期刊文献+
共找到12,561篇文章
< 1 2 250 >
每页显示 20 50 100
Socio-economic vulnerability level in the Jeneberang watershed in Gowa Regency,South Sulawesi Province,Indonesia
1
作者 Andi Rachmat ARFADLY Hazairin ZUBAIR +1 位作者 MAHYUDDIN Andang Suryana SOMA 《Regional Sustainability》 2024年第1期69-79,共11页
Jeneberang watershed is vital,particularly for people living in Gowa Regency(South Sulawesi Province,Indonesia),who benefit from its many advantages.Landslides and floods occur every year in the Jeneberang watershed,s... Jeneberang watershed is vital,particularly for people living in Gowa Regency(South Sulawesi Province,Indonesia),who benefit from its many advantages.Landslides and floods occur every year in the Jeneberang watershed,so it is imperative to understand the socio-economic vulnerability of this region.This research aims to identify the vulnerability level of the Jeneberang watershed so that the government can prioritize areas with high vulnerability level and formulate effective strategies to reduce these the vulnerability.Specifically,this study was conducted in 12 districts located in the Jeneberang watershed.The primary data were collected from questionnaires completed by community members,community leaders,and various stakeholders,and the secondary data were from the Landsat satellite imagery in 2020,the Badan Push Statistic of Gowa Regency,and some governmental agencies.The socio-economic vulnerability variables were determined using the Multiple Criteria Decision Analysis(MCDA)method,and each variable was weighted and analyzed using the Geographical Information System(GIS).The study reveals that the levels of socio-economic vulnerability are affected by variables such as population density,vulnerable groups(disabled people,elderly people,and young people),road network and settlement,percentage of poor people,and productive land area in the Jeneberang watershed.Moreover,all of the 12 districts in the Jeneberang watershed are included in the medium vulnerability level,with the mean percentage of socio-economic vulnerability around 50.92%.The socio-economic vulnerability of Bajeng,Pallangga,and Somba Opu districts is categorized at high level,the socio-economic vulnerability of Bungaya,Parangloe,and Tombolo Pao districts is classified as medium level,and the remaining 6 districts(Barombong,Bontolempangan,Bontomarannu,Manuju,Parigi,and Tinggimoncong)are ranked as low socio-economic vulnerability.This study can help policy-makers to formulate strategy that contributes to the protection of biodiversity and sustainable development of the Jeneberang watershed,while improving disaster resilience and preparedness of the watershed. 展开更多
关键词 Socio vulnerability Economic vulnerability Population density Vulnerable groups Road network and settlement Productive land area Jeneberang watershed
下载PDF
Vulnerability assessment of UAV engine to laser based on improved shotline method
2
作者 Le Liu Chengyang Xu +3 位作者 Changbin Zheng Sheng Cai Chunrui Wang Jin Guo 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期588-600,共13页
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v... Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser. 展开更多
关键词 Laser weapon Laser damage vulnerability UAV ENGINE Killing probability
下载PDF
Understanding livelihood vulnerability:a perspective from Western Sichuan’s ethnic rural settings
3
作者 YU Yongqian JING Zheng +3 位作者 WANG Yan QIU Xiaoping YANG Xueting XU Yun 《Journal of Mountain Science》 SCIE CSCD 2024年第2期380-396,共17页
To explore the livelihood status and key influencing factors of rural households in the minority areas,we collected flat data from 284 rural households in 32 villages across 12 counties of Western Sichuan from 2021 to... To explore the livelihood status and key influencing factors of rural households in the minority areas,we collected flat data from 284 rural households in 32 villages across 12 counties of Western Sichuan from 2021 to 2022.We conducted participatory household survey on the livelihood status of the rural households and try to identify the key factors to influence their livelihood vulnerability using multiple linear regression.The results showed that:the livelihood situation of the rural households is relatively vulnerable.The vulnerability varies significantly with the income levels,education levels,and income sources.The vulnerability of farm households,categorized from low to high livelihood types,follows the sequence:non-agricultural dominant households,non-agricultural households,agricultural dominant households,and pure agricultural households.The degree of damage to the natural environment,education costs,loan opportunities,the proportion of agricultural income to annual household income,and the presence of sick people in the household have significant positive effects on the livelihood vulnerability index(LVI)of rural households;while help from relatives and friends,net income per capita,household size,household education,agricultural land area,participation in industrial organizations,number of livestock,purchase of commercial houses,drinking water source,and self-supply of food have significant negative effects.Based on the findings,we believe that local rural households operate in a complex livelihood system and recommend continuous interventions targeting key influences to provide empirical research support for areas facing similar situations. 展开更多
