The Chinese government is dedicated to enhancing the level of informatization in administrative law enforcement to ensure fairness and increase credibility.Currently,law enforcement has exposed such problems as insuff...The Chinese government is dedicated to enhancing the level of informatization in administrative law enforcement to ensure fairness and increase credibility.Currently,law enforcement has exposed such problems as insufficient force,difficulties in collecting evidence,and low evidential power.These problems contradict the principles of rule of law and standardization.Many local governments have implemented advanced information technologies for urban administration and law enforcement,including big data,artificial intelligence,and IoT.Among these technologies,IoT is the core communication infrastructure for innovative law enforcement platforms.However,traditional video communications rely on batteries or dedicated power sources,leading to maintenance challenges and high power consumption.In this paper,we propose AT-Eye,a new video communication paradigm for all-time law enforcement video monitoring,which is battery-free and high-throughput.The key enabler of AT-Eye is ambient backscatter technology,which enables energy harvesting and video communication simultaneously.Unlike previous methods,our proposal introduces a novel CCK-based modulation for tag cameras and achieves 4-way concurrency.The modulation is simple because it uses phase difference and it is energyefficient because generating square waves is adequate.Moreover,to ensure full compatibility with COTS WiFi,we modulate the physical service data unit.Therefore,data recovery is possible using only commercial NICs.We conduct comprehensive experiments to examine our proposal and experiment results show that AT-Eye achieves a throughput of 10.8 Mbps with COTS radios.We also simulate a 16-way battery-free tag camera system,demonstrating AT-Eye’s feasibility of high-definition video communication.展开更多
Containerization is a fundamental component of modern cloud-native infrastructure,and Kubernetes is a prominent platform of container orchestration systems.However,containerization raises significant security concerns...Containerization is a fundamental component of modern cloud-native infrastructure,and Kubernetes is a prominent platform of container orchestration systems.However,containerization raises significant security concerns due to the nature of sharing a kernel among multiple containers,which can lead to container breakout or privilege escalation.Kubernetes cannot avoid it as well.While various tools,such as container image scanning and configuration checking,can mitigate container workload vulnerabilities,these are not foolproof and cannot guarantee perfect isolation or prevent every active threat in runtime.As such,a policy enforcement solution is required to tackle the problem,and existing solutions based on LSM(Linux Security Module)frameworks may not be adequate for some situations.To address this,we propose an enforcement system based on BPF-LSM,which leverages eBPF(extended Berkeley Packet Filter)technology to provide fine-grained control and dynamic adoption of security policies.In this paper,we compare different LSM implementations to highlight the challenges of current enforcement solutions before detailing the design of our eBPF-based Kubernetes Runtime Instrumentation and Enforcement System(KRSIE).Finally,we evaluate the effectiveness of our system using a real-world scenario,as measuring the performance of a policy enforcement system is a complex task.Our results show that KRSIE can successfully control containers’behaviors using LSM hooks at container runtime,offering improved container security for cloud-native infrastructure.展开更多
According to the United Nations Environmental Programme(UNEP),the world loses 1.0×106hm2forest land through deforestation annually.About 1.6×106people who depend on forests for livelihood are negatively affe...According to the United Nations Environmental Programme(UNEP),the world loses 1.0×106hm2forest land through deforestation annually.About 1.6×106people who depend on forests for livelihood are negatively affected by deforestation and forest degradation.The paper attempts to study the impact of forest governance,enforcement and socio-economic factors on deforestation and forest degradation at the local level in West Bengal State,India.The study was based on questionnaire survey data during 2020–2021 collected from three western districts(Purulia,Bankura,and Paschim Medinipur)where deforestation and poverty rates are higher than other districts in West Bengal State.The total number of selected villages was 29,and the total sample households were 693.A stratified random sampling technique was used to collect data,and a questionnaire was followed.Forest governance and enforcement indices were constructed using United Nation Development Programme(UNDP)methodology and a step-wise logistic regression model was used to identify the factors affecting deforestation and forest degradation.The result of this study showed that four factors(illegal logging,weak forest administration,encroachment,and poverty)are identified for the causes of deforestation and forest degradation.It is observed that six indices of forest governance(rule of law,transparency,accountability,participation,inclusiveness and equitability,and efficiency and effectiveness)are relatively high in Purulia District.Moreover,this study shows that Purulia and Bankura districts follow medium forest governance,while Paschim Medinipur District has poor forest governance.The enforcement index is found to be highest in Purulia District(0.717)and lowest for Paschim Medinipur District(0.257).Finally,weak forest governance,poor socio-economic conditions of the households,and weak enforcement lead to the deforestation and forest degradation in the study area.Therefore,governments should strengthen law enforcement and encourage sustainable forest certification schemes to combat illegal logging.展开更多
