCTURE (Economics) ,MONEY laundering - Abstract
Organized crime is a significant and persistent threat to the global economy, affecting financial stability, economic development and social cohesion. This article examines the profound impact of organized crime on the world economy, highlighting the mechanisms by which it operates and its long-term consequences. Money laundering destabilizes financial systems by introducing illicit funds into the legal economy, affecting the integrity of financial institutions and investor confidence. Corruption allows criminal groups to infiltrate state institutions, undermining governance, eroding public trust and affecting the efficient allocation of resources. The distortion of economic markets by counterfeiting and smuggling affects fair competition, innovation and tax revenues, impacting key industries such as pharmaceuticals, luxury goods and technology. Human trafficking has serious consequences for the labor market, leading to the exploitation of individuals, lowering wages and eroding labor standards. Cybercrime compromises the security of critical infrastructure and sensitive data, generating significant economic costs and threatening the digital economy. To effectively combat organized crime, a multidimensional approach involving governments, international organizations, the private sector and civil society is required. Proposed strategies include strengthening the legal framework, promoting transparency, international cooperation, using technology to detect and prevent crime, and tackling the root causes of crime, such as poverty and inequality. In conclusion, organized crime is a global problem that requires global solutions, and only through firm commitment and close collaboration can we reduce its impact and ensure a safer and more prosperous future for the global economy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. 丽水九龙国家湿地公园湿地资源现状与保护对策.
- Author
-
赵俊文, 胡 伟, 吴迎霞, 徐鹏, 魏姿芃, and 王家燚
- Abstract
Based on field investigation and literature review, this paper elaborated on the current status of wetland resources in Jiulong National Wetland Park in Lishui, including wetland types and distribution, environmental quality, biodiversity, wetland landscape and cultural resources, analyzed the main problems faced by Jiulong Wetland, and proposed wetland resource protection and restoration countermeasures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Development Dilemma of Litopenaeus vannamei Industry in China, Current Countermeasures Taken and Its Implications for the World Shrimp Aquaculture Industry.
- Author
-
Jiteng Tian, Wei Wu, Jiawei Li, Xiaoyuao Wan, Zhuming Zhao, Rui Xi, Xili Hu, Mingchao Pan, Yueguang Xue, and Wensong Yu
- Subjects
- *
WHITELEG shrimp , *SHRIMP industry , *SHELLFISH industry , *AQUACULTURE - Abstract
This study focuses on the Litopenaeus vannamei shrimp, exploring its development, dilemmas, and challenges in China's industry alongside countermeasures implemented by Chinese authorities and agencies. Since its introduction to China in 1988, L. vannamei, known for its high economic value and adaptability, has become China's leading mariculture shrimp species and one of the most significant globally. The thriving L. vannamei industry has boosted economic gains and job creation in China's marine fisheries, supplied high-quality protein to consumers, and fostered socio-economic growth. Additionally, China's experiences and lessons in the L. vannamei industry serve as valuable references for other shrimp-farming nations, promoting global industry health. Despite its success, the industry faces challenges, including germplasm resource scarcity, feed ingredient shortages, disease management, and wastewater treatment. To address these issues, China has initiated various strategies, including germplasm resource conservation, the development of low-fishmeal protein feeds, disease monitoring, and wastewater management, aiming for the industry's green and sustainable evolution. This paper asserts that China's initiatives in advancing the L. vannamei industry offer significant inspiration globally, particularly in two main areas: Firstly, through effective policy support, China has fostered research and development of new shrimp varieties suited to its aquaculture conditions, enhancing germplasm quality and breeding efficiency. Secondly, China has actively disseminated its innovations, outcomes, and experiences globally, hosting various aquaculture training sessions and seminars. These initiatives offer technical support and platforms for international dialogue, fostering cooperation and exchange among shrimp farming nations. Moreover, China's dedication to advancing artificial culture technology for L. vannamei--through collaborative and continuous research across breeding, nutrition, disease management, and sustainability--has led to significant industry advancements. These contributions not only extend the industry chain but also position China as a leader and model for global shrimp aquaculture innovation. Through this study, we aim to offer insights and practical advice by analyzing the challenges and responses within China's L. vannamei industry. We hope these findings will serve as valuable references for enhancing the global shrimp aquaculture industry and aid other nations in their aquaculture endeavors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. 林业会计工作存在的问题及对策.
