[Objective] To establish the comprehensive evaluation index system of public green area per capita as a quantitative mean of measuring ecological city and livable city. [Method]The GM (1, 1) forecasting model was set ...[Objective] To establish the comprehensive evaluation index system of public green area per capita as a quantitative mean of measuring ecological city and livable city. [Method]The GM (1, 1) forecasting model was set up according to statistics of public green area per capita in Xi’an City during 1996 and 2005, on this basis, the development trend of green area per capita in Xi’an City until 2015 were analyzed in case of no any changing factors or conditions. [Result]Grey forecasting model was established as, (t = 0, 1, …, n); model parameters as a = - 0.031 71, u = 4.139 17. After residual error test and posterior-variance-test, the precision of this model is proved fairly good. [Conclusions]According to this model, public green area per capita in Xi’an City will achieve 7.66 m2 by 2015, which is still far away from the livable city index (16 m2 per capita) and should be paid more attention by the local government, the construction of urban green areas should be further enhanced, more vegetations should be cultivated so as to improve the urban green coverage ratio.展开更多
Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is ...Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is well known that routing is a challenging problem in VANETs due to the fast-changing network typology caused by high mobility at both ends of transmission. Moreover, under urban environment, there are two non-negligible factors in routing protocol design, the non-uniform vehicle distribution caused by traffic lights, and the network congestion due to high traffic demand in rush hours. In this paper, we propose a greedy traffic light and queue aware routing protocol(GTLQR) which jointly considers the street connectivity, channel quality, relative distance, and queuing delay to alleviate the packet loss caused by vehicle clustering at the intersection and balance the traffic load among vehicles. Through performance evaluation, we show that our proposed protocol outperforms both TLRC and GLSR-L in terms of packet delivery ratio and end-to-end delay.展开更多
Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits d...Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a wellknown factoring algorithm by finding the prime factors of a number n =pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd( a^(r/2) ±1, n)=p or q. For odd values of r it is assumed that the factors of n cannot be found(since a^(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4φ( r)/π~2 r, exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed.展开更多
Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate th...Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate the use of the technology into local or regional public safety and homeland security incidents. The purpose of this presentation is to explain several key factors to consider when using micro technologies and unmanned systems in support of public safety and homeland security officials. Real time information is critical to the decision making process for public safety and homeland security officials to make assessments and quickly resolve crisis situations. Unmanned micro-vehicles and micro technologies are well suited to remotely observe, gather essential information, and immediately relay it to incident responders. These technologies can provide extremely important support during responses to hostage situations, hazardous environments, search and rescue, natural disasters, border patrol and many others. The true benefit is having remote resources providing real time support to incident responders. This paper discusses the use of several different types of micro-vehicle platforms in public safety scenarios and their use of associated technologies such as GPS (Global Positioning System) autopilot, communication, and sensor devices.展开更多
The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on an...The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on analyzing the basic structure features of Elliptic Curve Cryptography (ECC) algorithms,the parallel schedule algorithm of point addition and doubling is presented.And based on parallel schedule algorithm,the Application Specific Instruction-Set Co-Processor of ECC that adopting VLIW architecture is also proposed in this paper.The coprocessor for ECC is implemented and validated using Altera’s FPGA.The experimental result shows that our proposed coprocessor has advantage in high performance and flexibility.展开更多
Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planni...Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planning begins to perfect the contents and method. And regional research is an important aspect in the improvement of new era urban public safety planning. This paper chooses Tianjin, the important city in Bohai rim area as the example for research. Tianjin urban public safety planning includes not only comprehensive disaster prevention and reduction, effectively preventing and reducing disasters, ensuring the safety of the life and property of the residents, but also sharing resources and facilities from the view of megalopolis, eliminating hidden area troubles, reducing whole environment risks and so on.展开更多