关键词 LIVELIHOOD vulnerability Rural households Ethnic areas
原文传递
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
4
作者 Dahyeon Kim Namgi Kim Junho Ahn 《Computers, Materials & Continua》 SCIE EI 2024年第3期3867-3889,共23页
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof... This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules. 展开更多
关键词 FRAMEWORK AUTOMATION vulnerability analysis SECURITY GUIDELINES
下载PDF
Binary Program Vulnerability Mining Based on Neural Network
5
作者 Zhenhui Li Shuangping Xing +5 位作者 Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1861-1879,共19页
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i... Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion. 展开更多
关键词 vulnerability mining de-obfuscation neural network graph embedding network symbolic execution
下载PDF
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
6
作者 Huaiguang Wu Yibo Peng +1 位作者 Yaqiong He Jinlin Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期77-108,共32页
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi... In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection. 展开更多
关键词 Smart contract vulnerability detection deep learning
下载PDF
Groundwater vulnerability assessment using a GIS-based DRASTIC method in the Erbil Dumpsite area (Kani Qirzhala), Central Erbil Basin, North Iraq
7
作者 Masoud H Hamed Rebwar N Dara Marios C Kirlas 《Journal of Groundwater Science and Engineering》 2024年第1期16-33,共18页
Groundwater vulnerability assessment is a crucial step in the efficient management of groundwater resources,especially in areas with intensive anthropogenic activities and groundwater pollution.In the present study,th... Groundwater vulnerability assessment is a crucial step in the efficient management of groundwater resources,especially in areas with intensive anthropogenic activities and groundwater pollution.In the present study,the DRASTIC method was applied using Geographic Information System(GIS)to delineate groundwater vulnerability zones in the Erbil Dumpsite area,Central Erbil Basin,North Iraq.Results showed that the area was classified into four vulnerability classes:Very low(16.97%),low(27.67%),moderate(36.55%)and high(18.81%).The southern,south-eastern and northern parts of the study area exhibited the highest vulnerability potential,while the central-northern,northern and north-western regions displayed the lowest vulnerability potential.Moreover,results of the single-parameter sensitivity analysis indicated that amongst the seven DRASTIC parameters,the unsaturated zone and the aquifer media were the most influencing parameters.In conclustion,the correlation of 25 nitrate concentration values with the final vulnerability map,assessed using the Pearson correlation coefficient,yielded a satisfactory result of R=0.72. 展开更多
关键词 DRASTIC Erbil Iraq Groundwater vulnerability assessment NITRATE POLLUTION Sensitivity analysis
下载PDF
Application of Hazard Vulnerability Analysis Based on Kaiser Model in Neonatal Breast Milk Management
8
作者 Bingqing Zheng Wenqing Zhang Xiaoxia Huang 《Journal of Clinical and Nursing Research》 2024年第1期152-161,共10页
Objective:To analyze the existing risks in breast milk management at the neonatal department and provide corresponding countermeasures.Methods:22 risk events were identified in 7 risk links in the process of bottle-fe... Objective:To analyze the existing risks in breast milk management at the neonatal department and provide corresponding countermeasures.Methods:22 risk events were identified in 7 risk links in the process of bottle-feeding of breast milk.Hazard Vulnerability Analysis based on the Kaiser model was applied to investigate and evaluate the risk events.Results:High-risk events include breast milk quality inspection,hand hygiene during collection,disinfection of collectors,cold chain management,hand hygiene during the reception,breast milk closed-loop management,and post-collection disposal.Root cause analysis of high-risk events was conducted and breast milk management strategies outside the hospital and within the neonatal department were proposed.Conclusion:Hazard Vulnerability Analysis based on the Kaiser model can identify and assess neonatal breast milk management risks effectively,which helps improve the management of neonatal breast milk.It is conducive to the safe development and promotion of bottle feeding of breast milk for neonates,ensuring the quality of medical services and the safety of children. 展开更多
关键词 Breast milk management The Kaiser model Hazard vulnerability analysis risk assessment
下载PDF
Towards rapid and automated vulnerability classification of concrete buildings
9