Guyana is an oil-producing country vulnerable to potential oil spills and the environmental risks posed by oil and gas exploration and production activities. Despite the technologically advanced equipment employed by ...Guyana is an oil-producing country vulnerable to potential oil spills and the environmental risks posed by oil and gas exploration and production activities. Despite the technologically advanced equipment employed by ExxonMobil Guyana and affiliates, an oil spill could occur due to accidents, equipment failures, or sabotages. The selected coastal communities as the study areas in Region 1 and Region 2 could be adversely affected, particularly the mangrove ecosystems. Potential oil spill pollution will adversely impact mangrove ecosystems in Region 1 and Region 2. Mangroves offer significant benefits to coastal communities, such as coastal defence and carbon sequestration, which puts Guyana on the world map. The research aimed to investigate the mitigation strategies to manage the potential environmental risks on mangrove ecosystems in the coastal communities of Region 1 and Region 2. It followed a qualitative approach and conducted semi-structured interviews with the Toshaos of the selected coastal communities. The data analysis strategy was thematic analysis using the Nvivo software. The major themes included legal and policy frameworks, oil spill response strategies, community-based involvement, and monitoring and enforcement of regulations. The significant results included reviewing and updating the regulatory framework for mangrove management and conservation;oil spills mitigation measures such as containment and shoreline protection and cleanup, cost recovery and compensation, and limited monitoring and law enforcement of mangrove management and conservation regulations by inter-agencies. The regulatory and institutional framework is outdated and needs to be amended. The agencies overseeing mangrove management and conservation have overlapping responsibilities and require more coordination. There should be greater collaboration among agencies for mangrove management and conservation and improved monitoring and enforcement programmes through institutional support.展开更多
Based on the “Healthy China 2030 Planning Outline”, the literature method and logical analysis method are used to review and analyze the implementation process of China’s school football policy from three dimension...Based on the “Healthy China 2030 Planning Outline”, the literature method and logical analysis method are used to review and analyze the implementation process of China’s school football policy from three dimensions: value, interest appeal and institutional background. The study believes that in order to break through the bottleneck of policy implementation and improve the effect of policy implementation, it is necessary to establish correct values and form broad recognition of policies;meet the reasonable interests of all parties and form a synergy for policy implementation;optimize the institutional environment for policy implementation and form effective incentives.展开更多
Law enforcement remains to be the main strategy used to combat poaching and account for high budget share in protected area management. Studies on efficiency of wildlife law enforcement in the protected areas are limi...Law enforcement remains to be the main strategy used to combat poaching and account for high budget share in protected area management. Studies on efficiency of wildlife law enforcement in the protected areas are limited. This study analyzed economic efficiency of wildlife law enforcement in terms of resource used and output generated using three different protected areas (PAs) of Serengeti ecosystem namely Serengeti National Park (SENAPA), Ikorongo/Grumeti Game Reserves (IGGR) and Ikona Wildlife Management Area (IWMA). Three years (2010-2012) monthly data on wildlife law enforcement inputs and outputs were collected from respective PAs authorities and supplemented with key informant interviews and secondary data. Questionnaire surveys were conducted to wildlife law enforcement staff. Shadow prices for non-marketed inputs were estimated, and market prices for marketed inputs. Data Envelopment Analysis (DEA) was used to estimate economic efficiency using Variable Return to Scale (VRS) and Constant Return to Scale (CCR) assumptions. Results revealed that wildlife law enforcement in all PAs was economically inefficient, with less inefficiency observed in IWMA. The less inefficiency in IWMA is likely attributed to existing sense of ownership and responsibility created through community-based conservation which resulted in to decrease in law enforcement costs. A slacks evaluation revealed a potential to reduce fuel consumption, number of patrol vehicles, ration and prosecution efforts at different magnitudes between studied protected areas. There is equal potential to recruit more rangers while maintaining the resting time. These finding forms the bases for monitoring and evaluation with respect to resource usage to enhance efficiency. It is further recommended to enhance community participation in conservation in SENAPA and IGGR to lower law enforcement costs. Collaboration between protected area, police and judiciary is fundamental to enhance enforcement efficiency. Despite old dataset, these findings are relevant since neither conservation policy nor institution framework has changed substantially in the last decade.展开更多
The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitut...The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitutionalization of private law” worldwide provides knowledge resources and reference materials for scholars in China;the second is the understanding and exploration of the judicial application of the Constitution since the 1980s. Among them, such concepts as “the Constitution has direct legal effect” and “the Constitution needs to be implemented by the people” could have directly affected the Qi Yuling case. Focusing on such topics as the case of Qi Yuling, judicial enforcement of the Constitution, and the compilation of the Civil Code, scholars discussed the ways and scope for inclu ding fundamental rights in private law based on their experience abroad. They also looked into specific issues, covering how fundamental rights affect civil acts and the private law effects fundamental rights like personality rights, equali ty rights, freedom of speech, and protection of personal information. In the context of promoting the full implementation of the Constitution in the new era, “fundamental rights and private law” is still a field with great potential in both practice and theory.展开更多
