期刊文献+
共找到15篇文章
< 1 >
每页显示 20 50 100
基于Delphi法的社区老年人应急准备教育指标体系研究 被引量:7
1
作者 朱青 郑夏静 +3 位作者 谢嘉欣 陈恒 赵丽 谭益冰 《护理学杂志》 CSCD 北大核心 2018年第12期70-73,共4页
目的构建符合我国社区实际的、相对科学有效的社区老年人应急准备教育指标体系。方法通过阅读相关文献整理初步的社区老年人应急准备教育指标体系,并运用Delphi法对21名专家进行2轮函询以确定此体系的各级指标。结果 2轮专家函询的积极... 目的构建符合我国社区实际的、相对科学有效的社区老年人应急准备教育指标体系。方法通过阅读相关文献整理初步的社区老年人应急准备教育指标体系,并运用Delphi法对21名专家进行2轮函询以确定此体系的各级指标。结果 2轮专家函询的积极系数分别为100%和87.5%,权威系数分别是0.89和0.88,各级指标的变异系数为0.07~0.22,协调系数为0.167~0.234。通过2轮专家函询,形成了6个一级指标(日常应急物资储备教育、日常应急措施教育、慢性疾病管理教育、防灾应急心理教育、应急救助技能教育、传染病防护知识教育)、31个二个指标的社区老年人应急准备教育指标体系。结论社区老年人应急准备教育指标体系符合社区特点、切合老年人特性及满足急救要求;专家咨询意见逐渐趋于一致,专家积极性和权威性高,指标体系符合科学性与可操作性原则。 展开更多
关键词 老年人 社区护理 应急准备教育指标体系 DELPHI法 突发公共卫生事件 公共全安 紧急事件
下载PDF
Quantum Polynomial-Time Fixed-Point Attack for RSA 被引量:3
2
作者 Yahui Wang Huanguo Zhang Houzhen Wang 《China Communications》 SCIE CSCD 2018年第2期25-32,共8页
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d... Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a wellknown factoring algorithm by finding the prime factors of a number n =pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd( a^(r/2) ±1, n)=p or q. For odd values of r it is assumed that the factors of n cannot be found(since a^(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4φ( r)/π~2 r, exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed. 展开更多
关键词 information security cryptogra-phy RSA fixed-point quantum computing
下载PDF
A Greedy Traffic Light and Queue Aware Routing Protocol for Urban VANETs 被引量:2
3
作者 Yangyang Xia Xiaoqi Qin +1 位作者 Baoling Liu Ping Zhang 《China Communications》 SCIE CSCD 2018年第7期77-87,共11页
Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is ... Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is well known that routing is a challenging problem in VANETs due to the fast-changing network typology caused by high mobility at both ends of transmission. Moreover, under urban environment, there are two non-negligible factors in routing protocol design, the non-uniform vehicle distribution caused by traffic lights, and the network congestion due to high traffic demand in rush hours. In this paper, we propose a greedy traffic light and queue aware routing protocol(GTLQR) which jointly considers the street connectivity, channel quality, relative distance, and queuing delay to alleviate the packet loss caused by vehicle clustering at the intersection and balance the traffic load among vehicles. Through performance evaluation, we show that our proposed protocol outperforms both TLRC and GLSR-L in terms of packet delivery ratio and end-to-end delay. 展开更多
关键词 VANETS 5G traffic light queuing delay vehicular communications
下载PDF
Combining Micro Technologies and Unmanned Systems to Support Public Safety and Homeland Security 被引量:1
4
作者 Richard E. Baker 《Journal of Civil Engineering and Architecture》 2012年第10期1399-1404,共6页
Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate th... Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate the use of the technology into local or regional public safety and homeland security incidents. The purpose of this presentation is to explain several key factors to consider when using micro technologies and unmanned systems in support of public safety and homeland security officials. Real time information is critical to the decision making process for public safety and homeland security officials to make assessments and quickly resolve crisis situations. Unmanned micro-vehicles and micro technologies are well suited to remotely observe, gather essential information, and immediately relay it to incident responders. These technologies can provide extremely important support during responses to hostage situations, hazardous environments, search and rescue, natural disasters, border patrol and many others. The true benefit is having remote resources providing real time support to incident responders. This paper discusses the use of several different types of micro-vehicle platforms in public safety scenarios and their use of associated technologies such as GPS (Global Positioning System) autopilot, communication, and sensor devices. 展开更多
关键词 Public safety first responders unmanned systems improved incident response
下载PDF
ASIP for Elliptic Curve Cryptography Based on VLIW Architecture 被引量:1