With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed co...With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed countries and a large quantity of observation data has been accumulated. How to apply these resources to economic construction and public safety has become an important issue worth studying. In order to improve earthquake prediction and earthquake emergency response, it is suggested in this paper that extracting valuable precursor information, improving earthquake rapid reporting ability and extending rapid intensity reporting function are key issues. Integrating network resources, building unified standards and a multifunction seismic monitoring network are preconditions of establishing a public safety service platform and earthquake observation resources will contribute significantly to the fields of engineering, ocean, meteorology, and environmental protection. Thus, the future directions of the development of the seismic network are exploring monitoring resources, enhancing independent innovation, constructing a technological platform and enlarging the service field.展开更多
Promotion of a model of the criminal law of public order represents an important point of reflection in criminal law doctrine. Public order, as a juridical good, has many predispositions to be exposed to criminal acti...Promotion of a model of the criminal law of public order represents an important point of reflection in criminal law doctrine. Public order, as a juridical good, has many predispositions to be exposed to criminal activity, and in this point of view, its special protection through criminal law norms constitutes a major concern of criminal legislation objectives. Criminal legislation (as a regulatory and modifying tool within society) is an intelligent social product It is a concrete expression of the important contribution of society in ensuring qualitative and quantitative relations of the model of public order. The latter finds expression as the object of a subjective right, which cannot be divided from the affirmation made by criminal legislation as a primary juridical good. In this context, the model of public order is associated with that of protection of general interest, in the subjective sense of the right to punish (ius puniendO, implemented by state authorities. In their universal meaning, all criminal offences in one way or another affect the normal functioning of public order, but terrorist acts can violate or impinge upon public order more closely and specifically. While affecting the designated model of public order, terrorist crimes put in question the architecture of the rule of law. In response to the mechanisms of terrorist offences, two main criminalization techniques are elaborated: (1) the classical technique of criminalization; and (2] the enumerative technique of criminalization. Criminal sanctions, by which the repression of this criminal vector is carried out, aim at ensuring not only the survival of human society, but also its cardinal values and interests, as well as the technical and scientific progress.展开更多
Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of pub...Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges.展开更多
More than 13 million cars in China were privately owned by the end &June up 16% over the end of last year, according to the Ministry of Public Security.
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall...Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.展开更多
Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollutio...Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollution which is stable and infectious is the main part of water pollution. To fastly and accuratly detecte biological contamination of the water environment is extremely important for the control of disease outbreaks and water quality protection and public health security. This paper systematically introduces the research progress in biological water environment pollution detection methods in molecular biology aquatic environment, and explore molecular biology methods in the detection of biological contamination in water environment problems and trends.展开更多
We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps...We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.展开更多
This paper is based on the survey in the US named "Translation Quality of the Public Signs of the Horticultural Exposition in Xi'an, China". The International Horticultural Exposition was held in Xi'an, China, fro...This paper is based on the survey in the US named "Translation Quality of the Public Signs of the Horticultural Exposition in Xi'an, China". The International Horticultural Exposition was held in Xi'an, China, from April to October in 2011. As guidance to the visitors, all the public signs were in both Chinese and English. The importance of the translation quality of public signs in the Expo cannot be over-exaggerated. By analyzing the data collected in the survey, the paper claims that the quality of the public signs in the Expo is not satisfying and Gutt's relevance-theoretical account of translation can well serve as the theoretical foundation of public sign translation.展开更多
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ...This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.展开更多
文摘[Objective] To establish the comprehensive evaluation index system of public green area per capita as a quantitative mean of measuring ecological city and livable city. [Method]The GM (1, 1) forecasting model was set up according to statistics of public green area per capita in Xi’an City during 1996 and 2005, on this basis, the development trend of green area per capita in Xi’an City until 2015 were analyzed in case of no any changing factors or conditions. [Result]Grey forecasting model was established as, (t = 0, 1, …, n); model parameters as a = - 0.031 71, u = 4.139 17. After residual error test and posterior-variance-test, the precision of this model is proved fairly good. [Conclusions]According to this model, public green area per capita in Xi’an City will achieve 7.66 m2 by 2015, which is still far away from the livable city index (16 m2 per capita) and should be paid more attention by the local government, the construction of urban green areas should be further enhanced, more vegetations should be cultivated so as to improve the urban green coverage ratio.
