security patterns
Recently Published Documents


TOTAL DOCUMENTS

217
(FIVE YEARS 56)

H-INDEX

17
(FIVE YEARS 4)

2022 ◽  
Vol 138 ◽  
pp. 102619
Author(s):  
Feifei Fan ◽  
Xiaojin Wen ◽  
Zhiming Feng ◽  
Yang Gao ◽  
Wenjun Li

Author(s):  
E. R. Aruna ◽  
A. Rama Mohan Reddy ◽  
K. V. N. Sunitha
Keyword(s):  

2022 ◽  
Vol 42 (1) ◽  
Author(s):  
李皓,翟月鹏,杨小龙,董旭彤,杨佳,马子川,刘敬泽 LI Hao

2021 ◽  
Author(s):  
Didem Taşcıoğlu ◽  
Arda Atçı ◽  
Seçil SEVİM ÜNLÜTÜRK ◽  
Serdar Ozcelik

Abstract Counterfeiting is a growing economic and social problem. For anticounterfeiting, random and inimitable droplet/fiber patterns were created by the electrospinning method as security tags that are detectable under UV light but invisible in daylight. To check the authenticity of the original security patterns created; images were collected with a simple smartphone microscope and a database of the recorded original patterns was created. The originality of the random patterns was checked by comparing them with the patterns recorded in the database. In addition, the spectral signature of the patterns in the droplet/fiber network was obtained with a simple and hand-held spectrometer. Thus, by reading the spectral signature from the pattern, the spectral information of the photoluminescent nanoparticles was verified and thus a second-step verification was established. In this way, anticounterfeiting technology that combines ink formula, unclonable security pattern creation and two-level verification is developed.


Author(s):  
Charu Gupta ◽  
Rakesh Kumar Singh ◽  
Amar Kumar Mohapatra

Author(s):  
Xueping Su ◽  
Yong Zhou ◽  
Qing Li

Researchers and managers of natural resource conservation have increasingly emphasized the importance of maintaining a connected network of important ecological patches to mitigate landscape fragmentation, reduce the decline of biodiversity, and sustain ecological services. This research aimed to guide landscape management and decision-making by developing an evaluation framework to construct ecological security patterns. Taking the Jianghan Plain as the study area, we identified key ecological sources by overlaying the spatial patterns of ecological quality (biodiversity, carbon storage, and water yield) and ecological sensitivity (habitat sensitivity, soil erosion sensitivity, and water sensitivity) using the Integrated Valuation of Environmental Services and Tradeoffs (InVEST) model and the Chinese Soil Loss Equation Function. Ecological corridors were obtained by the least-cost path analysis method and circuit theory. A total of 48 ecological sources (3812.95 km2), primarily consisting of water area, forestland, and cropland, were identified. Ninety-one ecological corridors were derived, with a total length of 2036.28 km. Forty barriers and 40 pinch points with the highest improvement coefficient scores or priority scores were selected. There were 11 priority corridors with very high levels of connectivity improvement potential and conservation priority, occupying 16.15% of the total length of corridors. The overall potential for ecological connectivity is high on the Jianghan Plain. Our framework offers a valuable reference for constructing ecological security patterns and identifying sites for ecological restoration at the regional scale.


Author(s):  
Tian Xia ◽  
Hironori Washizaki ◽  
Yoshiaki Fukazawa ◽  
Haruhiko Kaiya ◽  
Shinpei Ogata ◽  
...  

Security and privacy in cloud systems are critical. To address security and privacy concerns, many security patterns, privacy patterns, and non-pattern-based knowledge have been reported. However, knowing which pattern or combination of patterns to use in a specific scenario is challenging due to the sheer volume of options and the layered cloud stack. To deal with security and privacy in cloud services, this study proposes the cloud security and privacy metamodel (CSPM). CSPM uses a consistent approach to classify and handle existing security and privacy patterns. In addition, CSPM is used to develop a security and privacy awareness process to develop cloud systems. The effectiveness and practicality of CSPM is demonstrated via several case studies.


Land ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 380
Author(s):  
Yu Han ◽  
Chaoyue Yu ◽  
Zhe Feng ◽  
Hanchu Du ◽  
Caisi Huang ◽  
...  

Urbanization is the development trend of all countries in the world, but it has caused considerable ecological problems that need to be alleviated by building ecological security patterns. This study took Ningbo as an example to construct and optimize an ecological security pattern. We analyzed land use types, normalized difference vegetation index, and landscape connectivity for ecological sources selection. In constructing the resistance surface, we considered natural and socio-economic factors. On this basis, we identified ecological corridors based on a minimum cumulative resistance model. Finally, the ecological security pattern was optimized through space syntax. Results showed that Ningbo has 18 ecological sources, with an area of 3051.27 km2 and 29 ecological corridors, with a length of 1172.18 km. Among them, 11 are first-level, 10 are second-level, and 8 are third-level corridors. After optimization, the area and protection cost of the ecological security pattern were significantly reduced, which can effectively alleviate the trade-off between ecological protection and economic development. This research can provide a reference for the construction and optimization of ecological security patterns and has reference significance for ecological protection in rapidly urbanized areas.


Sign in / Sign up

Export Citation Format

Share Document