- Author
-
杨雯清 and 苏世伟
- Subjects
SUSTAINABLE forestry ,FOREST management ,FOREST protection ,NATURAL resources ,FORESTED wetlands ,FORESTS & forestry - Abstract
Copyright of China Forestry Economy is the property of China Forestry Economy Magazine Agency and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
32. Investigating the effect of using softer rail-pads on ground-borne vibration from underground railways.
- Author
-
Alsharo, Anas, Douier, Kais, Hussein, Mohammed F.M., and Renno, Jamil
- Subjects
FREE surfaces ,SUBWAYS ,VIBRATION measurements ,FREE vibration ,ACCELERATION measurements ,DYNAMIC stiffness - Abstract
In this study, a series of vibration measurements were performed on a section of one of the lines of the Doha Metro to explore the effect of changing rail-pads from conventional higher stiffness under-rail pads to lower stiffness web-supporting pads on the vibration levels at the free surface. Vibration levels were measured for the two cases of lower and higher stiffness' pads at the free surface directly above the railway track. Additionally, vibration levels were measured in the railway tunnel to investigate the effect of changing rail-pad's stiffness on the vibration levels at different locations inside the tunnel. Vibration measurements due to moving trains from the two cases were processed and analysed to calculate the Insertion Gain (IG) of vibration at the free surface and at the other locations. It was found that the use of softer rail-pads has resulted in reduction in the vibration levels at the free surface by about 10 dB for most frequencies in the range 40–200 Hz. Further numerical investigation was conducted to simulate the railway section under consideration. To simulate the track fastening system accurately, the dynamic stiffness of the rail-pads for the two cases was estimated using the measurement of vibration of rails due to impact hammer excitation and measurement of axle-box accelerations of a moving trains. The parameters of problem at-hand were used as inputs to the numerical Pipe-in-Pipe (PiP) model to calculate the insertion gain numerically at the free surface and this showed good match with the results from the measurements. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Analysis of Mechanical Properties of Steep Surrounding Rock and Failure Process with Countermeasures for Tunnel Bottom Structures.
- Author
-
Fan, Rong, Chen, Tielin, Yin, Xuexuan, Wang, Gujian, Li, Man, and Wang, Shunyu
- Subjects
STRAINS & stresses (Mechanics) ,TUNNELS ,DEFORMATION of surfaces ,ROCK slopes ,FINITE element method ,RAILROAD tunnels ,ROCK deformation - Abstract
Steep surrounding rock significantly challenges tunnel stability by affecting the stress distribution and deformation behavior. The angle of dip in surrounding rock greatly influences these factors, heightening the risk of instability along bedding planes, particularly under high ground stress conditions. This paper presents a comprehensive analysis of steep rock strata mechanical properties based on a railway tunnel in Yunnan Province, China. It incorporates long-term field monitoring and various laboratory tests, including point load, triaxial, and loose circle tests. Using experimental data, this study simulated the failure processes of steep surrounding rock and tunnel structures with a custom finite element method (FEM) integrated with the volume of fluid (VOF) approach. The analysis summarized the deformation patterns, investigated the causes of inverted arch deformation and failure, and proposed countermeasures. The findings reveal that increasing the rock dip angle results in greater deformation and accelerated failure rates, with the surrounding rock's loose zone stabilizing at approximately 8 m once deformation stabilizes. At a surface deformation of 8 cm, the failure zone extends to 6 m; however, this extension occurs more rapidly with higher lateral pressure coefficients. Additionally, failure zones develop more quickly in thin, soft rock on steep slopes compared to uniform rock formations. The rise of the tunnel floor is attributed to the steeply inclined, thin surrounding rock. To enhance bottom structure stiffness, this study recommends incorporating an inverted arch structure and increasing both the number and strength of the anchor bolts. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Drowsiness Mitigation Through Driver State Monitoring Systems: A Scoping Review.
