期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
加拿大安大略公共卫生伦理框架及相关启示 被引量:2
1
作者 张海洪 《医学与哲学(A)》 北大核心 2017年第7期18-21,共4页
2012年,加拿大安大略公共卫生机构发表《公共卫生项目伦理实施框架》工作报告,尝试建构一个综合性的公共卫生项目伦理监管框架。报告主张在公共卫生领域打破"研究"与"实践"的传统二分,这一理念的提出,一方面是想满... 2012年,加拿大安大略公共卫生机构发表《公共卫生项目伦理实施框架》工作报告,尝试建构一个综合性的公共卫生项目伦理监管框架。报告主张在公共卫生领域打破"研究"与"实践"的传统二分,这一理念的提出,一方面是想满足公共卫生领域不断发展的伦理监管需求;同时,也是对传统的研究伦理监管模式的改进。在介绍安大略公共卫生伦理框架的基础上进行反思,分析打破研究与实践二分的重要性,强调关注公共卫生项目在数据收集、保存、使用等方面所涉及的伦理问题的共性特征,拓展既有受试者保护概念,实现公共卫生项目全过程的人的保护的理念转变。 展开更多
关键词 大略公共卫生伦理框架 研究与实践二分 人的保护
下载PDF
河南省人民政府办公厅关于印发2010年度省政府推进依法行政工作安排的通知
2
《河南省人民政府公报》 2010年第7期38-40,共3页
豫政办[2010]23号各市、县人民政府,省人民政府各部门:《2010年度省政府推进依法行政工作安排》已经省政府同意,现印发给你们,请结合实际,认真贯彻落实。2010年度省政府推进依法行政工作安排2010年全省推进依法行政工作的总体要求是:坚... 豫政办[2010]23号各市、县人民政府,省人民政府各部门:《2010年度省政府推进依法行政工作安排》已经省政府同意,现印发给你们,请结合实际,认真贯彻落实。2010年度省政府推进依法行政工作安排2010年全省推进依法行政工作的总体要求是:坚持以邓小平理论和"三个代表"重要思想为指导,深入贯彻落实科学发展观,紧紧围绕省委、省政府的中心任务,继续以贯彻实施《国务院关于印发全面推进依法行政实施纲要的通知》 展开更多
关键词 工作 中心任务 管理体制改革 邓小平理论 电子监察系统 领导责任 应急管理机制 多头执法 公共安
下载PDF
龙奥大厦智能化系统设计 被引量:1
3
作者 孙文杰 杨元亮 《智能建筑电气技术》 2011年第1期13-20,共8页
本文结合龙奥大厦工程设计实例,介绍了其智能化各系统的组成,以及各系统的设计内容,以期能为设计人员提供一些有价值的参考资料。
关键词 智能化系统 设计 办公建筑 信息网络系统 公共安 全系统 建筑设备管理系统
下载PDF
Forecasting Public Green Area Per Capita in Xi’an City Based on GM (1, 1)
4
作者 杨小玲 严萍 《Journal of Landscape Research》 2010年第3期81-83,共3页
[Objective] To establish the comprehensive evaluation index system of public green area per capita as a quantitative mean of measuring ecological city and livable city. [Method]The GM (1, 1) forecasting model was set ... [Objective] To establish the comprehensive evaluation index system of public green area per capita as a quantitative mean of measuring ecological city and livable city. [Method]The GM (1, 1) forecasting model was set up according to statistics of public green area per capita in Xi’an City during 1996 and 2005, on this basis, the development trend of green area per capita in Xi’an City until 2015 were analyzed in case of no any changing factors or conditions. [Result]Grey forecasting model was established as, (t = 0, 1, …, n); model parameters as a = - 0.031 71, u = 4.139 17. After residual error test and posterior-variance-test, the precision of this model is proved fairly good. [Conclusions]According to this model, public green area per capita in Xi’an City will achieve 7.66 m2 by 2015, which is still far away from the livable city index (16 m2 per capita) and should be paid more attention by the local government, the construction of urban green areas should be further enhanced, more vegetations should be cultivated so as to improve the urban green coverage ratio. 展开更多
关键词 Grey system modeling Per capita public green space Xi’an City
下载PDF
郑州市人民政府办公厅关于明确省政府工作报告提出的2011年重点工作责任单位的通知
5
《郑州市人民政府公报》 2011年第6期103-109,共7页
郑政办[2011]45号二○一一年六月十六日各县(市、区)人民政府,市人民政府各部门,各有关单位:《河南省人民政府办公厅关于明确政府工作报告提出的2011年重点工作责任单位的通知》(豫政办[2011]14号)对今年全省重点工作责任单位进行了明... 郑政办[2011]45号二○一一年六月十六日各县(市、区)人民政府,市人民政府各部门,各有关单位:《河南省人民政府办公厅关于明确政府工作报告提出的2011年重点工作责任单位的通知》(豫政办[2011]14号)对今年全省重点工作责任单位进行了明确。根据市政府领导指示。 展开更多
关键词 政府工作报告 政府公报 国土资源 重点工程 城市新区 体制改革 交通委 政府执行力 公务接待 公共安
下载PDF
辽宁省人民政府办公厅关于积极推进年检制度改革的通知
6
《辽宁省人民政府公报》 2005年第7期7-9,共3页
各市人民政府,省政府各厅委、各直属机构:近年来,我省的年检工作有了一些改进,在规范市场经济秩序、加强政府部门的监督管理等方面发挥了一定的作用。但是,随着社会主义市场经济体制的逐步完善和政府职能的不断转变,现行的年检制度存在... 各市人民政府,省政府各厅委、各直属机构:近年来,我省的年检工作有了一些改进,在规范市场经济秩序、加强政府部门的监督管理等方面发挥了一定的作用。但是,随着社会主义市场经济体制的逐步完善和政府职能的不断转变,现行的年检制度存在着一些亟待解决的问题,如年检项目较多,程序繁琐;一些年检的实际作用不大,实际监管效果不明显;年检中伴有各种名目、各种形式的收费,增加了被检单位的经济负担:年检项目和年检程序设置随意性较大,没有严格体现依法行政等。为进一步深化行政审批制度改革,加强软环境建设。 展开更多
关键词 制度改革 监管效果 市场经济秩序 市场经济体制 直属机构 程序设置 审批制度 老工业基地 社会公共安
下载PDF
A Greedy Traffic Light and Queue Aware Routing Protocol for Urban VANETs 被引量:2
7
作者 Yangyang Xia Xiaoqi Qin +1 位作者 Baoling Liu Ping Zhang 《China Communications》 SCIE CSCD 2018年第7期77-87,共11页
Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is ... Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is well known that routing is a challenging problem in VANETs due to the fast-changing network typology caused by high mobility at both ends of transmission. Moreover, under urban environment, there are two non-negligible factors in routing protocol design, the non-uniform vehicle distribution caused by traffic lights, and the network congestion due to high traffic demand in rush hours. In this paper, we propose a greedy traffic light and queue aware routing protocol(GTLQR) which jointly considers the street connectivity, channel quality, relative distance, and queuing delay to alleviate the packet loss caused by vehicle clustering at the intersection and balance the traffic load among vehicles. Through performance evaluation, we show that our proposed protocol outperforms both TLRC and GLSR-L in terms of packet delivery ratio and end-to-end delay. 展开更多
关键词 VANETS 5G traffic light queuing delay vehicular communications
下载PDF
Quantum Polynomial-Time Fixed-Point Attack for RSA 被引量:3
8
作者 Yahui Wang Huanguo Zhang Houzhen Wang 《China Communications》 SCIE CSCD 2018年第2期25-32,共8页
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d... Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a wellknown factoring algorithm by finding the prime factors of a number n =pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd( a^(r/2) ±1, n)=p or q. For odd values of r it is assumed that the factors of n cannot be found(since a^(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4φ( r)/π~2 r, exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed. 展开更多
关键词 information security cryptogra-phy RSA fixed-point quantum computing
下载PDF
Combining Micro Technologies and Unmanned Systems to Support Public Safety and Homeland Security 被引量:1
9
作者 Richard E. Baker 《Journal of Civil Engineering and Architecture》 2012年第10期1399-1404,共6页
Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate th... Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate the use of the technology into local or regional public safety and homeland security incidents. The purpose of this presentation is to explain several key factors to consider when using micro technologies and unmanned systems in support of public safety and homeland security officials. Real time information is critical to the decision making process for public safety and homeland security officials to make assessments and quickly resolve crisis situations. Unmanned micro-vehicles and micro technologies are well suited to remotely observe, gather essential information, and immediately relay it to incident responders. These technologies can provide extremely important support during responses to hostage situations, hazardous environments, search and rescue, natural disasters, border patrol and many others. The true benefit is having remote resources providing real time support to incident responders. This paper discusses the use of several different types of micro-vehicle platforms in public safety scenarios and their use of associated technologies such as GPS (Global Positioning System) autopilot, communication, and sensor devices. 展开更多
关键词 Public safety first responders unmanned systems improved incident response
下载PDF
ASIP for Elliptic Curve Cryptography Based on VLIW Architecture 被引量:1
10
作者 YANG Xiaohui DAI Zibin ZHANG Jun ZHANG Yongfu 《China Communications》 SCIE CSCD 2010年第4期161-166,共6页
The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on an... The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on analyzing the basic structure features of Elliptic Curve Cryptography (ECC) algorithms,the parallel schedule algorithm of point addition and doubling is presented.And based on parallel schedule algorithm,the Application Specific Instruction-Set Co-Processor of ECC that adopting VLIW architecture is also proposed in this paper.The coprocessor for ECC is implemented and validated using Altera’s FPGA.The experimental result shows that our proposed coprocessor has advantage in high performance and flexibility. 展开更多
关键词 Elliptic Curve Cryptography Application Specific Instruction-Set Processor VLIW Architecture
下载PDF
Study on Emphases and Trend of Tianjin Urban Public Safety Planning from the View of Bohai Rim Megalopolis
11
作者 Gong Yuan Xiao Yu Lu Li 《Journal of Civil Engineering and Architecture》 2013年第10期1203-1208,共6页
Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planni... Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planning begins to perfect the contents and method. And regional research is an important aspect in the improvement of new era urban public safety planning. This paper chooses Tianjin, the important city in Bohai rim area as the example for research. Tianjin urban public safety planning includes not only comprehensive disaster prevention and reduction, effectively preventing and reducing disasters, ensuring the safety of the life and property of the residents, but also sharing resources and facilities from the view of megalopolis, eliminating hidden area troubles, reducing whole environment risks and so on. 展开更多
关键词 Urban public safety planning TIANJIN Bohai rim megalopolis emphases.
下载PDF
Prospects for the Development and Application of the Earthquake Monitoring Network
12
作者 Jin Xing Li Shanyou +2 位作者 Li Zuning Kang Lanchi Li Jun 《Earthquake Research in China》 2007年第2期121-129,共9页
With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed co... With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed countries and a large quantity of observation data has been accumulated. How to apply these resources to economic construction and public safety has become an important issue worth studying. In order to improve earthquake prediction and earthquake emergency response, it is suggested in this paper that extracting valuable precursor information, improving earthquake rapid reporting ability and extending rapid intensity reporting function are key issues. Integrating network resources, building unified standards and a multifunction seismic monitoring network are preconditions of establishing a public safety service platform and earthquake observation resources will contribute significantly to the fields of engineering, ocean, meteorology, and environmental protection. Thus, the future directions of the development of the seismic network are exploring monitoring resources, enhancing independent innovation, constructing a technological platform and enlarging the service field. 展开更多
关键词 Earthquake monitoring network Monitoring resource Public safety
下载PDF
The Criminal Law of Public Order as a Guardian of Public Interest in Terrorist Acts Scenario
13
作者 Altin Shegani 《Sociology Study》 2013年第3期172-181,共10页
Promotion of a model of the criminal law of public order represents an important point of reflection in criminal law doctrine. Public order, as a juridical good, has many predispositions to be exposed to criminal acti... Promotion of a model of the criminal law of public order represents an important point of reflection in criminal law doctrine. Public order, as a juridical good, has many predispositions to be exposed to criminal activity, and in this point of view, its special protection through criminal law norms constitutes a major concern of criminal legislation objectives. Criminal legislation (as a regulatory and modifying tool within society) is an intelligent social product It is a concrete expression of the important contribution of society in ensuring qualitative and quantitative relations of the model of public order. The latter finds expression as the object of a subjective right, which cannot be divided from the affirmation made by criminal legislation as a primary juridical good. In this context, the model of public order is associated with that of protection of general interest, in the subjective sense of the right to punish (ius puniendO, implemented by state authorities. In their universal meaning, all criminal offences in one way or another affect the normal functioning of public order, but terrorist acts can violate or impinge upon public order more closely and specifically. While affecting the designated model of public order, terrorist crimes put in question the architecture of the rule of law. In response to the mechanisms of terrorist offences, two main criminalization techniques are elaborated: (1) the classical technique of criminalization; and (2] the enumerative technique of criminalization. Criminal sanctions, by which the repression of this criminal vector is carried out, aim at ensuring not only the survival of human society, but also its cardinal values and interests, as well as the technical and scientific progress. 展开更多
关键词 Criminal law public order juridical good individual freedom public interest
下载PDF
