Resource Type

Journal Article 1295

Year

2024 2

2023 185

2022 189

2021 200

2020 107

2019 51

2018 40

2017 64

2016 56

2015 48

2014 52

2013 47

2012 24

2011 27

2010 47

2009 32

2008 22

2007 38

2006 5

2005 4

open ︾

Keywords

food security 39

SARS-CoV-2 33

COVID-19 25

CO2 capture 19

energy security 19

2 18

TiO2 14

China 10

CO2 9

1 8

Photocatalysis 8

photocatalysis 8

CO2 emissions 7

Deep learning 7

sustainable development 7

Al2O3 6

Reinforcement learning 6

cyberspace security 5

microwave scatterometer 5

open ︾

Search scope:

排序: Display mode:

Aleakage-resilient certificateless public key encryption scheme withCCA2security None

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 4,   Pages 481-493 doi: 10.1631/FITEE.1601849

Abstract: In this study, to achieve better performance, a new construction of a chosen ciphertext attack 2 (CCA2) secure, leakage-resilient, and certificateless public-key encryption scheme is proposed, whose securityachieve leakage on the private key from the corresponding ciphertext, and a key leakage ratio of 1/2

Keywords: Certificateless public-key encryption     Leakage-resilience     Provable security     CCA2 security     Decisional Diffie-Hellman    

Modeling China’s energy dilemma: conflicts among energy saving, energy security, and CO 2 mitigation

Feng FU, Zheng LI, Linwei MA,

Frontiers in Energy 2010, Volume 4, Issue 3,   Pages 295-300 doi: 10.1007/s11708-010-0104-z

Abstract: China’s future energy scenarios stretching until 2050 under different policy portfolios of energy securityexistence of conflicts among China’s multiple objectives, particularly energy saving, energy security

Keywords: Energy dilemma     energy saving     energy security     CO2 mitigation    

Discussion on a new paradigm of endogenous security towards 6G networks Review

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10,   Pages 1421-1450 doi: 10.1631/FITEE.2200060

Abstract:

The sixth-generation mobile communication (6G) networks will face more complex endogenous securityproblems, and it is urgent to propose new universal security theories and establish new practice normsto deal with the "unknown unknown" security threats in cyberspace.of 6G cyberspace security.of endogenous security and traditional security.

Keywords: 6G security     New paradigm of endogenous security     Core network     Wireless access network    

Artificial intelligence algorithms for cyberspace security applications: a technological and status review Review

Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1117-1142 doi: 10.1631/FITEE.2200314

Abstract: timeliness and accuracy of network attack detection, the credibility assessment and prediction of the securitysituation, and the effectiveness of security defense strategy optimization.algorithms have become the core means to increase the chance of security and improve the network attackthe current development trends of technology and application and hot issues in the field of network security

Keywords: AI)     Machine learning (ML)     Deep learning (DL)     Optimization algorithm     Hybrid algorithm     Cyberspace security    

Soil security and global food security

Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530

Abstract:

● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.

Keywords: Agriculture     soil security     food security     regenerative    

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 144-151 doi: 10.15302/J-FASE-2015062

Abstract: Food security, the need to meet nutritional requirements, and four main problems for food protein securityresidents’ nutritional requirements and balanced dietary patterns, the conclusion is that food securityin China is in essence dependent on protein production and security of supply and that fat and carbohydratespolicy suggestions are made, which could ensure a balanced supply and demand for food protein and food security

Keywords: food security     protein security     nutrition     dietary pattern    

Discussion on Long-Life Security Strategies for Railway Track Engineering

Wang Ping,Chen Rong and An Boyang

Strategic Study of CAE 2017, Volume 19, Issue 6,   Pages 66-71 doi: 10.15302/J-SSCAE-2017.06.010

Abstract: Therefore, it is particularly urgent to organize and implement a long-life security plan for railway

Keywords: railway track engineering     long life     safety guarantee     Shift2Rail    

Ecological security evaluation of Africa

Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN

Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 4,   Pages 467-477 doi: 10.15302/J-FASE-2020320

Abstract: Ecological security comprehensively reflects the heath and integrity of an ecosystem, and it is broadlydefined as the security state of a complex artificial ecosystem composed of natural, economic and socialEcological security determines the potential for sustainable development in Africa, especially with itsHowever, there is a lack of information on the ecological security state of the continent as a whole.In general, African countries showed relatively good ecological security.

Keywords: Africa     ecological security     evaluation system     PSR model    

Water, energy and food interactions–Challenges and opportunities

Gustaf OLSSON

Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5,   Pages 787-793 doi: 10.1007/s11783-013-0526-z

Abstract: living standards and food consumption will require an integrated approach where food, water and energy securityIn this paper we examine water, energy and food security and their couplings.

