Crowd density is an important factor of crowd stability.Previous crowd density estimation methods are highly dependent on the specific video scene.This paper presented a video scene invariant crowd density estimation ...Crowd density is an important factor of crowd stability.Previous crowd density estimation methods are highly dependent on the specific video scene.This paper presented a video scene invariant crowd density estimation method using Geographic Information Systems(GIS) to monitor crowd size for large areas.The proposed method mapped crowd images to GIS.Then we can estimate crowd density for each camera in GIS using an estimation model obtained by one camera.Test results show that one model obtained by one camera in GIS can be adaptively applied to other cameras in outdoor video scenes.A real-time monitoring system for crowd size in large areas based on scene invariant model has been successfully used in 'Jiangsu Qinhuai Lantern Festival,2012'.It can provide early warning information and scientific basis for safety and security decision making.展开更多
L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environme...L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environmental protection were con- cemed greatly. Based on engineering geological environment of L3414 working face and mining factors, the color bore-bole TV inspecting, leakage of drilling fluid monitoring, simulation experiment, numerical computing, in-situ ground stress measurement and subsidence measurement, etal, these programs contribute to the formation of a scientific basis for control water safe mining and normal mining or environmental protection in the condition of existing fully-mechanized mining.展开更多
Water environment security of the Three Gorges Reservoir Area has become a more extensive concern since the impoundment of the reservoir. This paper describes the existing water environmental hazards and defects in cu...Water environment security of the Three Gorges Reservoir Area has become a more extensive concern since the impoundment of the reservoir. This paper describes the existing water environmental hazards and defects in current legal system for water environmental protection in this area, and also discusses their possible causes and potential problems in the future based on first hand materials and other literature. According to the theories of integrated river basin management and environmental equity principle, legal proposals are put forward, which include building an unitary legal system dedicated to the Reservoir Area, setting up a basin authority of the Yangtze River to preside over the resources protection and development, using interests' compensation system to solve interest conflicts among different reaches, and making concrete regulations to direct public participation in water environmental security protection of the Three Gorges Reservoir Area.展开更多
In October 25, 2013, the Standing Committee of the National People's Congress made a decision on revising the "consumer rights protection law" of PRC. The new revised "Chinese Consumer Protection Law" China consu...In October 25, 2013, the Standing Committee of the National People's Congress made a decision on revising the "consumer rights protection law" of PRC. The new revised "Chinese Consumer Protection Law" China consumers will take consumer cooling-off period system as an important consumer right.2 Because it is a new system different from traditional civil law "principle of obeying compacts" , and the theoretical research on the calm period by scholars is still not mature enough. This paper discusses the consumer cooling off period from the theoretical perspective, and its legal origin, and puts forward and demonstrates legal principles and the legal basis the cooling off period system should follow.展开更多
The Belt and Road Initiative is an important decision for the great rejuvenation of the Chinese nation. Maritime security has a significant place in this process. In recent years, there have been frequent violent terr...The Belt and Road Initiative is an important decision for the great rejuvenation of the Chinese nation. Maritime security has a significant place in this process. In recent years, there have been frequent violent terrorist incidents at sea, including piracy, armed hijackings and terrorist attacks, posing a dire threat to both international and Chinese maritime transport interests and seriously challenging the fulfillment of the maritime part of the "Belt and Road Initiative." Five direct measures can be taken to protect ocean shipping from violence at sea. One example is the defensive measures taken against the Somali pirates. The employment of armed guards from professional security companies on board ship is an effective model for guaranteeing maritime security; it not only meets the standards of international law, but is also legally permitted in many developed countries and regions, and is thus strategically significant for overall Chinese maritime security. In the Chinese context, this model carries its own legal risks. We should embrace a new approach to national security law, strengthen legal guarantees and make concerted efforts to provide warship (military aircraft) escorts to jointly build an optimum model of Chinese maritime security in order to ensure the realization of core Chinese maritime interests.展开更多
After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. W...After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. We propose an approach to preserve privacy information flow security in composite service evolution. First, a privacy data item dependency analysis method based on a Petri net model is presented. Then the set of privacy data items collected by each component service is derived through a privacy data item dependency graph, and the security scope of each component service is calculated. Finally, the evolution operations that preserve privacy information flow security are defined. By applying these evolution operations, the re-verification process is avoided and the evolution efficiency is improved. To illustrate the effectiveness of our approach, a case study is presented. The experimental results indicate that our approach has high evolution efficiency and can greatly reduce the cost of evolution compared with re-verifying the entire composite service.展开更多
A new kind of single-polarization photonic crystal fiber(PCF) is proposed.Two kinds of multi-component glasses and the air are selected as working materials.Through using the full vector finite element method(FEM) and...A new kind of single-polarization photonic crystal fiber(PCF) is proposed.Two kinds of multi-component glasses and the air are selected as working materials.Through using the full vector finite element method(FEM) and the perfectly matched layers(PML),the polarization-maintaining characteristic and the confinement loss of the fiber are analyzed,respectively.In addition,the single-polarization region of the fiber around 1.55 ìm is discussed.Numerical simulations show that the fiber maintains single-polarization operation within the wavelength range of 1.421-1.696μm.The birefringence can reach 6.988×10-3,and the confinement loss is as low as 0.012 dB/m when 7 layers of ring holes are arranged in the cladding at λ=1.55μm.展开更多
基金The authors would like to thank the reviewers for their detailed reviews and constructive comments. We are also grateful for Sophie Song's help on the improving English. This work was supported in part by the ‘Fivetwelfh' National Science and Technology Support Program of the Ministry of Science and Technology of China (No. 2012BAH35B02), the National Natural Science Foundation of China (NSFC) (No. 41401107, No. 41201402, and No. 41201417).
