Due to the increasing demand for security, the development of intelligent surveillance systems has attracted considerable attention in recent years. This study aims to develop a system that is able to identify whether...Due to the increasing demand for security, the development of intelligent surveillance systems has attracted considerable attention in recent years. This study aims to develop a system that is able to identify whether or not the people need help in a public place. Different from previous work, our work considers not only the behaviors of the target person but also the interaction between him and nearby people. In the paper, we propose an event alarm system which can detect the human behaviors and recognize the happening event through integrating the results generated from the single and group behavior analysis. Several new effective features are proposed in the study. Besides, a mechanism capable of extracting one-to-one and multiple-to-one relations is also developed. Experimental results show that the proposed approach can correctly detect human behaviors and provide the alarm messages when emergency events occur.展开更多
Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distri...Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key distribution protocols, specifically, secrecy properties, such as group secrecy, forward secrecy, backward secrecy, and key independence. In this paper, we present a method to verify forward secrecy properties for group-oriented protocols. The method is based on a correct semantical link between group key protocols and event-B models and also uses the refinement process in the B method to model and verify group and forward secrecy. We use an event-B first-order theorem proving system to provide invariant checking for these secrecy properties. We illustrate our approach on the Tree based Group Diffie-Hellman protocol as case study.展开更多
There is a long-standing controversy of what triggered the extinction at the Permian-Triassic boundary, the most severe mass extinction in the geologic record, including flood basaltic volcanism and/or bolide impact h...There is a long-standing controversy of what triggered the extinction at the Permian-Triassic boundary, the most severe mass extinction in the geologic record, including flood basaltic volcanism and/or bolide impact hypothesis. In order to clarify various pieces of evidence for the mass extinction event at the Permian-Triassic boundary, some researchers from some laboratories throughout the world have made a comprehensive study on a group of samples from the Meishan area of China. Some fresh core samples from the Permian-Triassic boundary in the Meishan area were analyzed in this study. The results showed that there is no Ir anomaly. Moreover, the PGEs patterns of those samples show obvious differentiation characteristics, that is different from the case encountered in meteorites. So no evidence supports the hypothesis of extraterrestrial impact. In contrast, the PGEs patterns are similar to those of Siberian and Emeishan basalts, which indicates that those PGEs are derived mainly from the basalts, lending a support to the correlation between mass extinction at the Permian-Triassic boundary and flood basaltic volcanism. This study has also confirmed the results for samples from section C prior to the analysis of the samples.展开更多
基金supported by the“MOST”under Grant No.104-2221-E-259-024-MY2
文摘Due to the increasing demand for security, the development of intelligent surveillance systems has attracted considerable attention in recent years. This study aims to develop a system that is able to identify whether or not the people need help in a public place. Different from previous work, our work considers not only the behaviors of the target person but also the interaction between him and nearby people. In the paper, we propose an event alarm system which can detect the human behaviors and recognize the happening event through integrating the results generated from the single and group behavior analysis. Several new effective features are proposed in the study. Besides, a mechanism capable of extracting one-to-one and multiple-to-one relations is also developed. Experimental results show that the proposed approach can correctly detect human behaviors and provide the alarm messages when emergency events occur.
文摘Group key security protocols play an important role in today’s communication systems. Their verification, however, remains a great challenge because of the dynamic characteristics of group key construction and distribution protocols. Security properties that are well defined in normal two-party protocols have different meanings and different interpretations in group key distribution protocols, specifically, secrecy properties, such as group secrecy, forward secrecy, backward secrecy, and key independence. In this paper, we present a method to verify forward secrecy properties for group-oriented protocols. The method is based on a correct semantical link between group key protocols and event-B models and also uses the refinement process in the B method to model and verify group and forward secrecy. We use an event-B first-order theorem proving system to provide invariant checking for these secrecy properties. We illustrate our approach on the Tree based Group Diffie-Hellman protocol as case study.
文摘目的:探讨不同年龄段住院2型糖尿病(type 2 diabetes mellitus,T2DM)患者临床特征及心血管事件发生影响因素。方法:收集2019年1月至12月石家庄市第二医院108例住院T2DM患者的临床资料,根据心血管事件发生分为发生组和未发生组,比较两组临床特征及不同年龄住院T2DM患者临床特征,采用Logistic回归方程分析住院T2DM患者心血管事件发生影响因素。结果:(1)所有患者均获得2年随访结果,心血管事件发生率为37.04%;(2)发生组年龄、T2DM病程、糖化血红蛋白(glycosylated hemoglobin,HbA1c)、半乳糖凝集素-3(galectin-3,Gal-3)、高血压病史均大或长或高于未发生组,踝肱指数、C1q/肿瘤坏死因子相关蛋白9(C1q/tumor necrosis factor related protein 9,CTRP9)低于未发生组(P<0.05);(3)老年组T2DM病程、HbA1c、Gal-3、高血压病史均大或长或高于中青年组,踝肱指数、CTRP9低于中青年组(P<0.05);(4)T2DM病程、踝肱指数、年龄、CTRP9是住院T2DM患者心血管事件发生影响因素(P<0.05)。结论:T2DM病程、踝肱指数、年龄、CTRP9可能是导致住院T2DM患者心血管事件发生的影响因素,临床实际中应密切关注伴有上述情况的住院T2DM患者,积极防治,促进预后改善。
基金financially supported by the National Natural Science Foundation of China (No. 41073053)
文摘There is a long-standing controversy of what triggered the extinction at the Permian-Triassic boundary, the most severe mass extinction in the geologic record, including flood basaltic volcanism and/or bolide impact hypothesis. In order to clarify various pieces of evidence for the mass extinction event at the Permian-Triassic boundary, some researchers from some laboratories throughout the world have made a comprehensive study on a group of samples from the Meishan area of China. Some fresh core samples from the Permian-Triassic boundary in the Meishan area were analyzed in this study. The results showed that there is no Ir anomaly. Moreover, the PGEs patterns of those samples show obvious differentiation characteristics, that is different from the case encountered in meteorites. So no evidence supports the hypothesis of extraterrestrial impact. In contrast, the PGEs patterns are similar to those of Siberian and Emeishan basalts, which indicates that those PGEs are derived mainly from the basalts, lending a support to the correlation between mass extinction at the Permian-Triassic boundary and flood basaltic volcanism. This study has also confirmed the results for samples from section C prior to the analysis of the samples.