Keywords: water security     energy security     food security     water-energy nexus     water conflicts    

Water environment security indicator system for urban water management

Tian HAO, Pengfei DU, Yun GAO

Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 5,   Pages 678-691 doi: 10.1007/s11783-012-0450-7

Abstract: Water environment security (WES) is defined in terms of three aspects: first, that it meets basic demandsLimitations associated with current water environment security indicators in China — including inefficiencyprocedures used to assess the risks associated with poor management practices relating to water environment securityas well as design an appropriate water environment security indicator system.

Keywords: water environment security     supervision and management     monitoring parameter     indicator system     Suzhou    

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation    

AGRICULTURAL GREEN DEVELOPMENT TO ACHIEVE FOOD SECURITY AND CARBON REDUCTION IN THE CONTEXT OF CHINA’

Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 2,   Pages 262-267 doi: 10.15302/J-FASE-2023496

Abstract:

● To achieve food security, Chinese agriculture– food system could

Keywords: agriculture     carbon neutrality     carbon peak     food security     carbon mitigation strategies    

Achieving food security and high production of bioenergy crops through intercropping with efficient resource

Yuanmei ZUO,Zhenjiao ZHANG,Caihong LIU,Weina ZHANG

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 134-143 doi: 10.15302/J-FASE-2015069

Abstract: nonrenewable fossil fuel consumption worldwide, we are facing great challenges in ensuring food and energy securityutilization efficiency and illustrate the practical application of intercropping in ensuring food and energy security

Keywords: intercropping     food security     energy security     high production     marginal land    

China’s new problems of food security revealed by the Food Equivalent Unit

Huilong LIN,Ruichao LI,Cangyu JIN,Chong WANG,Maohong WEI,Jizhou REN

Frontiers of Agricultural Science and Engineering 2014, Volume 1, Issue 1,   Pages 69-76 doi: 10.15302/J-FASE-2014023

Abstract: China's food security has a great influence on the world, and has always been the top priority in ChinaIn recent years, as the concept of food security is evolving into one of nutrition security and the importanceof food diversity is increasing, research based on nutrition security and broad food systems are increasinglyChina’s current agriculture system had a low efficiency in being able to achieve food and nutrition security

Keywords: food security     nutrition security     food equivalent unit     grassland agriculture     China    

Application of Fuzzy Pattern Recognition in the Measurement of Slurry Concentration

Li Dejun,Lv Runhua,Wang Runtian

Strategic Study of CAE 2007, Volume 9, Issue 5,   Pages 81-84

Abstract:

  Slurry is widely used in construction projects, and it is important to control the slurry's physical characteristic properly. The acoustic method is used,  which can effectively monitor the physical parameters of slurry,  such as concentration. Data processing affects directly the precision in the measurement of slurry concentration by the sound attenuation and velocity. Based on the fuzzy pattern recognition, data are sorted and further classified, with cooperative clustering algorithm.

Keywords: fuzzy pattern recognition     nearest neighbor(NN)     cooperative clustering algorithm(CCA)     slurry concentration    

Title Author Date Type Operation

Aleakage-resilient certificateless public key encryption scheme withCCA2security

Yan-wei ZHOU, Bo YANG, Hao CHENG, Qing-long WANG

Journal Article

Modeling China’s energy dilemma: conflicts among energy saving, energy security, and CO 2 mitigation

Feng FU, Zheng LI, Linwei MA,

Journal Article

Discussion on a new paradigm of endogenous security towards 6G networks

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Journal Article

Artificial intelligence algorithms for cyberspace security applications: a technological and status review

Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com

Journal Article

Soil security and global food security

Journal Article

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Journal Article

Discussion on Long-Life Security Strategies for Railway Track Engineering

Wang Ping,Chen Rong and An Boyang

Journal Article

Ecological security evaluation of Africa

Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN

Journal Article

Water, energy and food interactions–Challenges and opportunities

Gustaf OLSSON

Journal Article

Water environment security indicator system for urban water management

Tian HAO, Pengfei DU, Yun GAO

Journal Article

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article

AGRICULTURAL GREEN DEVELOPMENT TO ACHIEVE FOOD SECURITY AND CARBON REDUCTION IN THE CONTEXT OF CHINA’

Journal Article

Achieving food security and high production of bioenergy crops through intercropping with efficient resource

Yuanmei ZUO,Zhenjiao ZHANG,Caihong LIU,Weina ZHANG

Journal Article

China’s new problems of food security revealed by the Food Equivalent Unit

Huilong LIN,Ruichao LI,Cangyu JIN,Chong WANG,Maohong WEI,Jizhou REN

Journal Article

Application of Fuzzy Pattern Recognition in the Measurement of Slurry Concentration

Li Dejun,Lv Runhua,Wang Runtian

Journal Article