Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the w...Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the war are determined by the America’ purposes in launching the war, which, in the common.展开更多
The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of mu...The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of multi-agent F-knowledge are proposed, which includes the security transmission of multi-agent F-knowledge with positive direction secret key and the security transmission of multi-agent F-knowledge with reverse direction secret key. Finally, the recognition criterion and the applications of F-knowledge are presented. The security of F-knowledge is a new application research direction of S-rough sets in information systems.展开更多
This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus ...This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.展开更多
To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and cons...To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and considerable human impacts. Taking Ningwu as the study area and using variation coefficient method to determine the weights of the indices, we built ecological security pattern based on Pressure-State-Response (P-S-R) Model of Organization for Economic Cooperation and Development. The ecological security status was evaluated by calculating eco-security index (ESI) with socio-economic statistical data of Ningwu during 2001 -2010. The results showed that the situation of eco-security had been improved from heavy alarm to relative safety during 2001 -2010. It reflected that the ecological economic system in Ningwu County tended to be relaxed constantly after experienced a sharp conflict between ecological environment and economic growth. The ecological safety awareness was growing, however, by force of the objective requirements of population growth and economic development, the situation of ecological security was still unstable.展开更多
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, d...The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies.展开更多
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma...Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments.展开更多
Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understand...Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed.展开更多
Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalizati...Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalization, the direct or indirect impact it suffered can be imagined. The Chinese government adopted a series of measures to deal with the financial crisis.展开更多
In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to sub...In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to subdue inflation,despite their already high levels of debt;the bulk commodities market is experiencing volatility,leading to global turbulence and change;trade protectionism is at the forefront of major-power rivalry in political and economic spheres;and regional security crises are compounding international tensions.Behind those flashpoints are contradictions that obstruct world peace and progress,including development imbalances,governance gaps,and structural tensions in global security.In the face of uncertainties,it is crucial for China to seize strategic opportunities and transform crises into favorable situations.China has launched the Global Development Initiative(GDI)and the Global Security Initiative(GSI)to contribute to global prosperity and security.The two initiatives demonstrate China’s commitment to addressing global deficits in peace,development,security,and governance.展开更多
With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resou...With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resources are unevenly distributed; global world's oil prices remain high; and over 70 percent of China's imported oil has to be shipped through the Malacca Strait. There are various ways to ensure China's oil security today, and the practical and feasible strategic option is to increase the discovery and production of domestic oil, raise energy efficiency and develop petroleum substitutes. Scientific and technological innovation is crucial both in new oil reserves discovery and production, energy conservation, and in the development of petroleum substitutes, establishment of a strategic oil reserve system and for environment protection. This indicates that China should take effective measures in investment strategy, fiscal policies, financing instruments, intellectual property protection, fostering talents and professionals, so as to establish its own scientific and technological innovation system in the petroleum industry and be better able to ensure oil security.展开更多
The question of the impact of war on ecosystems still remains secondary in the internal and external policy of states, society and the agenda of international organizations. From the point of view of losses in monetar...The question of the impact of war on ecosystems still remains secondary in the internal and external policy of states, society and the agenda of international organizations. From the point of view of losses in monetary terms, the values of ecosystem damages obtained in the work, which are a consequence of the impact of hostilities on the environment, correspond to the annual budgets of the largest countries in the world or exceed them. The presented calculations significantly exceed the known normative methods, the use of which in the conditions of war is limited in space and time. Objective difficulties associated with the uncertainty of many processes of the development of ecological systems and their reaction to the multifactorial impact of war are also significant limitations. Therefore, as part of the study, a method of assessing the impact of war on the environment is proposed, which is based on the patterns of energy flows in ecosystems from the moment it is binding by producers. This made it possible to take into account in the calculations the principle of functional integrity of the ecological system, according to which the destruction or damage of the components of a functionally whole environment will necessarily cause negative phenomena in the development of ecological systems. The results are presented in the form of real values of ecological losses in energy and monetary equivalents, as consequences of the loss of ecosystem services. As the results of the research show, the minimum amount of damage to ecosystems from Russian tanks is 43,500 USD per day. Environmental damage from Russian fighter jets has been estimated at $1.5 billion per week since the start of the war. Noise from military operations causes losses of at least 2.3 billion US dollars per year. The obtained results create prerequisites for improving the system of ensuring environmental safety at the local, state, and international levels and transferring the obtained solutions into safety-shaping practice.展开更多
文摘Discussions about the U. S-Iraq war would last for years, but the war will surely produce long-term influences on international strategic structure and China’s security environment. The feature and influence of the war are determined by the America’ purposes in launching the war, which, in the common.
基金supported partly by the Natural Science Foundation of Fujian Province of China(2009J01293)the Natural Science Foundation of Shandong Province of China(Y2007H02).
文摘The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of multi-agent F-knowledge are proposed, which includes the security transmission of multi-agent F-knowledge with positive direction secret key and the security transmission of multi-agent F-knowledge with reverse direction secret key. Finally, the recognition criterion and the applications of F-knowledge are presented. The security of F-knowledge is a new application research direction of S-rough sets in information systems.
文摘This paper contrasts Military Power of the People's Republic of China from the year of 2000 to 2009 and Military and Security Developments Involving People's Republic of China from the year 2010 to 2013 with corpus analysis. It distinguishes the new reports' differences from the old ones and tries to explore American's discourse colonization and discourse hegemony through corpus software WordSmith 5.0-Keywords and Concordance analysis of high frequency words. The significance of the study is that it enlightens military texts which will influence audiences' viewpoints and provides a new perspective for strategies replying American media war.