5
作者 YANG Xiaohui DAI Zibin ZHANG Jun ZHANG Yongfu 《China Communications》 SCIE CSCD 2010年第4期161-166,共6页
The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on an... The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on analyzing the basic structure features of Elliptic Curve Cryptography (ECC) algorithms,the parallel schedule algorithm of point addition and doubling is presented.And based on parallel schedule algorithm,the Application Specific Instruction-Set Co-Processor of ECC that adopting VLIW architecture is also proposed in this paper.The coprocessor for ECC is implemented and validated using Altera’s FPGA.The experimental result shows that our proposed coprocessor has advantage in high performance and flexibility. 展开更多
关键词 Elliptic Curve Cryptography Application Specific Instruction-Set Processor VLIW Architecture
下载PDF
Authenticated Key Agreement Protocol
6
作者 Massoud Hadian Dehkordi Reza Alimoradi 《China Communications》 SCIE CSCD 2010年第5期1-8,共8页
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall... Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols. 展开更多
关键词 IDENTIFICATION multiple key agreement PAIRING challenge-response strong security
下载PDF
Prospects for the Development and Application of the Earthquake Monitoring Network
7
作者 Jin Xing Li Shanyou +2 位作者 Li Zuning Kang Lanchi Li Jun 《Earthquake Research in China》 2007年第2期121-129,共9页
With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed co... With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed countries and a large quantity of observation data has been accumulated. How to apply these resources to economic construction and public safety has become an important issue worth studying. In order to improve earthquake prediction and earthquake emergency response, it is suggested in this paper that extracting valuable precursor information, improving earthquake rapid reporting ability and extending rapid intensity reporting function are key issues. Integrating network resources, building unified standards and a multifunction seismic monitoring network are preconditions of establishing a public safety service platform and earthquake observation resources will contribute significantly to the fields of engineering, ocean, meteorology, and environmental protection. Thus, the future directions of the development of the seismic network are exploring monitoring resources, enhancing independent innovation, constructing a technological platform and enlarging the service field. 展开更多
关键词 Earthquake monitoring network Monitoring resource Public safety
下载PDF
Study on Emphases and Trend of Tianjin Urban Public Safety Planning from the View of Bohai Rim Megalopolis
8
作者 Gong Yuan Xiao Yu Lu Li 《Journal of Civil Engineering and Architecture》 2013年第10期1203-1208,共6页
Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planni... Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planning begins to perfect the contents and method. And regional research is an important aspect in the improvement of new era urban public safety planning. This paper chooses Tianjin, the important city in Bohai rim area as the example for research. Tianjin urban public safety planning includes not only comprehensive disaster prevention and reduction, effectively preventing and reducing disasters, ensuring the safety of the life and property of the residents, but also sharing resources and facilities from the view of megalopolis, eliminating hidden area troubles, reducing whole environment risks and so on. 展开更多
关键词 Urban public safety planning TIANJIN Bohai rim megalopolis emphases.
下载PDF
Reflection on strengthening basic Construction of basic Education to improve student Management work in Public Security Colleges
9
作者 LI Enfeng 《International English Education Research》 2018年第1期31-33,共3页
Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of pub... Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges. 展开更多
关键词 grassroots basic Construction Public Security College student Management
下载PDF
Private Car Ownersip Jumps 16% in 6 Months
10
《China's Foreign Trade》 2007年第14期33-33,共1页
More than 13 million cars in China were privately owned by the end &June up 16% over the end of last year, according to the Ministry of Public Security.
