Due to the increasing demand for security, the development of intelligent surveillance systems has attracted considerable attention in recent years. This study aims to develop a system that is able to identify whether...Due to the increasing demand for security, the development of intelligent surveillance systems has attracted considerable attention in recent years. This study aims to develop a system that is able to identify whether or not the people need help in a public place. Different from previous work, our work considers not only the behaviors of the target person but also the interaction between him and nearby people. In the paper, we propose an event alarm system which can detect the human behaviors and recognize the happening event through integrating the results generated from the single and group behavior analysis. Several new effective features are proposed in the study. Besides, a mechanism capable of extracting one-to-one and multiple-to-one relations is also developed. Experimental results show that the proposed approach can correctly detect human behaviors and provide the alarm messages when emergency events occur.展开更多
Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distri...Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key distribution protocols, specifically, secrecy properties, such as group secrecy, forward secrecy, backward secrecy, and key independence. In this paper, we present a method to verify forward secrecy properties for group-oriented protocols. The method is based on a correct semantical link between group key protocols and event-B models and also uses the refinement process in the B method to model and verify group and forward secrecy. We use an event-B first-order theorem proving system to provide invariant checking for these secrecy properties. We illustrate our approach on the Tree based Group Diffie-Hellman protocol as case study.展开更多
There is a long-standing controversy of what triggered the extinction at the Permian-Triassic boundary, the most severe mass extinction in the geologic record, including flood basaltic volcanism and/or bolide impact h...There is a long-standing controversy of what triggered the extinction at the Permian-Triassic boundary, the most severe mass extinction in the geologic record, including flood basaltic volcanism and/or bolide impact hypothesis. In order to clarify various pieces of evidence for the mass extinction event at the Permian-Triassic boundary, some researchers from some laboratories throughout the world have made a comprehensive study on a group of samples from the Meishan area of China. Some fresh core samples from the Permian-Triassic boundary in the Meishan area were analyzed in this study. The results showed that there is no Ir anomaly. Moreover, the PGEs patterns of those samples show obvious differentiation characteristics, that is different from the case encountered in meteorites. So no evidence supports the hypothesis of extraterrestrial impact. In contrast, the PGEs patterns are similar to those of Siberian and Emeishan basalts, which indicates that those PGEs are derived mainly from the basalts, lending a support to the correlation between mass extinction at the Permian-Triassic boundary and flood basaltic volcanism. This study has also confirmed the results for samples from section C prior to the analysis of the samples.展开更多
After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group ...After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group events to upgrade and expand the scope of harm. It is difficult to deal. So public opinion control is very important. In this paper, we establish an influence model for spreading of public opinion based on SIR model. Through the political analysis, this paper finds that the network group events will subside, but the influence scope, time and ability of event cannot be ignored. As a result of this study, the corresponding strategies are put forward in this paper.展开更多
A paleosol horizon is described from the contact of the Sausar Group(w2400 Ma) and its basement(Tirodi Gneiss; 〉2500 Ma) in Central India. Physical evidence of pedogenesis is marked by the development of stress c...A paleosol horizon is described from the contact of the Sausar Group(w2400 Ma) and its basement(Tirodi Gneiss; 〉2500 Ma) in Central India. Physical evidence of pedogenesis is marked by the development of stress corrosion cracks, soil peds, corestone weathering and nodular rocks. XRD and SEM-EDX data indicate the presence of siderite, ankerite, uraninite, chlorite, alumino-silicate minerals, ilmenite,rutile and magnetite, in addition to quartz, feldspar and mica. The chemical index of alteration, the plagioclase index of alteration, and the chemical index of weathering show an increasing trend from parent rock to the paleosol and indicate a moderate trend of weathering. The A-CN-K plot indicates loss of feldspars, enrichment in Al2O3 and formation of illite. Different major element ratios indicate baseloss through hydrolysis, clay formation, leaching of some elements, and more precipitation with good surface drainage. The paleosol is depleted in HREE in comparison to the parent rock indicating high fluid-rock interaction during weathering. The paleosol samples show flat Ce and Eu anomalies, low SREE, and high(La/Yb)N, indicative of a reducing environment of formation. Reducing condition can also be inferred from the concentration of elements such as V, Co, Cu, Pb, and Zn in the paleosol profile. Although enriched in Fe and Mg, the overall geochemical patterns of the paleosol indicate oxygen deficient conditions in the atmosphere and development by weathering and leaching processes associated with high precipitation and good surface drainage at the time of development of this paleosol during the Archeane Paleoproterozoic transition.展开更多
Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and ...Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and puts forward the educational strategies to solve college students’network mass incidents:(1)Adhere to humanism and take appeals as the center;(2)To improve the campus network public opinion guidance mechanism under the guidance of relevant social cognition theories;(3)Strengthen communication and improve communication skills;(4)Promote information disclosure and transparency,and eliminate uncertainty and ambiguity.展开更多
Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and ...Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and puts forward the educational strategies to solve college students’network mass incidents:No.1.Adhere to humanism and take appeals as the center;No.2.To improve the campus network public opinion guidance mechanism under the guidance of relevant social cognition theories;No.3.Strengthen communication and improve communication skills;No.4.Promote information disclosure and transparency,and eliminate uncertainty and ambiguity.展开更多
基金supported by the“MOST”under Grant No.104-2221-E-259-024-MY2
文摘Due to the increasing demand for security, the development of intelligent surveillance systems has attracted considerable attention in recent years. This study aims to develop a system that is able to identify whether or not the people need help in a public place. Different from previous work, our work considers not only the behaviors of the target person but also the interaction between him and nearby people. In the paper, we propose an event alarm system which can detect the human behaviors and recognize the happening event through integrating the results generated from the single and group behavior analysis. Several new effective features are proposed in the study. Besides, a mechanism capable of extracting one-to-one and multiple-to-one relations is also developed. Experimental results show that the proposed approach can correctly detect human behaviors and provide the alarm messages when emergency events occur.