作者 Lissette Iturburu Jean Kwannandar +3 位作者 Shirley J.Dyke Xiaoyu Liu Xin Zhang Julio Ramirez 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2023年第2期309-332,共24页
With the overwhelming number of older reinforced concrete buildings that need to be assessed for seismic vulnerability in a city,local governments face the question of how to assess their building inventory.By leverag... With the overwhelming number of older reinforced concrete buildings that need to be assessed for seismic vulnerability in a city,local governments face the question of how to assess their building inventory.By leveraging engineering drawings that are stored in a digital format,a well-established method for classification reinforced concrete buildings with respect to seismic vulnerability,and machine learning techniques,we have developed a technique to automatically extract quantitative information from the drawings to classify vulnerability.Using this technique,stakeholders will be able to rapidly classify buildings according to their seismic vulnerability and have access to information they need to prioritize a large building inventory.The approach has the potential to have significant impact on our ability to rapidly make decisions related to retrofit and improvements in our communities.In the Los Angeles County alone it is estimated that several thousand buildings of this type exist.The Hassan index is adopted here as the method for automation due to its simple application during the classification of the vulnerable reinforced concrete buildings.This paper will present the technique used for automating information extraction to compute the Hassan index for a large building inventory. 展开更多
关键词 object detection SEGMENTATION U-Net vulnerability hazards EARTHQUAKES reinforced concrete building inventories and databases
下载PDF
Agricultural Vulnerability to Drought in China's Agro-pastoral Ecotone:A Case Study of Yulin City,Shaanxi Province
10
作者 LI Yuheng CHENG Wenjing +1 位作者 ZUO Wenjie ZHANG Lingyue 《Chinese Geographical Science》 SCIE CSCD 2023年第5期934-945,共12页
Agro-pastoral ecotone of northern China is the prominent area for agricultural production,but it is also the most typical ecological fragile area with frequent drought disasters.Taking Yulin City at Shaanxi Province i... Agro-pastoral ecotone of northern China is the prominent area for agricultural production,but it is also the most typical ecological fragile area with frequent drought disasters.Taking Yulin City at Shaanxi Province in China as the case area,the paper aims to investigate the spatio-temporal changes of agricultural vulnerability to drought in China’s agro-pastoral ecotone in the period 2000 to2020.The results show that:1)the agricultural vulnerability to drought in Yulin City has shifted from high vulnerability in the period2000–2010 to low vulnerability in the period 2011–2020.2)There exist obvious spatio-temporal differences of the agricultural vulnerability to drought in Yulin City during the research period.3)Four sensitive events and 14 resilient events were identified in the research and the crops of Yulin had become more resilient to drought.Finally,the paper put forward with policy implications to make adaptive strategies of agriculture to climate change in China’s agro-pastoral ecotone in the future,e.g.,carrying out agricultural zoning based on agricultural production conditions,intensifying the construction of disaster prevention and relief system,and integrating with modern agricultural technology to develop new type agriculture. 展开更多
关键词 climate change agricultural vulnerability DROUGHT agro-pastoral ecotone Yulin City China
下载PDF
Consortium Chain Consensus Vulnerability and Chain Generation Mechanism
11
作者 Rui Qiao hi Dong 《Computers, Materials & Continua》 SCIE EI 2023年第11期2505-2527,共23页
Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation ... Effectively identifying and preventing the threat of Byzantine nodes to the security of distributed systems is a challenge in applying consortium chains.Therefore,this paper proposes a new consortium chain generation model,deeply analyzes the vulnerability of the consortium chain consensus based on the behavior of the nodes,and points out the effects of Byzantine node proportion and node state verification on the consensus process and system security.Furthermore,the normalized verification node aggregation index that represents the consensus ability of the consortium organization and the trust evaluation function of the verification node set is derived.When either of the two is lower than the threshold,the consortium institution or the verification node set members are dynamically adjusted.On this basis,an innovative consortium chain generation mechanism based on the Asynchronous Binary Byzantine Consensus Mechanism(ABBCM)is proposed.Based on the extended consortium chain consensus mechanism,a certain consensus value set can be combined into multiple proposals,which can realize crossdomain asynchronous message passing between multi-consortium chains without reducing the system’s security.In addition,experiments are carried out under four classical Byzantine Attack(BA)behaviors,BA1 to BA4.The results show that the proposed method can obtain better delay than the classical random Byzantine consensus algorithm Coin,effectively improving the consensus efficiency based on asynchronous message passing in the consortium chain and thus meeting the throughput of most Internet of Things(IoT)applications. 展开更多