基金supported by the Beijing University of Posts and Telecommunications project No.500418759the State Key Laboratory of Networking and Switching Technology project No.600118124
文摘Vehicular Ad-hoc Networks(VANETs) require reliable data dissemination for time-sensitive public safety applications. An efficient routing protocol plays a vital role to achieve satisfactory network performance. It is well known that routing is a challenging problem in VANETs due to the fast-changing network typology caused by high mobility at both ends of transmission. Moreover, under urban environment, there are two non-negligible factors in routing protocol design, the non-uniform vehicle distribution caused by traffic lights, and the network congestion due to high traffic demand in rush hours. In this paper, we propose a greedy traffic light and queue aware routing protocol(GTLQR) which jointly considers the street connectivity, channel quality, relative distance, and queuing delay to alleviate the packet loss caused by vehicle clustering at the intersection and balance the traffic load among vehicles. Through performance evaluation, we show that our proposed protocol outperforms both TLRC and GLSR-L in terms of packet delivery ratio and end-to-end delay.
基金partially supported by he State Key Program of National Natural Science of China No. 61332019Major State Basic Research Development Program of China (973 Program) No. 2014CB340601+1 种基金the National Science Foundation of China No. 61202386, 61402339the National Cryptography Development Fund No. MMJJ201701304
文摘Security analysis of public-key cryptosystems is of fundamental significance for both theoretical research and applications in cryptography. In particular, the security of widely used public-key cryptosystems merits deep research to protect against new types of attacks. It is therefore highly meaningful to research cryptanalysis in the quantum computing environment. Shor proposed a wellknown factoring algorithm by finding the prime factors of a number n =pq, which is exponentially faster than the best known classical algorithm. The idea behind Shor's quantum factoring algorithm is a straightforward programming consequence of the following proposition: to factor n, it suffices to find the order r; once such an r is found, one can compute gcd( a^(r/2) ±1, n)=p or q. For odd values of r it is assumed that the factors of n cannot be found(since a^(r/2) is not generally an integer). That is, the order r must be even. This restriction can be removed, however, by working from another angle. Based on the quantum inverse Fourier transform and phase estimation, this paper presents a new polynomial-time quantum algorithm for breaking RSA, without explicitly factoring the modulus n. The probability of success of the new algorithm is greater than 4φ( r)/π~2 r, exceeding that of the existing quantum algorithm forattacking RSA based on factorization. In constrast to the existing quantum algorithm for attacking RSA, the order r of the fixed point C for RSA does not need to be even. It changed the practices that cryptanalysts try to recover the private-key, directly from recovering the plaintext M to start, a ciphertext-only attack attacking RSA is proposed.
文摘Previously, the military establishment has been the primary developer and user of micro technologies associated with unmanned systems. As these technologies become available commercially, a need exists to integrate the use of the technology into local or regional public safety and homeland security incidents. The purpose of this presentation is to explain several key factors to consider when using micro technologies and unmanned systems in support of public safety and homeland security officials. Real time information is critical to the decision making process for public safety and homeland security officials to make assessments and quickly resolve crisis situations. Unmanned micro-vehicles and micro technologies are well suited to remotely observe, gather essential information, and immediately relay it to incident responders. These technologies can provide extremely important support during responses to hostage situations, hazardous environments, search and rescue, natural disasters, border patrol and many others. The true benefit is having remote resources providing real time support to incident responders. This paper discusses the use of several different types of micro-vehicle platforms in public safety scenarios and their use of associated technologies such as GPS (Global Positioning System) autopilot, communication, and sensor devices.
基金supported by the national high technology research and development 863 program of China.(2008AA01Z103)
文摘The requirement of the flexible and effective implementation of the Elliptic Curve Cryptography (ECC) has become more and more exigent since its dominant position in the public-key cryptography application.Based on analyzing the basic structure features of Elliptic Curve Cryptography (ECC) algorithms,the parallel schedule algorithm of point addition and doubling is presented.And based on parallel schedule algorithm,the Application Specific Instruction-Set Co-Processor of ECC that adopting VLIW architecture is also proposed in this paper.The coprocessor for ECC is implemented and validated using Altera’s FPGA.The experimental result shows that our proposed coprocessor has advantage in high performance and flexibility.
文摘Nowadays urban public safety has been an important subject of study in urban planning study. And planners realized that a safe city is very important for sustainable development. Traditional urban public safety planning begins to perfect the contents and method. And regional research is an important aspect in the improvement of new era urban public safety planning. This paper chooses Tianjin, the important city in Bohai rim area as the example for research. Tianjin urban public safety planning includes not only comprehensive disaster prevention and reduction, effectively preventing and reducing disasters, ensuring the safety of the life and property of the residents, but also sharing resources and facilities from the view of megalopolis, eliminating hidden area troubles, reducing whole environment risks and so on.