文摘Crowd density is an important factor of crowd stability.Previous crowd density estimation methods are highly dependent on the specific video scene.This paper presented a video scene invariant crowd density estimation method using Geographic Information Systems(GIS) to monitor crowd size for large areas.The proposed method mapped crowd images to GIS.Then we can estimate crowd density for each camera in GIS using an estimation model obtained by one camera.Test results show that one model obtained by one camera in GIS can be adaptively applied to other cameras in outdoor video scenes.A real-time monitoring system for crowd size in large areas based on scene invariant model has been successfully used in 'Jiangsu Qinhuai Lantern Festival,2012'.It can provide early warning information and scientific basis for safety and security decision making.
基金Supported by National Science Foundation(10402033) Ministry of Education Key Lab.of West Mining and Hazard Control Key Research Founda-tion(04JS19) and Shaanxi Province Natural Science (2003E213)
文摘L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environmental protection were con- cemed greatly. Based on engineering geological environment of L3414 working face and mining factors, the color bore-bole TV inspecting, leakage of drilling fluid monitoring, simulation experiment, numerical computing, in-situ ground stress measurement and subsidence measurement, etal, these programs contribute to the formation of a scientific basis for control water safe mining and normal mining or environmental protection in the condition of existing fully-mechanized mining.
文摘Water environment security of the Three Gorges Reservoir Area has become a more extensive concern since the impoundment of the reservoir. This paper describes the existing water environmental hazards and defects in current legal system for water environmental protection in this area, and also discusses their possible causes and potential problems in the future based on first hand materials and other literature. According to the theories of integrated river basin management and environmental equity principle, legal proposals are put forward, which include building an unitary legal system dedicated to the Reservoir Area, setting up a basin authority of the Yangtze River to preside over the resources protection and development, using interests' compensation system to solve interest conflicts among different reaches, and making concrete regulations to direct public participation in water environmental security protection of the Three Gorges Reservoir Area.
文摘In October 25, 2013, the Standing Committee of the National People's Congress made a decision on revising the "consumer rights protection law" of PRC. The new revised "Chinese Consumer Protection Law" China consumers will take consumer cooling-off period system as an important consumer right.2 Because it is a new system different from traditional civil law "principle of obeying compacts" , and the theoretical research on the calm period by scholars is still not mature enough. This paper discusses the consumer cooling off period from the theoretical perspective, and its legal origin, and puts forward and demonstrates legal principles and the legal basis the cooling off period system should follow.
文摘The Belt and Road Initiative is an important decision for the great rejuvenation of the Chinese nation. Maritime security has a significant place in this process. In recent years, there have been frequent violent terrorist incidents at sea, including piracy, armed hijackings and terrorist attacks, posing a dire threat to both international and Chinese maritime transport interests and seriously challenging the fulfillment of the maritime part of the "Belt and Road Initiative." Five direct measures can be taken to protect ocean shipping from violence at sea. One example is the defensive measures taken against the Somali pirates. The employment of armed guards from professional security companies on board ship is an effective model for guaranteeing maritime security; it not only meets the standards of international law, but is also legally permitted in many developed countries and regions, and is thus strategically significant for overall Chinese maritime security. In the Chinese context, this model carries its own legal risks. We should embrace a new approach to national security law, strengthen legal guarantees and make concerted efforts to provide warship (military aircraft) escorts to jointly build an optimum model of Chinese maritime security in order to ensure the realization of core Chinese maritime interests.
基金Project supported by the National Natural Science Foundation of China(Nos.61562087 and 61772270)the National High-Tech R&D Program(863)of China(No.2015AA015303)+2 种基金the Natural Science Foundation of Jiangsu Province,China(No.BK20130735)the Universities Natural Science Foundation of Jiangsu Province,China(No.13KJB520011)the Science Foundation of Nanjing Institute of Technology,China(No.YKJ201420)
文摘After a composite service is deployed, user privacy requirements and trust levels of component services are subject to variation. When the changes occur, it is critical to preserve privacy information flow security. We propose an approach to preserve privacy information flow security in composite service evolution. First, a privacy data item dependency analysis method based on a Petri net model is presented. Then the set of privacy data items collected by each component service is derived through a privacy data item dependency graph, and the security scope of each component service is calculated. Finally, the evolution operations that preserve privacy information flow security are defined. By applying these evolution operations, the re-verification process is avoided and the evolution efficiency is improved. To illustrate the effectiveness of our approach, a case study is presented. The experimental results indicate that our approach has high evolution efficiency and can greatly reduce the cost of evolution compared with re-verifying the entire composite service.
基金supported by the Basic Research Foundation of Harbin Engineering Universitythe Special Foundation for Harbin Young Scientists (No. 2008RFQXG031)
文摘A new kind of single-polarization photonic crystal fiber(PCF) is proposed.Two kinds of multi-component glasses and the air are selected as working materials.Through using the full vector finite element method(FEM) and the perfectly matched layers(PML),the polarization-maintaining characteristic and the confinement loss of the fiber are analyzed,respectively.In addition,the single-polarization region of the fiber around 1.55 ìm is discussed.Numerical simulations show that the fiber maintains single-polarization operation within the wavelength range of 1.421-1.696μm.The birefringence can reach 6.988×10-3,and the confinement loss is as low as 0.012 dB/m when 7 layers of ring holes are arranged in the cladding at λ=1.55μm.