Speeding in a work zone needs to be tackled effectively to enhance work zone safety. This study evaluates the influence of three different work zone signs—speed photo enforced signs, dynamic speed display signs and r...Speeding in a work zone needs to be tackled effectively to enhance work zone safety. This study evaluates the influence of three different work zone signs—speed photo enforced signs, dynamic speed display signs and reduced speed limit signs—on driver speeding behavior using a medium-fidelity driving simulator. The speed photo enforced and reduced speed limit signs were placed at intervals before the start of the work zone and in the work zone. A virtual work zone network was built to replicate the Baltimore–Washington Parkway(MD-295). A total of 66 participants from different socioeconomic backgrounds participated in 264 driving simulation sessions. The speeds were measured over four phases: initial speed area, sign visible area, sign readable area and post sign area. An analysis of variance and post hoc analysis showed that the speed photo enforced sign was the most effective of the three signs. The second speed photo enforced sign within the work zone was more effective at reducing speed than the sign before the start of the work zone, especially in the post sign area. It was observed that female participants tend to slow down more when encountering a speed photo enforcement sign.展开更多
Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents ne...Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents need interaction and communication to achieve their overall goal. Coordination technologies for the Internet typically are concerned with enabling interaction among agents and helping them cooperate with each other. At the same time, access control should also be considered to constrain interaction to make it harmless. Access control should be regarded as the security counterpart of coordination. At present, the combination of coordination and access control remains an open problem. Thus, we propose a role Dased coordination model with policy enforcement in agent application systems. In this model, coordination is combined with access control so as to fully characterize the interactions in agent systems. A set of agents interacting with each other for a common global system task constitutes a coordination group. Role based access control is applied in this model to prevent unauthorized accesses. Coordination policy is enforced in a distributed manner so that the model can be applied to the open distributed systems such as Internet. An Internet online auction system is presented as a case study to illustrate the proposed coordination model and finally the performance analysis of the model is introduced.展开更多
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e...To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.展开更多
The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic.In general,the mass–spring system is applied t...The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic.In general,the mass–spring system is applied to real-time cloth simulation with three types of springs.However,hard spring cloth simulation using the mass–spring system requires a small integration time-step in order to use a large stiffness coefficient.Furthermore,to obtain stable behavior,constraint enforcement is used instead of maintenance of the force of each spring.Constraint force computation involves a large sparse linear solving operation.Due to the large computation,we implement a cloth simulation using adaptive constraint activation and deactivation techniques that involve the mass-spring system and constraint enforcement method to prevent excessive elongation of cloth.At the same time,when the length of the spring is stretched or compressed over a defined threshold,adaptive constraint activation and deactivation method deactivates the spring and generate the implicit constraint.Traditional method that uses a serial process of the Central Processing Unit(CPU)to solve the system in every frame cannot handle the complex structure of cloth model in real-time.Our simulation utilizes the Graphic Processing Unit(GPU)parallel processing with compute shader in OpenGL Shading Language(GLSL)to solve the system effectively.In this paper,we design and implement parallel method for cloth simulation,and experiment on the performance and behavior comparison of the mass-spring system,constraint enforcement,and adaptive constraint activation and deactivation techniques the using GPU-based parallel method.展开更多
Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance;In order to proactively block such threats we need more integrated in...Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance;In order to proactively block such threats we need more integrated information security solution. To achieve this objective, we will analyze a real-world security platform, and focus on some key components Like, NAC, Firewall, and IPS/IDS then study their interaction in the perspective to propose a new security posture that coordinate and share security information between different network security components, using a central policy server that will be the NAC server or the PDP (the Policy Decision Point), playing an orchestration role as a central point of control. Finally we will conclude with potential research paths that will impact NAC technology evolution.展开更多
Albania is facing serious problems with the national food safety control system in terms of legislation, control and enforcement. The objective of this paper is to analyse consumer perceptions about safety of small ru...Albania is facing serious problems with the national food safety control system in terms of legislation, control and enforcement. The objective of this paper is to analyse consumer perceptions about safety of small ruminant meat in Tirana, in a context of weak enforcement of the food safety system. Applying two-step clustering analyses, consumers were classified in four socio-demographic clusters, and it was found that the cluster composed of female consumers with lower education and income levels, and the two clusters composed of male consumers perceive consumed meat as safe. Consumers in the cluster composed of females with university education and higher income are, on average, more concerned with current meat safety measures and tend to place more trust in the veterinarian stamp on meat carcasses rather than in local butchers.展开更多
China is one of the major markets for patent filing and patent exploitation.A powerful enforcement environment may boost both of patent filing and exploitation.A two-track system for the patent enforcement is availabl...China is one of the major markets for patent filing and patent exploitation.A powerful enforcement environment may boost both of patent filing and exploitation.A two-track system for the patent enforcement is available in China:the administrative system via local intellectual property offices,and the judicial system via courts.展开更多