关键词 Private Car Ownersip the Ministry of Public Security motorcyycles car driver
下载PDF
A Scheme to Share Information via Employing Discrete Algorithm to Quantum States
11
作者 康国栋 方卯发 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第2期239-243,共5页
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps... We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid. 展开更多
关键词 discrete algorithm under mod public-key cryptography SECURITY
下载PDF
Molecular Biological Detection of Biological Pollution in Water Environment
12
作者 Zhao Xufei 《International English Education Research》 2014年第2期53-56,共4页
Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollutio... Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollution which is stable and infectious is the main part of water pollution. To fastly and accuratly detecte biological contamination of the water environment is extremely important for the control of disease outbreaks and water quality protection and public health security. This paper systematically introduces the research progress in biological water environment pollution detection methods in molecular biology aquatic environment, and explore molecular biology methods in the detection of biological contamination in water environment problems and trends. 展开更多
关键词 Water environment. Biological contamination Molecular biology
下载PDF
Public Security Risk m Large Scale Activities and the Standardization Prospects
13
作者 Xiong Fei,Ma Na Yan Shaoqing research center or Shanghai Institute of Standardization. senior engineer,director or research center of standardization,Shanghai Institute of Standardization,secretary general of SAC/TC 269/SC 3 on third party logistics service,secretary general of SAC/TC 234/SC 1 on project management maturity assessment, 《China Standardization》 2010年第5期31-38,共8页
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ... This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China. 展开更多
关键词 Large Scale Activities Public Security STANDARDIZATION
下载PDF
The Sendai Framework for Disaster Risk Reduction: Renewing the Global Commitment to People’s Resilience, Health,and Well-being 被引量:21
14
作者 Amina Aitsi-Selmi Shinichi Egawa +2 位作者 Hiroyuki Sasaki Chadia Wannous Virginia Murray 《International Journal of Disaster Risk Science》 SCIE CSCD 2015年第2期164-176,共13页
The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) is the first global policy framework of the United Nations’ post-2015 agenda. It represents a step in the direction of global policy coherence with e... The Sendai Framework for Disaster Risk Reduction 2015–2030(SFDRR) is the first global policy framework of the United Nations’ post-2015 agenda. It represents a step in the direction of global policy coherence with explicit reference to health, development, and climate change. To develop SFDRR, the United Nations Office for Disaster Risk Reduction(UNISDR) organized and facilitated several global, regional, national, and intergovernmental negotiations and technical meetings in the period preceding the World Conference on Disaster Risk Reduction(WCDRR) 2015 where SFDRR was adopted. UNISDR also worked with representatives of governments, UN agencies, and scientists to develop targets and indicators for SFDRR and proposed them to member states for negotiation and adoption as measures of progress and achievement in protecting lives and livelihoods. The multiple efforts of the health community in the policy development process, including campaigning for safe schools and hospitals, helped to put people’s mental and physicalhealth, resilience, and well-being higher up the disaster risk reduction(DRR) agenda compared with the Hyogo Framework for Action 2005–2015. This article reviews the historical and contemporary policy development process that led to the SFDRR with particular reference to the development of the health theme. 展开更多
关键词 Disaster risk reduction Global health Health policy Public health Safe hospitals
原文传递
Road safety is no accident——for celebrating World Health Day 2004 被引量:3
15
作者 王正国 《Chinese Journal of Traumatology》 CAS 2004年第2期67-69,共3页
The 7th of April is always appointed to be ”World Health Day” by World Health O rganization (WHO), to celebrate the anniversary of its founding in 1946. World Health Day (WHD) 2004 focuses on road traffic injuries a... The 7th of April is always appointed to be ”World Health Day” by World Health O rganization (WHO), to celebrate the anniversary of its founding in 1946. World Health Day (WHD) 2004 focuses on road traffic injuries and measures to pre vent them, and the slogan for the WHD 2004 is ”Road Safety is No Accident”. 1 W HO calls all people to be concerned with road safety on WHD 2004 and beyond. In fact, almost everybody is related with road traffic, and everybody may be consid ered as a road user. Occurrence of road traffic injury (RTI) It is estimated that in 2002 road crashes killed 1.18 million people and inj ured about 20 to 50 million more. Millions were hospitalized for days, weeks or months. Perhaps 5 million were disabled for life. Every day as many as 140 000 people are injured because of road crashes. More than 3 000 die and about 15 000 are disabled for life. It is predicted that by the year 2020, the an nual number of deaths and disabilities from road traffic injuries will increase by 60% or more, and could take third place in the rank order of disease burden ( DALYs) by the year 2000 as compared with the ninth in 1990. 2 展开更多
关键词 World Health Accidents Traffic Humans World Health Organization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部