关键词 Consortium chain BYZANTINE CONSENSUS generation mechanism Internet of Things consensus vulnerability
下载PDF
Vulnerability assessment of coastal wetlands in Minjiang River Estuary based on cloud model under sea level rise
12
作者 Xiaohe Lai Chuqing Zeng +4 位作者 Yan Su Shaoxiang Huang Jianping Jia Cheng Chen Jun Jiang 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2023年第7期160-174,共15页
The change of coastal wetland vulnerability affects the ecological environment and the economic development of the estuary area.In the past,most of the assessment studies on the vulnerability of coastal ecosystems sta... The change of coastal wetland vulnerability affects the ecological environment and the economic development of the estuary area.In the past,most of the assessment studies on the vulnerability of coastal ecosystems stayed in static qualitative research,lacking predictability,and the qualitative and quantitative relationship was not objective enough.In this study,the“Source-Pathway-Receptor-Consequence”model and the Intergovernmental Panel on Climate Change vulnerability definition were used to analyze the main impact of sea level rise caused by climate change on coastal wetland ecosystem in Minjiang River Estuary.The results show that:(1)With the increase of time and carbon emission,the area of high vulnerability and the higher vulnerability increased continuously,and the area of low vulnerability and the lower vulnerability decreased.(2)The eastern and northeastern part of the Culu Island in the Minjiang River Estuary of Fujian Province and the eastern coastal wetland of Meihua Town in Changle District are areas with high vulnerability risk.The area of high vulnerability area of coastal wetland under high emission scenario is wider than that under low emission scenario.(3)Under different sea level rise scenarios,elevation has the greatest impact on the vulnerability of coastal wetlands,and slope has less impact.The impact of sea level rise caused by climate change on the coastal wetland ecosystem in the Minjiang River Estuary is mainly manifested in the sea level rise,which changes the habitat elevation and daily flooding time of coastal wetlands,and then affects the survival and distribution of coastal wetland ecosystems. 展开更多
关键词 vulnerability assessment cloud model coastal wetland Minjiang River Estuary
下载PDF
GRATDet:Smart Contract Vulnerability Detector Based on Graph Representation and Transformer
13
作者 Peng Gong Wenzhong Yang +3 位作者 Liejun Wang Fuyuan Wei KeZiErBieKe HaiLaTi Yuanyuan Liao 《Computers, Materials & Continua》 SCIE EI 2023年第8期1439-1462,共24页
Smart contracts have led to more efficient development in finance and healthcare,but vulnerabilities in contracts pose high risks to their future applications.The current vulnerability detection methods for contracts ... Smart contracts have led to more efficient development in finance and healthcare,but vulnerabilities in contracts pose high risks to their future applications.The current vulnerability detection methods for contracts are either based on fixed expert rules,which are inefficient,or rely on simplistic deep learning techniques that do not fully leverage contract semantic information.Therefore,there is ample room for improvement in terms of detection precision.To solve these problems,this paper proposes a vulnerability detector based on deep learning techniques,graph representation,and Transformer,called GRATDet.The method first performs swapping,insertion,and symbolization operations for contract functions,increasing the amount of small sample data.Each line of code is then treated as a basic semantic element,and information such as control and data relationships is extracted to construct a new representation in the form of a Line Graph(LG),which shows more structural features that differ from the serialized presentation of the contract.Finally,the node information and edge information of the graph are jointly learned using an improved Transformer-GP model to extract information globally and locally,and the fused features are used for vulnerability detection.The effectiveness of the method in reentrancy vulnerability detection is verified in experiments,where the F1 score reaches 95.16%,exceeding stateof-the-art methods. 展开更多
关键词 vulnerability detection smart contract graph representation deep learning source code
下载PDF
Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning
14
作者 Zibo Wang Chaobin Huo +5 位作者 Yaofang Zhang Shengtao Cheng Yilu Chen Xiaojie Wei Chao Li Bailing Wang 《Computers, Materials & Continua》 SCIE EI 2023年第5期2957-2979,共23页