An effective evaluation system can provide specific and practical suggestions to the deep groundwater management. But such kind of evaluation system has not been proposed in China. In this study, an evaluation index s...An effective evaluation system can provide specific and practical suggestions to the deep groundwater management. But such kind of evaluation system has not been proposed in China. In this study, an evaluation index system is specifically developed to evaluate deep groundwater management efficiency. It is composed of three first-level indicators(law enforcement capability, management ability, and management effectiveness) and eleven second-level indicators. The second-level indicators include seven mandatory indicators and four optional indicators. Piecewise linear function is used to normalize the quantitative indicators, and expert scoring method and questionnaire survey method are used to normalize the qualitative indicators. Then a comprehensive indicator weighting evaluation method is used to evaluate the first-level indicators and the target topic. A case study is carried out to evaluate deep groundwater management efficiency in Tianjin City. According to the evaluation score in each period, the management efficiency of every district in Tianjin City gradually improved. The overall evaluation score in the early deep groundwater extraction period is 0.12. After a series of deep groundwater protection efforts, this score reached to 0.61 in 2007, and met the regulation criteria. The evaluation results also showed that the further groundwater management efforts in Tianjin City should be focused on building a dynamic database to collect comprehensive deep well-log data; and on a reasonable design and distribution of the groundwater monitoring network. It demonstrated that the index system is suitable to locate the deficiencies of current groundwater management systems and to guide further improvements. It can then be used to protect deep groundwater.展开更多
In recent years,the problem of“Impolite Pedestrian”in front of the zebra crossing has aroused widespread concern from all walks of life.The traffic sector’s governance measures have become more serious.The traditio...In recent years,the problem of“Impolite Pedestrian”in front of the zebra crossing has aroused widespread concern from all walks of life.The traffic sector’s governance measures have become more serious.The traditional way of governance is on-site law enforcement,which requires a lot of manpower and material resources and is low efficiency.An enhanced YOLOv3-tiny model is proposed for pedestrians and vehicle detection in traffic monitoring.By modifying the backbone network structure of YOLOv3-tiny model,introducing deep detachable convolution operation,and designing the basic residual block unit of the network,the feature extraction ability of the backbone network is enhanced.The improved model is trained on the VOC2007+VOC2012 training set,and the trained model is tested for performance on the test data set.The experimental results show that:the mean Average Precision(mAP)increased from 0.672 to 0.732,increasing the measurement accuracy by 9%.The Intersection over Union(IoU)increased from 0.783 to 0.855,increasing the coverage accuracy by 7.2%.The enhanced YOLOv3-tiny model has higher measurement accuracy than the original model.Applying this model to the 1080P traffic video on the NVIDIA RTX 2080,the detection speed is 150 FPS,which can fully achieve real-time detection.Through the analysis of pedestrians and vehicle coordinates,it is judged whether or not illegal acts occur.For illegal vehicles,save three pictures as the basis for law enforcement,which forms an important supplement to off-site law enforcement.展开更多
The Arbitration Law of the People’s Republic of China will go into effect on September 1, 1995, which has become the focus of world attention. This is an important law promulgated by China for handling economic dispu...The Arbitration Law of the People’s Republic of China will go into effect on September 1, 1995, which has become the focus of world attention. This is an important law promulgated by China for handling economic disputes. All the parties concerned are making intense preparations for the successful enforcement of the Law. As the first nongovernmental organisation engaged in arbitration affairs, the China Council展开更多
Sustainable reclamation practices for large surface coal mines in USA semiarid environment contribute to the quality of the environmental on a long term basis where environmental resources are protected for future gen...Sustainable reclamation practices for large surface coal mines in USA semiarid environment contribute to the quality of the environmental on a long term basis where environmental resources are protected for future generation.Land,after reclamation,must be suitable for the previous use of greatest economic or social values to the community area.In the semiarid climate of USA,non-developed land is mainly utilized for crops,grazing,and wildlife.Completion of various stages of the reclamation processes includes verifcation and approval of reclamation criteria and performance standards created by state agencies.The sustainable reclamation practices were investigated at the USA’s largest surface coal mine of the semiarid environment in Wyoming.These practices include building post-mining topography to the approximate original contour and reestablish a stable hydrologic system to drain surface water.All available spoil material is backflled and graded to achieve the post-mining topography which closely resembles the pre-mining topography.No overburden material or other coal waste material is left in stockpiles at the mine.Detailed planning until the end of mining,the knowledge of available volumes of suitable backfll material and soil is necessary for sustainable management practices.Diverse and permanent vegetation capable of stabilizing soil surfaces and capable of self-regeneration is established.Sustainable management of the reclamation efort is achieved by enforcement processes developed by the state and federal agencies.Monthly inspections of mining and reclamation operations and reviews of annual reports submitted by the operator help determine if the reclamation processes are occurring according to the permit plan.展开更多
基金This work was supported by NSFC Grant No.62276244,61932017,and 61971390.