文摘Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key distribution protocols, specifically, secrecy properties, such as group secrecy, forward secrecy, backward secrecy, and key independence. In this paper, we present a method to verify forward secrecy properties for group-oriented protocols. The method is based on a correct semantical link between group key protocols and event-B models and also uses the refinement process in the B method to model and verify group and forward secrecy. We use an event-B first-order theorem proving system to provide invariant checking for these secrecy properties. We illustrate our approach on the Tree based Group Diffie-Hellman protocol as case study.
基金financially supported by the National Natural Science Foundation of China (No. 41073053)
文摘There is a long-standing controversy of what triggered the extinction at the Permian-Triassic boundary, the most severe mass extinction in the geologic record, including flood basaltic volcanism and/or bolide impact hypothesis. In order to clarify various pieces of evidence for the mass extinction event at the Permian-Triassic boundary, some researchers from some laboratories throughout the world have made a comprehensive study on a group of samples from the Meishan area of China. Some fresh core samples from the Permian-Triassic boundary in the Meishan area were analyzed in this study. The results showed that there is no Ir anomaly. Moreover, the PGEs patterns of those samples show obvious differentiation characteristics, that is different from the case encountered in meteorites. So no evidence supports the hypothesis of extraterrestrial impact. In contrast, the PGEs patterns are similar to those of Siberian and Emeishan basalts, which indicates that those PGEs are derived mainly from the basalts, lending a support to the correlation between mass extinction at the Permian-Triassic boundary and flood basaltic volcanism. This study has also confirmed the results for samples from section C prior to the analysis of the samples.
文摘After the occurrence of unexpected group events of network, the relevant opinion information will spread rapidly through micro-blog, and the negative public opinion information will aggravate the unexpected the group events to upgrade and expand the scope of harm. It is difficult to deal. So public opinion control is very important. In this paper, we establish an influence model for spreading of public opinion based on SIR model. Through the political analysis, this paper finds that the network group events will subside, but the influence scope, time and ability of event cannot be ignored. As a result of this study, the corresponding strategies are put forward in this paper.
文摘A paleosol horizon is described from the contact of the Sausar Group(w2400 Ma) and its basement(Tirodi Gneiss; 〉2500 Ma) in Central India. Physical evidence of pedogenesis is marked by the development of stress corrosion cracks, soil peds, corestone weathering and nodular rocks. XRD and SEM-EDX data indicate the presence of siderite, ankerite, uraninite, chlorite, alumino-silicate minerals, ilmenite,rutile and magnetite, in addition to quartz, feldspar and mica. The chemical index of alteration, the plagioclase index of alteration, and the chemical index of weathering show an increasing trend from parent rock to the paleosol and indicate a moderate trend of weathering. The A-CN-K plot indicates loss of feldspars, enrichment in Al2O3 and formation of illite. Different major element ratios indicate baseloss through hydrolysis, clay formation, leaching of some elements, and more precipitation with good surface drainage. The paleosol is depleted in HREE in comparison to the parent rock indicating high fluid-rock interaction during weathering. The paleosol samples show flat Ce and Eu anomalies, low SREE, and high(La/Yb)N, indicative of a reducing environment of formation. Reducing condition can also be inferred from the concentration of elements such as V, Co, Cu, Pb, and Zn in the paleosol profile. Although enriched in Fe and Mg, the overall geochemical patterns of the paleosol indicate oxygen deficient conditions in the atmosphere and development by weathering and leaching processes associated with high precipitation and good surface drainage at the time of development of this paleosol during the Archeane Paleoproterozoic transition.
文摘Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and puts forward the educational strategies to solve college students’network mass incidents:(1)Adhere to humanism and take appeals as the center;(2)To improve the campus network public opinion guidance mechanism under the guidance of relevant social cognition theories;(3)Strengthen communication and improve communication skills;(4)Promote information disclosure and transparency,and eliminate uncertainty and ambiguity.
文摘Based on the perspective of psychology,this paper analyzes the causes and characteristics of college students’network mass incidents,explores the psychological factors of college students’network mass incidents,and puts forward the educational strategies to solve college students’network mass incidents:No.1.Adhere to humanism and take appeals as the center;No.2.To improve the campus network public opinion guidance mechanism under the guidance of relevant social cognition theories;No.3.Strengthen communication and improve communication skills;No.4.Promote information disclosure and transparency,and eliminate uncertainty and ambiguity.