With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecas... With the growing discovery of exposed vulnerabilities in the Industrial Control Components(ICCs),identification of the exploitable ones is urgent for Industrial Control System(ICS)administrators to proactively forecast potential threats.However,it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods.To address these challenges,we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph(KG)in which relation paths contain abundant potential evidence to support the reasoning.The reasoning task in this work refers to determining whether a specific relation is valid between an attacker entity and a possible exploitable vulnerability entity with the help of a collective of the critical paths.The proposed method consists of three primary building blocks:KG construction,relation path representation,and query relation reasoning.A security-oriented ontology combines exploit modeling,which provides a guideline for the integration of the scattered knowledge while constructing the KG.We emphasize the role of the aggregation of the attention mechanism in representation learning and ultimate reasoning.In order to acquire a high-quality representation,the entity and relation embeddings take advantage of their local structure and related semantics.Some critical paths are assigned corresponding attentive weights and then they are aggregated for the determination of the query relation validity.In particular,similarity calculation is introduced into a critical path selection algorithm,which improves search and reasoning performance.Meanwhile,the proposed algorithm avoids redundant paths between the given pairs of entities.Experimental results show that the proposed method outperforms the state-of-the-art ones in the aspects of embedding quality and query relation reasoning accuracy. 展开更多
关键词 Path-based reasoning representation learning attention mechanism vulnerability knowledge graph industrial control component
下载PDF
COCKPIT-PLUS:A proposed method for rapid groundwater vulnerability-driven land use zoning in tropical cockpit karst areas
15
作者 Eko Haryono Afid Nur Kholis +3 位作者 Margaretha Widyastuti Ahmad Cahyadi Hanindha Pradipa Tjahyo Nugroho Adji 《Geography and Sustainability》 CSCD 2023年第4期305-317,共13页
Karst groundwater is highly vulnerable to contamination,which urges better land use zoning.This paper proposes a new approach,called COCKPIT-PLUS,to minimize groundwater contamination within cockpit karst regions.The ... Karst groundwater is highly vulnerable to contamination,which urges better land use zoning.This paper proposes a new approach,called COCKPIT-PLUS,to minimize groundwater contamination within cockpit karst regions.The method employed four parameters:P(the existence of ponor/swallow hole),L(lineament density),U(sinking stream to an underground river),and S(distance to spring/pumping site).These parameters are essential for identifying contaminant pathways and transport from the surface to the karst groundwater/springs.COCKPIT-PLUS has been developed and validated in the Gunungsewu karst in Java,Indonesia.This research considers a cockpit as a single hydrological unit that uniquely recharges karst groundwater.We analyzed 2,811 cockpits and 81 other closed depressions to develop a land use planning map.The research used the time to first arrival(Ta),time to peak(Tp),and Q_(max/min)ratio parameters of two karst springs and two underground pumping sites for validation.Cockpits with ponors/swallow holes,sinking streams,high lineament density,and short distances to springs are vulnerable to groundwater and thus must be restricted areas for any land uses.The findings show that though the COCKPIT-PLUS uses a limited karst dataset,the proposed method seems reliable enough for a rapid land-use zoning approach in cockpit karst areas. 展开更多
关键词 Cockpit karst Karst aquifer Land use planning Rapid assessment Karst vulnerability
下载PDF
Dis-NDVW: Distributed Network Asset Detection and Vulnerability Warning Platform
16
作者 Leilei Li Yansong Wang +5 位作者 Dongjie Zhu Xiaofang Li Haiwen Du Yixuan Lu Rongning Qu Russell Higgs 《Computers, Materials & Continua》 SCIE EI 2023年第7期771-791,共21页
With the rapid development of Internet technology,the issues of network asset detection and vulnerability warning have become hot topics of concern in the industry.However,most existing detection tools operate in a si... With the rapid development of Internet technology,the issues of network asset detection and vulnerability warning have become hot topics of concern in the industry.However,most existing detection tools operate in a single-node mode and cannot parallelly process large-scale tasks,which cannot meet the current needs of the industry.To address the above issues,this paper proposes a distributed network asset detection and vulnerability warning platform(Dis-NDVW)based on distributed systems and multiple detection tools.Specifically,this paper proposes a distributed message sub-scription and publication system