- Author
-
Ayas, Suzan, Donmez, Birsen, and Tang, Xing
- Subjects
- *
EVIDENCE gaps , *AUTOMOBILE driving simulators , *FATIGUE (Physiology) , *SYSTEM safety , *DIGITAL libraries - Abstract
Objective: To explore the scope of available research and to identify research gaps on in-vehicle interventions for drowsiness that utilize driver monitoring systems (DMS). Background: DMS are gaining popularity as a countermeasure against drowsiness. However, how these systems can be best utilized to guide driver attention is unclear. Methods: A scoping review was conducted in adherence to PRISMA guidelines. Five electronic databases (ACM Digital Library, Scopus, IEEE Xplore, TRID, and SAE Mobilus) were systematically searched in April 2022. Original studies examining in-vehicle drowsiness interventions that use DMS in a driving context (e.g., driving simulator and driver interviews) passed the screening. Data on study details, state detection methods, and interventions were extracted. Results: Twenty studies qualified for inclusion. Majority of interventions involved warnings (n = 16) with an auditory component (n = 14). Feedback displays (n = 4) and automation takeover (n = 4) were also investigated. Multistage interventions (n = 12) first cautioned the driver, then urged them to take an action, or initiated an automation takeover. Overall, interventions had a positive impact on sleepiness levels, driving performance, and user evaluations. Whether interventions effective for one type of sleepiness (e.g., passive vs. active fatigue) will perform well for another type is unclear. Conclusion: Literature mainly focused on developing sensors and improving the accuracy of DMS, but not on the driver interactions with these technologies. More intervention studies are needed in general and for investigating their long-term effects. Application: We list gaps and limitations in the DMS literature to guide researchers and practitioners in designing and evaluating effective safety systems for drowsy driving. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Epidemiological and experimental evidence for radiation-induced health effects in the progeny after exposure in utero.
- Author
-
Benotmane, Mohammed Abderrafi and Trott, Klaus Ruediger
- Subjects
- *
RADIATION protection , *RADIATION exposure , *FETAL development , *NUCLEAR reactor accidents , *RADIOACTIVITY - Abstract
Purpose: It has been known for many decades that radiation exposure of the developing embryo or fetus may cause two fundamentally different types of severe health effects: on the one hand, radiation may interfere with the normal intrauterine development, on the other hand, radiation may induce leukemia and cancer which become manifest in childhood. A large amount of epidemiological and experimental data has recently been presented which might be used to improve our understanding of underlying mechanisms and setting radiation protection standards. Yet, ecological studies in the populations exposed to increased levels of radiation in regions contaminated by radioactivity released from reactor accidents (Chernobyl, Fukushima) do not provide solid evidence which would contribute to this aim. On the other hand, well designed experimental studies demonstrated the multifactorial mechanisms which lead to different health effects after radiation exposure in utero. Conclusion: There is no convincing evidence, neither from epidemiological nor experimental data of the existence of a dose threshold for developmental defects after radiation exposure in utero. This must be taken into account in the revision of rules and regulations of radiation protection in medicine. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. The Quest for Proportionality in the Changing Landscape of the Unilateral Sanctions of the European Union.
- Author
-
Terlinden, Marie
- Subjects
- *
RUSSIAN invasion of Ukraine, 2022- , *PROPORTIONALITY in law , *EUROPEAN Union law , *LANDSCAPE changes , *GOVERNMENT liability , *CUSTOMARY law , *INTERNATIONAL sanctions - Abstract
In response to the Russian invasion of Ukraine, the European Union (EU) has adopted a vast range of unilateral sanctions (or 'restrictive measures') targeting almost every facet of the Russian economy. These events mark a turning point in the EU's approach to sanctions. In a brief timespan, the EU's sanctions practice has expanded significantly in its scope, reach, and hard-line political discourse, aligning more closely with the assertive stance of the United States. The collateral effects of these sanctions have reverberated globally, raising questions about their proportionality. This article explores the legal boundaries framing EU sanctions, examining the principle of proportionality across EU law, World Trade Organization (WTO) law, and customary rules on State responsibility. Through a detailed analysis of the various proportionality standards present in these legal regimes, it seeks to determine the adequacy of existing legal safeguards against a potential misuse of sanctions and addresses key challenges in regulating EU sanctions within the framework of proportionality. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Environmental Intervention: An Activist Idea or a Legal Tool? An Analysis of the Possibilities of Environmental Protection in Light of the Principle of Non-Intervention.