文摘The Chinese government is dedicated to enhancing the level of informatization in administrative law enforcement to ensure fairness and increase credibility.Currently,law enforcement has exposed such problems as insufficient force,difficulties in collecting evidence,and low evidential power.These problems contradict the principles of rule of law and standardization.Many local governments have implemented advanced information technologies for urban administration and law enforcement,including big data,artificial intelligence,and IoT.Among these technologies,IoT is the core communication infrastructure for innovative law enforcement platforms.However,traditional video communications rely on batteries or dedicated power sources,leading to maintenance challenges and high power consumption.In this paper,we propose AT-Eye,a new video communication paradigm for all-time law enforcement video monitoring,which is battery-free and high-throughput.The key enabler of AT-Eye is ambient backscatter technology,which enables energy harvesting and video communication simultaneously.Unlike previous methods,our proposal introduces a novel CCK-based modulation for tag cameras and achieves 4-way concurrency.The modulation is simple because it uses phase difference and it is energyefficient because generating square waves is adequate.Moreover,to ensure full compatibility with COTS WiFi,we modulate the physical service data unit.Therefore,data recovery is possible using only commercial NICs.We conduct comprehensive experiments to examine our proposal and experiment results show that AT-Eye achieves a throughput of 10.8 Mbps with COTS radios.We also simulate a 16-way battery-free tag camera system,demonstrating AT-Eye’s feasibility of high-definition video communication.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation (IITP)grant funded by the Korea Government (MSIT), (No.2020-0-00952,Development of 5G edge security technology for ensuring 5G+service stability and availability,50%)the Institute of Information and Communications Technology Planning and Evaluation (IITP)grant funded by the MSIT (Ministry of Science and ICT),Korea (No.IITP-2023-2020-0-01602,ITRC (Information Technology Research Center)support program,50%).
文摘Containerization is a fundamental component of modern cloud-native infrastructure,and Kubernetes is a prominent platform of container orchestration systems.However,containerization raises significant security concerns due to the nature of sharing a kernel among multiple containers,which can lead to container breakout or privilege escalation.Kubernetes cannot avoid it as well.While various tools,such as container image scanning and configuration checking,can mitigate container workload vulnerabilities,these are not foolproof and cannot guarantee perfect isolation or prevent every active threat in runtime.As such,a policy enforcement solution is required to tackle the problem,and existing solutions based on LSM(Linux Security Module)frameworks may not be adequate for some situations.To address this,we propose an enforcement system based on BPF-LSM,which leverages eBPF(extended Berkeley Packet Filter)technology to provide fine-grained control and dynamic adoption of security policies.In this paper,we compare different LSM implementations to highlight the challenges of current enforcement solutions before detailing the design of our eBPF-based Kubernetes Runtime Instrumentation and Enforcement System(KRSIE).Finally,we evaluate the effectiveness of our system using a real-world scenario,as measuring the performance of a policy enforcement system is a complex task.Our results show that KRSIE can successfully control containers’behaviors using LSM hooks at container runtime,offering improved container security for cloud-native infrastructure.
文摘According to the United Nations Environmental Programme(UNEP),the world loses 1.0×106hm2forest land through deforestation annually.About 1.6×106people who depend on forests for livelihood are negatively affected by deforestation and forest degradation.The paper attempts to study the impact of forest governance,enforcement and socio-economic factors on deforestation and forest degradation at the local level in West Bengal State,India.The study was based on questionnaire survey data during 2020–2021 collected from three western districts(Purulia,Bankura,and Paschim Medinipur)where deforestation and poverty rates are higher than other districts in West Bengal State.The total number of selected villages was 29,and the total sample households were 693.A stratified random sampling technique was used to collect data,and a questionnaire was followed.Forest governance and enforcement indices were constructed using United Nation Development Programme(UNDP)methodology and a step-wise logistic regression model was used to identify the factors affecting deforestation and forest degradation.The result of this study showed that four factors(illegal logging,weak forest administration,encroachment,and poverty)are identified for the causes of deforestation and forest degradation.It is observed that six indices of forest governance(rule of law,transparency,accountability,participation,inclusiveness and equitability,and efficiency and effectiveness)are relatively high in Purulia District.Moreover,this study shows that Purulia and Bankura districts follow medium forest governance,while Paschim Medinipur District has poor forest governance.The enforcement index is found to be highest in Purulia District(0.717)and lowest for Paschim Medinipur District(0.257).Finally,weak forest governance,poor socio-economic conditions of the households,and weak enforcement lead to the deforestation and forest degradation in the study area.Therefore,governments should strengthen law enforcement and encourage sustainable forest certification schemes to combat illegal logging.