based on Zookeeper and Kafka,which endows Dis-NDVW with the ability to parallelly process large-scale tasks.Meanwhile,Dis-NDVW combines the RangeAssignor,RoundRobinAssignor,and StickyAssignor algorithms to achieve load balancing of task nodes in a distributed detection cluster.In terms of a large-scale task processing strategy,this paper proposes a task partitioning method based on First-In-First-Out(FIFO)queue.This method realizes the parallel operation of task producers and task consumers by dividing pending tasks into different queues according to task types.To ensure the data reliability of the task cluster,Dis-NDVW provides a redundant storage strategy for master-slave partition replicas.In terms of distributed storage,Dis-NDVW utilizes a distributed elastic storage service based on ElasticSearch to achieve distributed storage and efficient retrieval of big data.Experimental verification shows that Dis-NDVW can better meet the basic requirements of ultra-large-scale detection tasks. 展开更多
关键词 Distributed network security network asset detection vulnerability warning
下载PDF
Geotechnical and GIS-based environmental factors and vulnerability studies of the Okemesi landslide,Nigeria
17
作者 Oluwakemi Bolanle AKINTAN Johnson Adedeji OLUSOLA +1 位作者 Olaniyi Patrick IMOLE Moyosoluwa Odunayo ADEYEMI 《Regional Sustainability》 2023年第3期249-260,共12页
Landslide is a geological hazard typically associated with extreme events such as earthquakes,heavy rainfall,volcanic eruptions,changes in groundwater level,etc.This study was carried out in Okemesi-Ekiti(also known a... Landslide is a geological hazard typically associated with extreme events such as earthquakes,heavy rainfall,volcanic eruptions,changes in groundwater level,etc.This study was carried out in Okemesi-Ekiti(also known as Okemesi),Southwest Nigeria,with the purpose of using remote sensing and GIS technologies to analyze the environmental factors(grain size,direct shear strength resistance,rainfall data,wet density,surface,and slope)resulting in the occurrence of the Okemesi landslide.The study also aimed to conduct a vulnerability analysis in the study area to identify regions with a probability of landslide occurrence.The grain size analysis of the soil in the Okemesi landslide area showed that slope materials comprised 17.14%gravel,59.31%sand,and 19.48%fines,thus the soil type could be classified as poorly graded gravely sand with a high possibility of landslide occurrence.The geomorphic characteristics of the study area was characterized by slopes ranging from 0.00°to 49.00°,while most slopes in the area were less than 8.00°.The slope aspect direction was mainly in south(157.51°–202.50°),southwest(202.51°–247.50°),west(247.51°–292.50°),and north(0.00°–22.50°and 337.51°–360.00°).The highlands were primarily bounded by the slope directions of north(0.00°–22.50°and 337.51°–360.00°),northeast(22.51°–67.50°),east(67.51°–112.51°),and southeast(112.51°–157.50°),which indicated the potential direction of mass movement.The study area can be divided into three vulnerability zones:high,medium,and low,with the area percentages of 9.00%,61.80%,and 29.20%,respectively.The analysis suggested that the Okemesi landslide was likely triggered by rainfall,which might have weakened the physical structure of slope materials.Understanding the causes and impacts of landslides is crucial for policymakers to implement measures to mitigate landslide hazards,protect infrastructure,and prevent the loss of life in the landslide-prone regions. 展开更多
关键词 Rainfall-induced landslide Landslide hazards Slope materials RAINFALL GEOMORPHOLOGY vulnerability zone Okemesi-Ekiti(Okemesi)
下载PDF
Machine Learning-Based Efficient Discovery of Software Vulnerability for Internet of Things
18
作者 So-Eun Jeon Sun-Jin Lee Il-Gu Lee 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期2407-2419,共13页
With the development of the 5th generation of mobile communi-cation(5G)networks and artificial intelligence(AI)technologies,the use of the Internet of Things(IoT)has expanded throughout industry.Although IoT networks ... With the development of the 5th generation of mobile communi-cation(5G)networks and artificial intelligence(AI)technologies,the use of the Internet of Things(IoT)has expanded throughout industry.Although IoT networks have improved industrial productivity and convenience,they are highly dependent on nonstandard protocol stacks and open-source-based,poorly validated software,resulting in several security vulnerabilities.How-ever,conventional AI-based software vulnerability discovery technologies cannot be applied to IoT because they require excessive memory and com-puting power.This study developed a technique for optimizing training data size to detect software vulnerabilities rapidly while maintaining learning accuracy.Experimental results using a software vulnerability classification dataset showed that different optimal data sizes did not affect the learning performance of the learning models.Moreover,the minimal data size required to train a model without performance degradation could be determined in advance.For example,the random forest model saved 85.18%of memory and improved latency by 97.82%while maintaining a learning accuracy similar to that achieved when using 100%of data,despite using only 1%. 展开更多