基金This project was sponsored by the National Natural Science Foundation of China (50378086)
文摘With the rapid development of the economy in China, the seismic network has been changing rapidly, in that the capability of instruments, technological systems and network density are approaching those of developed countries and a large quantity of observation data has been accumulated. How to apply these resources to economic construction and public safety has become an important issue worth studying. In order to improve earthquake prediction and earthquake emergency response, it is suggested in this paper that extracting valuable precursor information, improving earthquake rapid reporting ability and extending rapid intensity reporting function are key issues. Integrating network resources, building unified standards and a multifunction seismic monitoring network are preconditions of establishing a public safety service platform and earthquake observation resources will contribute significantly to the fields of engineering, ocean, meteorology, and environmental protection. Thus, the future directions of the development of the seismic network are exploring monitoring resources, enhancing independent innovation, constructing a technological platform and enlarging the service field.
文摘Promotion of a model of the criminal law of public order represents an important point of reflection in criminal law doctrine. Public order, as a juridical good, has many predispositions to be exposed to criminal activity, and in this point of view, its special protection through criminal law norms constitutes a major concern of criminal legislation objectives. Criminal legislation (as a regulatory and modifying tool within society) is an intelligent social product It is a concrete expression of the important contribution of society in ensuring qualitative and quantitative relations of the model of public order. The latter finds expression as the object of a subjective right, which cannot be divided from the affirmation made by criminal legislation as a primary juridical good. In this context, the model of public order is associated with that of protection of general interest, in the subjective sense of the right to punish (ius puniendO, implemented by state authorities. In their universal meaning, all criminal offences in one way or another affect the normal functioning of public order, but terrorist acts can violate or impinge upon public order more closely and specifically. While affecting the designated model of public order, terrorist crimes put in question the architecture of the rule of law. In response to the mechanisms of terrorist offences, two main criminalization techniques are elaborated: (1) the classical technique of criminalization; and (2] the enumerative technique of criminalization. Criminal sanctions, by which the repression of this criminal vector is carried out, aim at ensuring not only the survival of human society, but also its cardinal values and interests, as well as the technical and scientific progress.
文摘Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges.
文摘More than 13 million cars in China were privately owned by the end &June up 16% over the end of last year, according to the Ministry of Public Security.
文摘Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.
文摘Water is contaminated mainly by chemical, physical and biological pollutants. At present, domestic reports on biological pollution of water environment are much less. Biological pollution in water environment pollution which is stable and infectious is the main part of water pollution. To fastly and accuratly detecte biological contamination of the water environment is extremely important for the control of disease outbreaks and water quality protection and public health security. This paper systematically introduces the research progress in biological water environment pollution detection methods in molecular biology aquatic environment, and explore molecular biology methods in the detection of biological contamination in water environment problems and trends.
基金Supported by National Natural Science Foundation of China under Grant No.10374025the Education Ministry of Hunan Province under Grant No.06A038the Natural Science Foundation of Hunan Province under Grant No.07JJ3013
文摘We propose a protocol for information sharing between two legitimate parties (Bob and Alice) via public-key cryptography. In particular, we specialize the protocol by employing discrete algorithm under mod that maps integers to quantum states via photon rotations. Based on this algorithm, we find that the protocol is secure under various classes of attacks. Specially, owe to the algorithm, the security of the classical privacy contained in the quantum public-key and the corresponding ciphertext is guaranteed. And the protocol is robust against the impersonation attack and the active wiretapping attack by designing particular checking processing, thus the protocol is valid.
文摘This paper is based on the survey in the US named "Translation Quality of the Public Signs of the Horticultural Exposition in Xi'an, China". The International Horticultural Exposition was held in Xi'an, China, from April to October in 2011. As guidance to the visitors, all the public signs were in both Chinese and English. The importance of the translation quality of public signs in the Expo cannot be over-exaggerated. By analyzing the data collected in the survey, the paper claims that the quality of the public signs in the Expo is not satisfying and Gutt's relevance-theoretical account of translation can well serve as the theoretical foundation of public sign translation.
文摘This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.