A higher education's autonomy has posed seriously, scientifically and urgently a problem of research, development and promulgation of a capacity framework for the University's President, Chairperson of the University Council of the universities. Through the use of the methods such as systematic approach, standardized approach, capacity approach, and detailed description of job position, in-depth interview, and expert advice, we identified the university's president capacity framework that composting of 05 standards; 15 criteria and 40 indicators; the university council chairperson's capacity framework imposing of 03 standards; 08 criteria and 21 indicators. The research and building a capacity framework toward the university's president and the chairperson of the university's council help the presidents and the chairpersons of the university's council themselves strive in order to reach a demanded standards. At the same time, it helps managers of all levels to develop a master planning, training and retraining, designation toward rectors-candidates, presidents-candidates of the university's council.
The Xuan Son national park is one of the medicinal plants - diverse national parts in Vietnam. 665 species, which belong to 6 phylum, 139 families, 298 genera of vascular plant, has recorded in the field surveys. Among them, 22 species are listed in Red Data Book of Vietnam, 22 species in Red List of Medicinal plants of Vietnam and 3 species in Governmental Decree 32/2006/ND-CP. Among 139 families, the 10 most useful ones are Euphorbiaceae, Fabaceae, Rubiaceae, Moraceae, Verbenaceae, Menispermaceae, Myrsinaceae, Zingiberaceae and Araliaceae. Among 298 genera, the 12 most useful ones are Ficus, Ardisia, Polygonum, Alpinia, Limnophila, Stephania, Hedyotis, Mallotus, Desmodium, Piper, Solanum and Psychotria. The six popular types of medicinal plants in Xuan Son national park are tree (17.45%), shrub (22.26%), climber (25.86%), herb (31.88%), epiphytes (1.8%) and parasite (0.75%), distributing mainly to the primary forest, the secondary forest and moorland. This natural resource plays a vital part in community healthcare actions. It is used by local people to treat many diseases as: fever, marsh fever, cold, colic, diarrhea, cough, asthma… and to foster strength. The medicinal plant resource in Xuan Son national part has an important economical value and a potentiality to develop new pharmaceutical and other natural products, contributing to form the cultural identity of ethnic community in the area.
Asarum glabrum (Aristolochiaceae) distributes in many provinces of Vietnam such as Ha Giang, Lai Chau, Lao Cai, Tuyen Quang, Vinh Phuc and Hanoi. This species is listed as vulnerable in the Red Data Book of Vietnam (1996, 2007) and in the Governmental Decree 32/2006/NĐ/CP. Up to now, there has been no research on Asarum spp. in Vietnam. The essential oil from aerial parts of the plant was obtained by steam distillation and yielded 0.36% by air dry material. This essential oil was analysed by GC/MS and 31 constituents were identified. The major constituents found in the oil were safrol (42.24%), apiole (27.11%) and myristicin (6.13%).
With the increase of the threats at information security in Internet of Things (IoT), there are more and more security solutions have been designing. Unlike the traditional security, these solutions need to adapt with IoT Platform because of the difference about complex communication protocol, low energy, processing ability and limited memory. Our research team, after had been under a long process of analyzing theoretical documents and operating simulated experiments, improved, and implemented CurveCP which is one of these Lightweight cryptographies in the Wireless sensor Networks (WSN) to enhance data secure and information security of IoT System. This study briefly describes the improvement of CurveCP Lightweight cryptography by reducing length of cryptographic key as well as implement in IoT System. It also includes the simulated experiments, solutions evaluation, conclusion, and future development. Keywords: Internet of Things (IoTs), Wireless Sensor Network (WSN), CurveCP, cryptographic box References [1] J. Bernstein, CurveCP: Usable Security for the Internet, University of Illinois at Chicago, January 22, 2017. [2] V. Tanh, N. Q. Tri, N. L. Giang, N. A. Tuan, Design of Comprehensive Security Solution on Internet of Things with Improved DTLS Protocol and Overhearing Mechanism, Fundamental and Applied Information Technology Research (FAIR), Nha Trang, Vietnam, 2020. [3] X. Li, W. He, S. Li, Internet of Things in Industries: A Survey,IEEE Transactions on Industrial Informatics, Vol. 10, No. 4, 2014, pp. 2233-2243. [4] Hankerson, A. J. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography, Springer Publishing, 2003. [5] Pauly, C. Perkins, K. Rose, C. Wood, A Survey of Transport Security Protocols, University of Glasgow, September 6, 2018. [6] Dunkels, Contiki: Bringing IP to Sensor Networks, ERCIM News Journal, European Union, 2009. [7] Pedro, Mugdhe, Samarth, Cooja Simulator - Contiki Tutorials, Autonomous Networks Research Group, University of South California, 2016. [8] Abdellatif, Contiki Developer, Power Consumption, July 17, 2017. [9] Culler, D. Estrin, M. Srivastava, Guest Editors' Introduction: Overview of Sensor Networks, 2004, pp. 41-49, https://doi.org/10.1109/mc.2004.93. [10] C. Mansfield, J.L. Antonakos, Computer Networking from LANs to WANs: Hardware, Software, and Security, Boston Cengage Learning, 2010, pp. 501. [11] SAS Team, What is Network Latency (and How Do You Use a Latency Calculator to Calculate Throughput)?, The SAS Group of Companies Limited, April, 2019. [12] Johnson, M. Healy, P. V.D. Ven, J. H. Martin, J. Nelson, T. Newe, E. Lewis, A Comparative Review of Wireless Sensor Network Mote Technologies, IEEE SENSORS Conference, 2009, pp. 1439-1442. [13] D Hofstrand, Energy Measurements and Conversions, Iowa State University Extension and Outreach, 2007. [14]Mojzís, tinyssh, The SSH Library, 2018. [15] J. Bernstein, T. Lange, P. Schwabe, NaCl: Networking and Cryptography library, University of Illinois at Chicago, 2016. [16] Felker, Musl 1.1.24 Reference Manual, License of Massachusetts Institute of Technology, 2011. [17] V. Tanh, N. Q. Tri, N. G. Tuyen, T. Q. Duc, T. H. Anh, B. T. Tung, The Flooding Attack in Low Power and Lossy Networks: A Case Study, The 7 th IEEE International Conference on Smart Communications in Network Technologies (SaCoNet 2018), El Oued, Algeria, 2018. [18]N. V. Tanh, N. Q. Tri, G. Tuyen, N. L. Giang, N. V. Tien, Design a Security System for Internet of Things with Detectinng and Author Proceedings of Eliminating Denial of Service Attack Based on Overhearing Mechanism, the 3rd Symposium of Information Security (SoIS 2018), Da Nang, Vietnam, 2018. [19] S. Samonas, D. Coss, The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security, Journal of Information System Security, Vol. 10, No. 3, 2014, pp. 21-45.