- Author
-
van den Boogaard, Emma
- Subjects
- *
INTERNATIONAL environmental law , *ENVIRONMENTAL activism , *HUMAN rights violations , *EMERGENCY management , *ENVIRONMENTAL protection , *TRANSBOUNDARY waters - Abstract
Environmental emergencies are increasingly the subject of debate. As defined in this article, these emergencies start on a State's territory but can have consequences beyond its borders. The interconnectedness of the environment and the growing concern about environmental threats lead to the question of whether third States might have a legal interest in some of these environmental emergencies. It triggers a debate similar to past debates on human rights violations, resulting in the Responsibility to Protect. This article investigates the circumstances under which States can lawfully intervene without using force in another State in response to environmental emergencies. By analysing the principle of non-intervention and the effect of international environmental law on the scope of the domaine réservé, the article discusses whether certain environmental interventions can be justified under the current legal framework of the principle of non-intervention. The emphasis lies on the no-harm principle and the concept of the common concern of humankind as a means to address environmental emergencies with direct transboundary impacts or those threatening the environment at a global level. The article concludes that the no-harm principle and the concept of the common concern of humankind can potentially reduce the scope of the domaine réservé. Consequently, States' actions in response to an environmental emergency can be lawful under the principle of non-intervention. This lawful environmental intervention has the potential to develop from an activist idea into a legal tool. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. The Ukrainian–Russian Armed Conflict and the Law of Neutrality: Continuity, Discontinuity, or Irrelevance?
- Author
-
Bartolini, Giulio
- Subjects
- *
REPRISALS (International relations) , *WAR , *RUSSIA-Ukraine Conflict, 2014- , *INTERNATIONAL security , *LEGAL justification - Abstract
This article examines the role of the law of neutrality, namely the international legal regime defining the status of a State not party to an international armed conflict, in the Russian-Ukrainian armed conflict by analyzing the legal justifications offered by States and scholars with reference to the provision of weapons to the belligerents. The findings reveal that different positions could be identified ranging from an approach that reflects continuity regarding the basic premises characterizing this legal regime, to the emergence of a relevant discontinuity regarding its traditional legal contours or, finally, solutions implying its current legal irrelevance, even if on multiple occasions States have refrained from framing their positions in clear legal terms. The diminishing relevance of the law of neutrality may eventually lead to a legal order where third-party involvement in conflicts becomes more common. At the same time, the ongoing crisis of the United Nations' collective security system and violations of its basic principles might risk making traditional interpretations of the law of neutrality a legal component of the lawfare portfolio available to States violating the prohibition on using force, thus mandating a reassessment in its interpretation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. 乡村振兴视角下新型职业农民培育路径研究.
- Author
-
王文明
- Abstract
Under the background of the rural revitalization strategy, the cultivation of new professional farmers has become the key to promote agricultural and rural modernization. This paper explores the cultivation path of new professional farmers from the perspective of rural revitalization. It clarifies the inherent connection between rural revitalization and the cultivation of new professional farmers, and expounds the important role of new professional farmers in rural revitalization. The main problems in the current cultivation of new professional farmers include low learning enthusiasm and participation among farmers; an imperfect cultivation system and a lack of teachers; insufficient policy support and a lack of special funds; low social recognition and difficulty in retaining talent. Innovative cultivation paths are proposed, including strengthening publicity to enhance social recognition and career attractiveness; integrating resources to improve the cultivation system; innovating cultivation methods, improving cultivation content, and focusing on practicality. The implementation of these measures aims to cultivate a new team of professional farmers who are cultured, technically proficient, good at management, and skilled in business operations, providing strong talent support for rural revitalization and agricultural modernization. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. 高职院校 “双带头人”工作室服务地方中小企业的实践与探索.
- Author
-
樊轻亚
- Abstract
Copyright of Journal of Hubei Open Vocational College is the property of Journal of Hubei Open Vocational College Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
41. 粤港澳大湾区翻译服务行业人才供需矛盾与优化对策.