文摘Guyana is an oil-producing country vulnerable to potential oil spills and the environmental risks posed by oil and gas exploration and production activities. Despite the technologically advanced equipment employed by ExxonMobil Guyana and affiliates, an oil spill could occur due to accidents, equipment failures, or sabotages. The selected coastal communities as the study areas in Region 1 and Region 2 could be adversely affected, particularly the mangrove ecosystems. Potential oil spill pollution will adversely impact mangrove ecosystems in Region 1 and Region 2. Mangroves offer significant benefits to coastal communities, such as coastal defence and carbon sequestration, which puts Guyana on the world map. The research aimed to investigate the mitigation strategies to manage the potential environmental risks on mangrove ecosystems in the coastal communities of Region 1 and Region 2. It followed a qualitative approach and conducted semi-structured interviews with the Toshaos of the selected coastal communities. The data analysis strategy was thematic analysis using the Nvivo software. The major themes included legal and policy frameworks, oil spill response strategies, community-based involvement, and monitoring and enforcement of regulations. The significant results included reviewing and updating the regulatory framework for mangrove management and conservation;oil spills mitigation measures such as containment and shoreline protection and cleanup, cost recovery and compensation, and limited monitoring and law enforcement of mangrove management and conservation regulations by inter-agencies. The regulatory and institutional framework is outdated and needs to be amended. The agencies overseeing mangrove management and conservation have overlapping responsibilities and require more coordination. There should be greater collaboration among agencies for mangrove management and conservation and improved monitoring and enforcement programmes through institutional support.
文摘Based on the “Healthy China 2030 Planning Outline”, the literature method and logical analysis method are used to review and analyze the implementation process of China’s school football policy from three dimensions: value, interest appeal and institutional background. The study believes that in order to break through the bottleneck of policy implementation and improve the effect of policy implementation, it is necessary to establish correct values and form broad recognition of policies;meet the reasonable interests of all parties and form a synergy for policy implementation;optimize the institutional environment for policy implementation and form effective incentives.
文摘Law enforcement remains to be the main strategy used to combat poaching and account for high budget share in protected area management. Studies on efficiency of wildlife law enforcement in the protected areas are limited. This study analyzed economic efficiency of wildlife law enforcement in terms of resource used and output generated using three different protected areas (PAs) of Serengeti ecosystem namely Serengeti National Park (SENAPA), Ikorongo/Grumeti Game Reserves (IGGR) and Ikona Wildlife Management Area (IWMA). Three years (2010-2012) monthly data on wildlife law enforcement inputs and outputs were collected from respective PAs authorities and supplemented with key informant interviews and secondary data. Questionnaire surveys were conducted to wildlife law enforcement staff. Shadow prices for non-marketed inputs were estimated, and market prices for marketed inputs. Data Envelopment Analysis (DEA) was used to estimate economic efficiency using Variable Return to Scale (VRS) and Constant Return to Scale (CCR) assumptions. Results revealed that wildlife law enforcement in all PAs was economically inefficient, with less inefficiency observed in IWMA. The less inefficiency in IWMA is likely attributed to existing sense of ownership and responsibility created through community-based conservation which resulted in to decrease in law enforcement costs. A slacks evaluation revealed a potential to reduce fuel consumption, number of patrol vehicles, ration and prosecution efforts at different magnitudes between studied protected areas. There is equal potential to recruit more rangers while maintaining the resting time. These finding forms the bases for monitoring and evaluation with respect to resource usage to enhance efficiency. It is further recommended to enhance community participation in conservation in SENAPA and IGGR to lower law enforcement costs. Collaboration between protected area, police and judiciary is fundamental to enhance enforcement efficiency. Despite old dataset, these findings are relevant since neither conservation policy nor institution framework has changed substantially in the last decade.
文摘The Qi Yuling case is a crucial juncture in the study of “fundamental rights and private law” in China, yet relevant research is underpinned on two clues. The first is that the increasing interest in the “constitutionalization of private law” worldwide provides knowledge resources and reference materials for scholars in China;the second is the understanding and exploration of the judicial application of the Constitution since the 1980s. Among them, such concepts as “the Constitution has direct legal effect” and “the Constitution needs to be implemented by the people” could have directly affected the Qi Yuling case. Focusing on such topics as the case of Qi Yuling, judicial enforcement of the Constitution, and the compilation of the Civil Code, scholars discussed the ways and scope for inclu ding fundamental rights in private law based on their experience abroad. They also looked into specific issues, covering how fundamental rights affect civil acts and the private law effects fundamental rights like personality rights, equali ty rights, freedom of speech, and protection of personal information. In the context of promoting the full implementation of the Constitution in the new era, “fundamental rights and private law” is still a field with great potential in both practice and theory.