关键词 Lightweight devices machine learning deep learning software vulnerability detection common weakness enumeration
下载PDF
Maternal perceived self-efficacy, perceived vulnerability and child health outcome in Ibadan, South-West Nigeria
19
作者 Tosin Yinka Akintunde 《Global Health Journal》 2023年第2期94-100,共7页
Objective:The problems associated with child health continue to constitute a global concern,and child morbidity and mortality remain problematic in Sub-Sahara Africa(SSA).Utilizing a community-based survey conducted i... Objective:The problems associated with child health continue to constitute a global concern,and child morbidity and mortality remain problematic in Sub-Sahara Africa(SSA).Utilizing a community-based survey conducted in Ibadan North Local government,Southwest Nigeria the study examined the influences of maternal perceived self-efficacy(MPSE)and maternal perceived vulnerability(MPV)on child health outcomes(CHO).Methods:The study appraised data from 683 nursing mothers aged 15-45 obtained from 20 major primary healthcare centers in the region undergoing routine health checks for their children.Three regression models were fitted to examine the effects of MPV,MPSE,and confounding variables of maternal preventive actions such as insecticide-treated nets(ITN)usage and child immunization,among other maternal and child sociodemographic attributes on CHO.Results:The study finds that MPV has no correlation with CHO and MPSE but positively correlates with maternal age(r=0.123,P<0.05).However,CHO has a negative correlation with MPSE(r=-0.200,P<0.05)while positively correlated with child age(r=0.134,P<0.05).MPSE has a unique effect on CHO(β=-0.203,P<0.05),maternal preventive action of ITN usage show a positive association with CHO in the study Model 2(β=-0.163,P<0.05),while in Model 3,child's age has a positive association with CHO(β=0.180,P<0.05).The net effect of the study models accounted for approximately 10%of the variance in CHO reported among the children.Conclusion:Overall,MPSE and ITN usage are essential factors for understanding and reducing the potential adverse CHO.Global effort must continue to improve maternal education to support child health and preventive carepractices in SSA. 展开更多
关键词 Child health outcome Maternal perceived self-efficacy Maternal perceived vulnerability Morbidity NIGERIA
下载PDF
Geospatial Coronavirus Vulnerability Regression Modelling for Malawi Based on Cumulative Spatial Data from April 2020 to May 2021
20
作者 Emmanuel Chinkaka Kyle F. Davis +5 位作者 Dawnwell Chiwanda Billy Kachingwe Stanley Gusala Richard Mvula Francis Chauluka Julie Michelle Klinger 《Journal of Geographic Information System》 2023年第1期110-121,共12页
In the past two to three years, the world has been heavily affected by the infectious coronavirus disease and Malawi has not been spared due to its interconnection with neighboring countries. There is no management to... In the past two to three years, the world has been heavily affected by the infectious coronavirus disease and Malawi has not been spared due to its interconnection with neighboring countries. There is no management tool to identify and model the vulnerabilities of Malawi’s districts in prioritizing health services as far as coronavirus prevalence and other infectious diseases are concerned. The aim of this study was to model coronavirus vulnerability in all districts in Malawi using Geographic Information System (GIS) to monitor the disease’s cumulative prevalence over the severely affected period between 2020 and 2021. To achieve this, four parameters associated with coronavirus prevalence, including population density, percentage of older people, temperature, and humidity, were prepared in a GIS environment and used in the modelling process. A multiscale geographically weighted regression (MGWR) model was used to model and determine the vulnerability of coronavirus in Malawi. In the MGWR modelling, the Fixed Spatial Kernel was used following a Gaussian distribution model type. The Results indicated that population density and older people (age greater than 60 years) have a more significant impact on coronavirus prevalence in Malawi. The modelling further shows that Malawi, between April 2020 and May 2021, Lilongwe, Blantyre and Thyolo were more vulnerable to coronavirus than other districts. This research has shown that spatial variability of Covid-19 cases using MGWR has the potential of providing useful insights to policymakers for targeted interventions that could otherwise not be possible to detect using non-geovisualization techniques. 展开更多
关键词 Malawi GEOSPATIAL Spatial Dependency CORONAVIRUS vulnerability Spatial Variability Prevalence MGWR GIS
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部