基金Supported by National Natural Science Fund,China(41271143)Soft Science Research Project of Shanxi,China(2013041059-04)
文摘To further understand the status quo and change tendency of ecological security in county area, we took the example of Ningwu County, the headstream of Fenhe River, confronting serious eco-environment problem and considerable human impacts. Taking Ningwu as the study area and using variation coefficient method to determine the weights of the indices, we built ecological security pattern based on Pressure-State-Response (P-S-R) Model of Organization for Economic Cooperation and Development. The ecological security status was evaluated by calculating eco-security index (ESI) with socio-economic statistical data of Ningwu during 2001 -2010. The results showed that the situation of eco-security had been improved from heavy alarm to relative safety during 2001 -2010. It reflected that the ecological economic system in Ningwu County tended to be relaxed constantly after experienced a sharp conflict between ecological environment and economic growth. The ecological safety awareness was growing, however, by force of the objective requirements of population growth and economic development, the situation of ecological security was still unstable.
基金supported by the National Natural Science Foundation of China(Grants No.51190094,50909073,and 51179130)the Hubei Province Natural Science Foundation(Grant No.2010CDB08401)
文摘The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies.
文摘Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments.
基金Acknowledgments: This work is supported by the State Key Laboratory of Software Engineering and the Natural Science Foundation of Guizhou and the Science Foundation of Guizhou Province(No. 20043029).
基金Supported by Project of National Key Technology R & D (2012BAC16B04)
文摘Ecological security of tourism destination is an important factor for the sustainable development of tourism industry, and many tourism destinations are threatened by various ecological problems. A complete understanding of eco-security situation is the foundation of maintaining sustainable development for tourism destinations. However, study on tourism destination eco-security has remained in the initial stage, based on domestic and international researches, the connotations and dynamic characteristics of tourism destination eco-security were discussed. Then, evaluation method of tourism destination eco-security and standard system were proposed, also dynamic evaluation method of tourism destination eco-safety based on the situation evaluation and trend was analyzed.
文摘Against the background of economic globalization, the economy of many countries has been inevitably affected by the globle financial crisis. But the impact varies. China, as one of the leading countries in globalization, the direct or indirect impact it suffered can be imagined. The Chinese government adopted a series of measures to deal with the financial crisis.
基金supported by the key project of the National Social Science Fund of China(NSSFC):“Study on China-Russia Strategic Partnership for the New Era”(Grant No.20AGJ012).
文摘In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to subdue inflation,despite their already high levels of debt;the bulk commodities market is experiencing volatility,leading to global turbulence and change;trade protectionism is at the forefront of major-power rivalry in political and economic spheres;and regional security crises are compounding international tensions.Behind those flashpoints are contradictions that obstruct world peace and progress,including development imbalances,governance gaps,and structural tensions in global security.In the face of uncertainties,it is crucial for China to seize strategic opportunities and transform crises into favorable situations.China has launched the Global Development Initiative(GDI)and the Global Security Initiative(GSI)to contribute to global prosperity and security.The two initiatives demonstrate China’s commitment to addressing global deficits in peace,development,security,and governance.
文摘With the rapid and continual growth of national economy, the gap between oil demand and supply keeps widening in China, therefore China will increasingly depend on imported oil. However, the world's oil and gas resources are unevenly distributed; global world's oil prices remain high; and over 70 percent of China's imported oil has to be shipped through the Malacca Strait. There are various ways to ensure China's oil security today, and the practical and feasible strategic option is to increase the discovery and production of domestic oil, raise energy efficiency and develop petroleum substitutes. Scientific and technological innovation is crucial both in new oil reserves discovery and production, energy conservation, and in the development of petroleum substitutes, establishment of a strategic oil reserve system and for environment protection. This indicates that China should take effective measures in investment strategy, fiscal policies, financing instruments, intellectual property protection, fostering talents and professionals, so as to establish its own scientific and technological innovation system in the petroleum industry and be better able to ensure oil security.
文摘The question of the impact of war on ecosystems still remains secondary in the internal and external policy of states, society and the agenda of international organizations. From the point of view of losses in monetary terms, the values of ecosystem damages obtained in the work, which are a consequence of the impact of hostilities on the environment, correspond to the annual budgets of the largest countries in the world or exceed them. The presented calculations significantly exceed the known normative methods, the use of which in the conditions of war is limited in space and time. Objective difficulties associated with the uncertainty of many processes of the development of ecological systems and their reaction to the multifactorial impact of war are also significant limitations. Therefore, as part of the study, a method of assessing the impact of war on the environment is proposed, which is based on the patterns of energy flows in ecosystems from the moment it is binding by producers. This made it possible to take into account in the calculations the principle of functional integrity of the ecological system, according to which the destruction or damage of the components of a functionally whole environment will necessarily cause negative phenomena in the development of ecological systems. The results are presented in the form of real values of ecological losses in energy and monetary equivalents, as consequences of the loss of ecosystem services. As the results of the research show, the minimum amount of damage to ecosystems from Russian tanks is 43,500 USD per day. Environmental damage from Russian fighter jets has been estimated at $1.5 billion per week since the start of the war. Noise from military operations causes losses of at least 2.3 billion US dollars per year. The obtained results create prerequisites for improving the system of ensuring environmental safety at the local, state, and international levels and transferring the obtained solutions into safety-shaping practice.