基金the Maryland State Highway Association (SHA) for its funding support throughout the study
文摘Speeding in a work zone needs to be tackled effectively to enhance work zone safety. This study evaluates the influence of three different work zone signs—speed photo enforced signs, dynamic speed display signs and reduced speed limit signs—on driver speeding behavior using a medium-fidelity driving simulator. The speed photo enforced and reduced speed limit signs were placed at intervals before the start of the work zone and in the work zone. A virtual work zone network was built to replicate the Baltimore–Washington Parkway(MD-295). A total of 66 participants from different socioeconomic backgrounds participated in 264 driving simulation sessions. The speeds were measured over four phases: initial speed area, sign visible area, sign readable area and post sign area. An analysis of variance and post hoc analysis showed that the speed photo enforced sign was the most effective of the three signs. The second speed photo enforced sign within the work zone was more effective at reducing speed than the sign before the start of the work zone, especially in the post sign area. It was observed that female participants tend to slow down more when encountering a speed photo enforcement sign.
文摘Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents need interaction and communication to achieve their overall goal. Coordination technologies for the Internet typically are concerned with enabling interaction among agents and helping them cooperate with each other. At the same time, access control should also be considered to constrain interaction to make it harmless. Access control should be regarded as the security counterpart of coordination. At present, the combination of coordination and access control remains an open problem. Thus, we propose a role Dased coordination model with policy enforcement in agent application systems. In this model, coordination is combined with access control so as to fully characterize the interactions in agent systems. A set of agents interacting with each other for a common global system task constitutes a coordination group. Role based access control is applied in this model to prevent unauthorized accesses. Coordination policy is enforced in a distributed manner so that the model can be applied to the open distributed systems such as Internet. An Internet online auction system is presented as a case study to illustrate the proposed coordination model and finally the performance analysis of the model is introduced.
基金The National Key Research and Development Program of China(No.2019YFB1600200).
文摘To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF-2019R1F1A1062752)funded by the Ministry of Education+1 种基金funded by BK21 FOUR(Fostering Outstanding Universities for Research)(No.:5199990914048)supported by the Soonchunhyang University Research Fund.
文摘The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic.In general,the mass–spring system is applied to real-time cloth simulation with three types of springs.However,hard spring cloth simulation using the mass–spring system requires a small integration time-step in order to use a large stiffness coefficient.Furthermore,to obtain stable behavior,constraint enforcement is used instead of maintenance of the force of each spring.Constraint force computation involves a large sparse linear solving operation.Due to the large computation,we implement a cloth simulation using adaptive constraint activation and deactivation techniques that involve the mass-spring system and constraint enforcement method to prevent excessive elongation of cloth.At the same time,when the length of the spring is stretched or compressed over a defined threshold,adaptive constraint activation and deactivation method deactivates the spring and generate the implicit constraint.Traditional method that uses a serial process of the Central Processing Unit(CPU)to solve the system in every frame cannot handle the complex structure of cloth model in real-time.Our simulation utilizes the Graphic Processing Unit(GPU)parallel processing with compute shader in OpenGL Shading Language(GLSL)to solve the system effectively.In this paper,we design and implement parallel method for cloth simulation,and experiment on the performance and behavior comparison of the mass-spring system,constraint enforcement,and adaptive constraint activation and deactivation techniques the using GPU-based parallel method.
文摘Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance;In order to proactively block such threats we need more integrated information security solution. To achieve this objective, we will analyze a real-world security platform, and focus on some key components Like, NAC, Firewall, and IPS/IDS then study their interaction in the perspective to propose a new security posture that coordinate and share security information between different network security components, using a central policy server that will be the NAC server or the PDP (the Policy Decision Point), playing an orchestration role as a central point of control. Finally we will conclude with potential research paths that will impact NAC technology evolution.
基金partially based on a study(survey)that was commissioned by United Nations Development Program(UNDP)Project"Improving the Performance of the Livestock Sector in Albania"to provide inputs for their strategy to support the Albanian small ruminants sector.The study was developed/designed by the authors of this paper
文摘Albania is facing serious problems with the national food safety control system in terms of legislation, control and enforcement. The objective of this paper is to analyse consumer perceptions about safety of small ruminant meat in Tirana, in a context of weak enforcement of the food safety system. Applying two-step clustering analyses, consumers were classified in four socio-demographic clusters, and it was found that the cluster composed of female consumers with lower education and income levels, and the two clusters composed of male consumers perceive consumed meat as safe. Consumers in the cluster composed of females with university education and higher income are, on average, more concerned with current meat safety measures and tend to place more trust in the veterinarian stamp on meat carcasses rather than in local butchers.