- Author
-
青立花
- Abstract
Copyright of Journal of Hubei Open Vocational College is the property of Journal of Hubei Open Vocational College Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
42. Beyond Collective Countermeasures and Towards an Autonomous External Sanctioning Power? The General Court’s Judgment in Case T-65/18-RENV, Venezuela v Council
- Author
-
Eva Kassoti
- Subjects
sanctions ,countermeasures ,retorsions ,restrictive measures ,venezuela ,erga omnes obligations ,Law ,Law of Europe ,KJ-KKZ - Abstract
(Series Information) European Papers - A Journal on Law and Integration, 2024 9(1), 247-259 | European Forum Insight of 03 July 2024 | (Table of Contents) I. Introduction. - II. Judgment of the Court. - III. Analysis and comment. - iii.1. The General Court’s treatment of Venezuela’s international law arguments. - iii.2. The international legal nature of the restrictive measures against Venezuela: retorsions or countermeasures? - IV. Conclusion | (Abstract) In case T-65/18 RENV Venezuela v Council the General Court was confronted with the question of the legality under international law of the EU’s restrictive measures against Venezuela. The judgment is of particular importance as it feeds into the burgeoning discussion regarding the juridical nature, and lawfulness, of EU restrictive measures against third States under international law. This Insight summarizes the judgment and analyses the Court’s line of argumentation and reasoning. It shows that the General Court here proclaimed an autonomous external sanctioning power stemming from the EU’s values and objectives governing the Union’s external action. The Insight argues that the General Court’s approach leaves much to be desired in terms of reasoning on the basis of international law. The Insight argues that the restrictive measures against Venezuela could be considered lawful on the basis of the international legal regime governing countermeasures in response to violations of erga omnes obligations. By eschewing engagement with the broader international legal framework, the General Court here missed an opportunity to make a substantive contribution to the (evolving) law of collective countermeasures.
- Published
- 2024
- Full Text
- View/download PDF
43. The Status Quo, Challenges, and Countermeasures in Long-term Care for Elderly Stroke Patients
- Author
-
Siqin Li and Rong Yang
- Subjects
stroke ,long-term care ,status quo ,countermeasures ,Geriatrics ,RC952-954.6 - Abstract
As the rate of population aging accelerates, the prevalence of stroke among the older population continues to rise. Elderly stroke patients have a high prevalence of neurological impairment, severe clinical manifestations, many associated comorbidities, unfavorable prognosis, prolonged rehabilitation duration, and need extended caregiver support. Elderly stroke patients have challenges in accessing necessary long-term care services due to several circumstances, resulting in notable issues in long-term care. This paper examines the clinical features of elderly stroke patients and presents an overview of long-term care both domestically and internationally. It discusses the current issues surrounding long-term care in our country, focusing on three different forms of care. The paper proposes countermeasures to address these problems, considering the roles of the government, society, medical professionals, institutions, families, and individuals. The aim is to offer guidance for enhancing the quality of long-term care.
- Published
- 2024
- Full Text
- View/download PDF
44. 大食物观下我国木本油料高质量发展的 潜力挖掘、现实约束和对策建议Potential exploration, realistic constraints and countermeasures for the high-quality development of woody oilseeds in China under the perspective of all-encompassing approach to food
- Author
-
严茂林1,付晓宇1,陈畅2,殷国华1,张洋3,吴成亮3,周觉4 YAN Maolin1, FU Xiaoyu1, CHEN Chang2, YIN Guohua1, ZHANG Yang3, WU Chengliang3, ZHOU Jue
- Subjects
大食物观;木本油料;现状分析;现实约束;潜力挖掘;对策建议 ,all-encompassing approaceh to food ,woody oilseeds ,current situation analysis ,realistic constraints ,potential exploration ,countermeasures ,Oils, fats, and waxes ,TP670-699 - Abstract
为推动我国木本油料高质量发展,更好地践行大食物观,从供给、需求和国际贸易3个方面对2001—2021年间我国木本油料发展情况进行定量分析,对木本油料未来发展潜力和现实约束进行系统分析,并提出高质量发展的对策建议。我国木本油料产业发展迅速,总产量、总产值不断提高,在国家粮油安全中的作用不断增强。利好政策持续释放、种植面积有望扩大、单产提升潜力较大以及市场环境不断改善等,是我国木本油料高质量发展的潜力所在。但产业政策扶持力度不够、种植成本攀升、生产效率低下、科技服务保障支撑不足、产业链延伸不足、市场占有率低等问题,成为阻碍我国木本油料高质量发展的瓶颈。基于此,提出持续优化产业发展格局、积极培育新型经营主体、大力推动科技创新与成果转化、加强品牌建设等建议。In order to promote the high-quality development of woody oilseeds in China and better practice the perspective of all-encompassing approach to food, the development of woody oilseeds in China from three aspects including supply, demand and international trade was quantitatively analyzed from 2001 to 2021, the future development potential and realistic constraints of woody oilseeds were systematically analyzed, and countermeasures for the high-quality development were put forward. The woody oilseeds industry in China developed rapidly, with a continuous increase in total output and total output value, and its role in national grain and oil security was constantly strengthened. The continuous release of favorable policies, the expected expansion of planting area, the great potential for per unit yield improvement, and the continuous improvement of market environment were the potential for high-quality development of woody oilseeds in China. However, problems such as insufficient support from industrial policies, rising planting costs, low production efficiency, insufficient support for science and technology service guarantee, insufficient extension of the industrial chain and low market share had become bottlenecks that hindering the high-quality development of woody oilseeds in China. Based on this, suggestions were proposed, such as continuously optimizing the industrial development pattern, actively cultivating new business entities, vigorously promoting scientific and technological innovation and achievement transformation, and strengthening brand building.
