Search scope:
排序: Display mode:
Aleakage-resilient certificateless public key encryption scheme withCCA2security None
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4, Pages 481-493 doi: 10.1631/FITEE.1601849
Keywords: Certificateless public-key encryption Leakage-resilience Provable security CCA2 security Decisional Diffie-Hellman
Modeling China’s energy dilemma: conflicts among energy saving, energy security, and CO 2 mitigation
Feng FU, Zheng LI, Linwei MA,
Frontiers in Energy 2010, Volume 4, Issue 3, Pages 295-300 doi: 10.1007/s11708-010-0104-z
Keywords: Energy dilemma energy saving energy security CO2 mitigation
Discussion on a new paradigm of endogenous security towards 6G networks Review
Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10, Pages 1421-1450 doi: 10.1631/FITEE.2200060
The sixth-generation mobile communication (6G) networks will face more complex endogenous securityproblems, and it is urgent to propose new universal security theories and establish new practice normsto deal with the "unknown unknown" security threats in cyberspace.of 6G cyberspace security.of endogenous security and traditional security.
Keywords: 6G security New paradigm of endogenous security Core network Wireless access network
Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8, Pages 1117-1142 doi: 10.1631/FITEE.2200314
Keywords: AI) Machine learning (ML) Deep learning (DL) Optimization algorithm Hybrid algorithm Cyberspace security
Soil security and global food security
Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530
● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.
Keywords: Agriculture soil security food security regenerative
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2, Pages 144-151 doi: 10.15302/J-FASE-2015062
Keywords: food security protein security nutrition dietary pattern
Discussion on Long-Life Security Strategies for Railway Track Engineering
Wang Ping,Chen Rong and An Boyang
Strategic Study of CAE 2017, Volume 19, Issue 6, Pages 66-71 doi: 10.15302/J-SSCAE-2017.06.010
Keywords: railway track engineering long life safety guarantee Shift2Rail
Ecological security evaluation of Africa
Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN
Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 4, Pages 467-477 doi: 10.15302/J-FASE-2020320
Keywords: Africa ecological security evaluation system PSR model
Water, energy and food interactions–Challenges and opportunities
Gustaf OLSSON
Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5, Pages 787-793 doi: 10.1007/s11783-013-0526-z
Keywords: water security energy security food security water-energy nexus water conflicts
Water environment security indicator system for urban water management
Tian HAO, Pengfei DU, Yun GAO
Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 5, Pages 678-691 doi: 10.1007/s11783-012-0450-7
Keywords: water environment security supervision and management monitoring parameter indicator system Suzhou
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016
Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.
Keywords: cyberspace security emergency for cyberspace security response for cyberspace security transformation
Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 2, Pages 262-267 doi: 10.15302/J-FASE-2023496
● To achieve food security, Chinese agriculture– food system could
Keywords: agriculture carbon neutrality carbon peak food security carbon mitigation strategies
Yuanmei ZUO,Zhenjiao ZHANG,Caihong LIU,Weina ZHANG
Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2, Pages 134-143 doi: 10.15302/J-FASE-2015069
Keywords: intercropping food security energy security high production marginal land
China’s new problems of food security revealed by the Food Equivalent Unit
Huilong LIN,Ruichao LI,Cangyu JIN,Chong WANG,Maohong WEI,Jizhou REN
Frontiers of Agricultural Science and Engineering 2014, Volume 1, Issue 1, Pages 69-76 doi: 10.15302/J-FASE-2014023
Keywords: food security nutrition security food equivalent unit grassland agriculture China
Application of Fuzzy Pattern Recognition in the Measurement of Slurry Concentration
Li Dejun,Lv Runhua,Wang Runtian
Strategic Study of CAE 2007, Volume 9, Issue 5, Pages 81-84
Slurry is widely used in construction projects, and it is important to control the slurry's physical characteristic properly. The acoustic method is used, which can effectively monitor the physical parameters of slurry, such as concentration. Data processing affects directly the precision in the measurement of slurry concentration by the sound attenuation and velocity. Based on the fuzzy pattern recognition, data are sorted and further classified, with cooperative clustering algorithm.
Keywords: fuzzy pattern recognition nearest neighbor(NN) cooperative clustering algorithm(CCA) slurry concentration
Title Author Date Type Operation
Aleakage-resilient certificateless public key encryption scheme withCCA2security
Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG
Journal Article
Modeling China’s energy dilemma: conflicts among energy saving, energy security, and CO 2 mitigation
Feng FU, Zheng LI, Linwei MA,
Journal Article
Discussion on a new paradigm of endogenous security towards 6G networks
Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG
Journal Article
Artificial intelligence algorithms for cyberspace security applications: a technological and status review
Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com
Journal Article
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Journal Article
Discussion on Long-Life Security Strategies for Railway Track Engineering
Wang Ping,Chen Rong and An Boyang
Journal Article
Ecological security evaluation of Africa
Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN
Journal Article
Water environment security indicator system for urban water management
Tian HAO, Pengfei DU, Yun GAO
Journal Article
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Journal Article
AGRICULTURAL GREEN DEVELOPMENT TO ACHIEVE FOOD SECURITY AND CARBON REDUCTION IN THE CONTEXT OF CHINA’
Journal Article
Achieving food security and high production of bioenergy crops through intercropping with efficient resource
Yuanmei ZUO,Zhenjiao ZHANG,Caihong LIU,Weina ZHANG
Journal Article
China’s new problems of food security revealed by the Food Equivalent Unit
Huilong LIN,Ruichao LI,Cangyu JIN,Chong WANG,Maohong WEI,Jizhou REN
Journal Article