Reflection on strengthening basic Construction of basic Education to improve student Management work in Public Security Colleges
14
作者 LI Enfeng 《International English Education Research》 2018年第1期31-33,共3页
Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of pub... Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges. 展开更多
关键词 grassroots basic Construction Public Security College student Management
下载PDF
Private Car Ownersip Jumps 16% in 6 Months
15
《China's Foreign Trade》 2007年第14期33-33,共1页
More than 13 million cars in China were privately owned by the end &June up 16% over the end of last year, according to the Ministry of Public Security.
关键词 Private Car Ownersip the Ministry of Public Security motorcyycles car driver
下载PDF
Authenticated Key Agreement Protocol
16
作者 Massoud Hadian Dehkordi Reza Alimoradi 《China Communications》 SCIE CSCD 2010年第5期1-8,共8页
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall... Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols. 展开更多
关键词 IDENTIFICATION multiple key agreement PAIRING challenge-response strong security
下载PDF
Molecular Biological Detection of Biological Pollution in Water Environment
17
作者 Zhao Xufei 《International English Education Research》 2014年第2期53-56,共4页
Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollutio... Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollution which is stable and infectious is the main part of water pollution. To fastly and accuratly detecte biological contamination of the water environment is extremely important for the control of disease outbreaks and water quality protection and public health security. This paper systematically introduces the research progress in biological water environment pollution detection methods in molecular biology aquatic environment, and explore molecular biology methods in the detection of biological contamination in water environment problems and trends. 展开更多
关键词 Water environment. Biological contamination Molecular biology
下载PDF
A Scheme to Share Information via Employing Discrete Algorithm to Quantum States
18
作者 康国栋 方卯发 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第2期239-243,共5页
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps... We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid. 展开更多
关键词 discrete algorithm under mod public-key cryptography SECURITY
下载PDF
On the Translation of Public Signs A Case Study of the Intemational Horticultural Exposition in Xi'an, China
19
作者 DONG Xi 《Sino-US English Teaching》 2012年第10期1614-1620,共7页
This paper is based on the survey in the US named "Translation Quality of the Public Signs of the Horticultural Exposition in Xi'an, China". The International Horticultural Exposition was held in Xi'an, China, fro... This paper is based on the survey in the US named "Translation Quality of the Public Signs of the Horticultural Exposition in Xi'an, China". The International Horticultural Exposition was held in Xi'an, China, from April to October in 2011. As guidance to the visitors, all the public signs were in both Chinese and English. The importance of the translation quality of public signs in the Expo cannot be over-exaggerated. By analyzing the data collected in the survey, the paper claims that the quality of the public signs in the Expo is not satisfying and Gutt's relevance-theoretical account of translation can well serve as the theoretical foundation of public sign translation. 展开更多
关键词 sign translation relevance theory direct translation indirect translation Chinese poetry
下载PDF
Public Security Risk m Large Scale Activities and the Standardization Prospects
20
作者 Xiong Fei,Ma Na Yan Shaoqing research center or Shanghai Institute of Standardization. senior engineer,director or research center of standardization,Shanghai Institute of Standardization,secretary general of SAC/TC 269/SC 3 on third party logistics service,secretary general of SAC/TC 234/SC 1 on project management maturity assessment, 《China Standardization》 2010年第5期31-38,共8页
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ... This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China. 展开更多
关键词 Large Scale Activities Public Security STANDARDIZATION
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部