- Published
- 2024
- Full Text
- View/download PDF
45. Analysis of Information Security Under the Conditions of Hybrid War in Ukraine: Social Aspects
- Author
-
Krawczyk Dariusz, Babenko Vitalina, Yemchuk Liudmyla, Lienkov Serhii, Dzhulii Volodymyr, Dzhulii Larysa, and Muliar Ihor
- Subjects
cyber security ,social networks ,harmful information ,hybrid warfare ,countermeasures ,Production management. Operations management ,TS155-194 - Abstract
The development of the post-industrial society requires the acceleration of the integration of the national economy into the globalized economic space. This stage is characterized by active informatization of all spheres of life in society, which requires information security and cyber protection for high-quality information provision of the country’s population, intellectualization of economic processes and prevention of destructive informational influence on the social status of the individual. It is also necessary to consider that for Ukraine the specified stage is complicated by the hybrid war with Russia, which requires strengthening the protection of information from cyber-attacks and the formation of new approaches in preserving the quality of information on social networks. Therefore, the purpose of this article is the development of scientific and methodological approaches in information security management, strengthening its social significance. This requires solving a certain range of tasks of identifying and preventing socially dangerous information based on the use of economic and mathematical methods and models. The article highlights the main directions of socialization of modern technological development and theoretically substantiates its significant impact on human consciousness and behavior, puts a person in front of serious challenges and, under conditions of hybrid warfare, requires strengthening of information security in social networks. In the work, the components of information security are supplemented, its impact on social aspects of society’s life is highlighted. As a result of the research, the authors proposed a scientific and methodical approach to the construction of a system for countering the spread of socially dangerous information in social networks. Besides, its functional elements are highlighted. A method of combating the spread of harmful information in social networks has been developed, which solves the problem of information support of the decision-making process and includes providing the chosen and alternative options to the person making the decision, with the justification of the choice. This creates prerequisites for information support for making a well-founded management decision.
- Published
- 2024
- Full Text
- View/download PDF
46. BioTrojans: viscoelastic microvalve-based attacks in flow-based microfluidic biochips and their countermeasures.
- Author
-
Baban, Navajit Singh, Zhou, Jiarui, Elkhoury, Kamil, Bhattacharjee, Sukanta, Vijayavenkataraman, Sanjairaj, Gupta, Nikhil, Song, Yong-Ak, Chakrabarty, Krishnendu, and Karri, Ramesh
- Abstract
Flow-based microfluidic biochips (FMBs) are widely used in biomedical research and diagnostics. However, their security against potential material-level cyber-physical attacks remains inadequately explored, posing a significant future challenge. One of the main components, polydimethylsiloxane (PDMS) microvalves, is pivotal to FMBs' functionality. However, their fabrication, which involves thermal curing, makes them susceptible to chemical tampering-induced material degradation attacks. Here, we demonstrate one such material-based attack termed “BioTrojans,” which are chemically tampered and optically stealthy microvalves that can be ruptured through low-frequency actuations. To chemically tamper with the microvalves, we altered the associated PDMS curing ratio. Attack demonstrations showed that BioTrojan valves with 30:1 and 50:1 curing ratios ruptured quickly under 2 Hz frequency actuations, while authentic microvalves with a 10:1 ratio remained intact even after being actuated at the same frequency for 2 days (345,600 cycles). Dynamic mechanical analyzer (DMA) results and associated finite element analysis revealed that a BioTrojan valve stores three orders of magnitude more mechanical energy than the authentic one, making it highly susceptible to low-frequency-induced ruptures. To counter BioTrojan attacks, we propose a security-by-design approach using smooth peripheral fillets to reduce stress concentration by over 50% and a spectral authentication method using fluorescent microvalves capable of effectively detecting BioTrojans. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. “三全育人”视域下高职院校心理育人的困境与对策研究.