文摘China is one of the major markets for patent filing and patent exploitation.A powerful enforcement environment may boost both of patent filing and exploitation.A two-track system for the patent enforcement is available in China:the administrative system via local intellectual property offices,and the judicial system via courts.
基金Under the auspices of National Basic Research Program of China(No.2010CB428804)
文摘An effective evaluation system can provide specific and practical suggestions to the deep groundwater management. But such kind of evaluation system has not been proposed in China. In this study, an evaluation index system is specifically developed to evaluate deep groundwater management efficiency. It is composed of three first-level indicators(law enforcement capability, management ability, and management effectiveness) and eleven second-level indicators. The second-level indicators include seven mandatory indicators and four optional indicators. Piecewise linear function is used to normalize the quantitative indicators, and expert scoring method and questionnaire survey method are used to normalize the qualitative indicators. Then a comprehensive indicator weighting evaluation method is used to evaluate the first-level indicators and the target topic. A case study is carried out to evaluate deep groundwater management efficiency in Tianjin City. According to the evaluation score in each period, the management efficiency of every district in Tianjin City gradually improved. The overall evaluation score in the early deep groundwater extraction period is 0.12. After a series of deep groundwater protection efforts, this score reached to 0.61 in 2007, and met the regulation criteria. The evaluation results also showed that the further groundwater management efforts in Tianjin City should be focused on building a dynamic database to collect comprehensive deep well-log data; and on a reasonable design and distribution of the groundwater monitoring network. It demonstrated that the index system is suitable to locate the deficiencies of current groundwater management systems and to guide further improvements. It can then be used to protect deep groundwater.
基金supported by the following funds:National Key R&D Program of China(2018YFF01010100)National natural science foundation of China(61672064)+1 种基金Beijing natural science foundation project(4172001)Advanced information network Beijing laboratory(PXM2019_014204_500029).
文摘In recent years,the problem of“Impolite Pedestrian”in front of the zebra crossing has aroused widespread concern from all walks of life.The traffic sector’s governance measures have become more serious.The traditional way of governance is on-site law enforcement,which requires a lot of manpower and material resources and is low efficiency.An enhanced YOLOv3-tiny model is proposed for pedestrians and vehicle detection in traffic monitoring.By modifying the backbone network structure of YOLOv3-tiny model,introducing deep detachable convolution operation,and designing the basic residual block unit of the network,the feature extraction ability of the backbone network is enhanced.The improved model is trained on the VOC2007+VOC2012 training set,and the trained model is tested for performance on the test data set.The experimental results show that:the mean Average Precision(mAP)increased from 0.672 to 0.732,increasing the measurement accuracy by 9%.The Intersection over Union(IoU)increased from 0.783 to 0.855,increasing the coverage accuracy by 7.2%.The enhanced YOLOv3-tiny model has higher measurement accuracy than the original model.Applying this model to the 1080P traffic video on the NVIDIA RTX 2080,the detection speed is 150 FPS,which can fully achieve real-time detection.Through the analysis of pedestrians and vehicle coordinates,it is judged whether or not illegal acts occur.For illegal vehicles,save three pictures as the basis for law enforcement,which forms an important supplement to off-site law enforcement.
文摘The Arbitration Law of the People’s Republic of China will go into effect on September 1, 1995, which has become the focus of world attention. This is an important law promulgated by China for handling economic disputes. All the parties concerned are making intense preparations for the successful enforcement of the Law. As the first nongovernmental organisation engaged in arbitration affairs, the China Council
文摘Sustainable reclamation practices for large surface coal mines in USA semiarid environment contribute to the quality of the environmental on a long term basis where environmental resources are protected for future generation.Land,after reclamation,must be suitable for the previous use of greatest economic or social values to the community area.In the semiarid climate of USA,non-developed land is mainly utilized for crops,grazing,and wildlife.Completion of various stages of the reclamation processes includes verifcation and approval of reclamation criteria and performance standards created by state agencies.The sustainable reclamation practices were investigated at the USA’s largest surface coal mine of the semiarid environment in Wyoming.These practices include building post-mining topography to the approximate original contour and reestablish a stable hydrologic system to drain surface water.All available spoil material is backflled and graded to achieve the post-mining topography which closely resembles the pre-mining topography.No overburden material or other coal waste material is left in stockpiles at the mine.Detailed planning until the end of mining,the knowledge of available volumes of suitable backfll material and soil is necessary for sustainable management practices.Diverse and permanent vegetation capable of stabilizing soil surfaces and capable of self-regeneration is established.Sustainable management of the reclamation efort is achieved by enforcement processes developed by the state and federal agencies.Monthly inspections of mining and reclamation operations and reviews of annual reports submitted by the operator help determine if the reclamation processes are occurring according to the permit plan.