- Author
-
周楠
- Abstract
Copyright of Journal of Hubei Open Vocational College is the property of Journal of Hubei Open Vocational College Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
48. EXPLORING THE SECURITY OF CLOUD COMPUTING: AN ANALYSIS OF THREATS AND COUNTERMEASURES FOR CLOUD COMPUTING IN THE ERA OF DIGITAL TRANSFORMATION.
- Author
-
Mpitsi, Maria
- Subjects
CLOUD computing security measures ,DIGITAL transformation ,DENIAL of service attacks ,DATA security failures ,ALGORITHMS - Abstract
Cloud computing has gained immense popularity for delivering computing resources over the internet, enabling organizations to efficiently and cost-effectively store, process, and access data from any location worldwide. However, the security of data stored and processed outside of the organization's premises has raised concerns. In order to address the changing threat landscape and guarantee the integrity and confidentiality of data in the cloud environment, we address the latest developments and best practices in cloud security in this article, which delves into the complex world of security threats and related countermeasures for cloud computing in the contemporary era of digital transformation. Offered a thorough examination of cloud computing security risks and solutions in the age of digital transformation. The paper defines cloud computing, explores its advantages and disadvantages, identifies major security threats in cloud computing, including data breaches, insider threats, and denial-of-service attacks, and discusses the countermeasures that can be implemented to mitigate these threats. The most popular cryptographic algorithms in cloud computing environments as part of their defense are presented. Special emphasis is given on the mode of operation of these algorithms is presented so that we can choose the appropriate one in each situation. Finally, access control and monitoring are presented in order to have a thorough understanding of protection methods in cloud computing environments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
49. 耕地“进出平衡”实施问题与对策研究——以南京市为例.
- Author
-
蒋海宁, 刘 洋, 徐 玲, 韩建业, and 徐 锋
- Abstract
Our country implements the most strict cultivated land protection policy. Under the background of the continuous reduction of cultivated land and the increasingly prominent phenomenon of cultivated land “non grain”, the country puts forward cultivated land “in and out of balance” policy to strictly control the adjustment of the internal structure of cultivated land, other agricultural land, and agricultural facility land. On the basis of the existing data, this paper analyzes the implementation status and existing problems in Nanjing of the current policy of cultivated land “in and out of balance”, and puts forward relevant countermeasures combined with the existing practices in Nanjing, in order to provide reference for improving the policy and management methods of cultivated land “in and out of balance” and promoting the path design of “in and out of balance” system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Scour countermeasures around cylindrical pier by using downscaled W weir.
- Author
-
Karthik, Ramu, Kumar, Upendra, and Barbhuiya, Abdul Karim
- Subjects
- *
BRIDGE design & construction , *RIVER engineering , *BRIDGE foundations & piers , *WEIRS , *PIERS - Abstract
Scour is a significant concern for bridge design/maintenance, and scour countermeasures are often used to prevent or reduce erosion caused by scouring. The W weir is a grade control structure serving many purposes, including scour control at bridge piers. A series of laboratory experimental runs was conducted, changing the size, height and location of the pier in relation to the weir to optimise the structural configuration of the downscaled W weir. These experiments revealed that the scour hole profile upstream of the downscaled W weir changes with weir height. At a weir height of 1.0D (D = diameter of pier), two small depressions of almost identical size were observed inside the main scour hole, one just in front of each upstream apex of the W weir. One cone-shaped scour hole was observed when the W weir height was 0.5D with its maximum depth in between the upstream apexes. Reduction of scour in front of the pier was greater when the weir height was 1.0D. The maximum scour control achieved among all different structural combinations of downscaled W weir was 47.66%. This was achieved when the downscaled W weir was 2.0D in size and 1.0D high, placed 2.0D distant from the pier. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.