[Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionna...[Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionnaires, tourism image of Xi'an was explored using the SPSS software from both the qualitative and quantitative analyses. [Result] Xi'an tourism images serve a heritage historical monuments atmosphere with the Terracotta Warriors, City Wall, Big Wild Goose Pagoda,Huaqing Hot Springs, presenting a positive feeling among tourists in general. In the dissemination of travel, tourism infrastructure construction, tourism transportation,travel services have negative effects on the image of Xi'an tourism. [Conclusion]The evaluation on the tourism resources is highly spoken of by tourists than the scenic spot, indicating that despite high visibility of tourism resources in Xi'an, it has not formed strong core competitiveness and a complete tourism industrial chain. It is necessary to take the right marketing strategies to enhance tourist familiarity to Xi'an. Tourists demands, therefore, should be well considered in developing Xi'an scenic spots and new tourism products and projects be focused on to improve tourists' satisfaction.展开更多
The pressurized water reactor CAP1400 is one of the sixteen National Science and Technology Major Projects. Developed from China's nuclear R&D system and manufacturing capability, as well as APIO00 technology introd...The pressurized water reactor CAP1400 is one of the sixteen National Science and Technology Major Projects. Developed from China's nuclear R&D system and manufacturing capability, as well as APIO00 technology introduction and assimilation, CAP1400 is an advanced large passive nuclear power plant with independent intellectual property rights. By discussing the top design principle, main performance objectives, general parameters, safety design, and important improvements in safety, economy, and oth- er advanced features, this paper reveals the technology innovation and competitiveness of CAP1400 as an internationally promising Gen-IIl PWR model. Moreover, the R&D of CAP1400 has greatly promoted China's domestic nuclear power industry from the Gen-II to the Gen-III level.展开更多
This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of ca...This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of calculation for human error probability during anticipated transient without scram (ATWS) based on the data drew from the recent experiment is offered.展开更多
The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,deve...The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,developing secure steganography is formulated as solving a constrained IP(Integer Programming) problem,which takes the relative entropy of cover and stego distributions as the objective function.Furthermore,a novel method is introduced based on BPSO(Binary Particle Swarm Optimization) for achieving the optimal solution of this programming problem.Experimental results show that the proposed method can achieve excellent performance on preserving neighboring co-occurrence features for JPEG steganography.展开更多
We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she ...We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed.展开更多
In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single...In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation.展开更多
Patient safety is an important component of risk management in hospitals. The aim of the study is to measure physician and nurse awareness about four selected patient safety indicators by authors and events reported a...Patient safety is an important component of risk management in hospitals. The aim of the study is to measure physician and nurse awareness about four selected patient safety indicators by authors and events reported about these relevant indicators in the hospital. The study uses standardized four patientsafety indicators like "needle sticks, cut wounds, dressing allergy, infections indicators". Cross section study was conducted through three month period in 2011-2012 based on voluntary response to the questionnaire that intend to measure knowledge about four health indicators. Studypopulations consisted of accessible sample of 146 different specialty physicians and 108 nurses present on duty during survey period. The association between the patient safety indicators and events reported about indicators in questionswere analyzed. Meanpatient safety knowledge questionnaire scores of health staff (nurse and physician) for needle sticks, cut wounds, dressing allergy, infections indicators were 47.13(11.8), 39.04(14.5), 38.02(10.5), 39.72(9.7), respectively. Significant statistical differences were also found between the frequency of events reported according to department and patient safety indicators (F = 8.34; p 〈 0.05) Measuring patient safety culture via safety indicators is essential in improving patient safety. This matter is perfectly influence the financial management of the hospital.展开更多
The recent succession of food crisis and the rise of food scare have endangered the relationship of trust between the consumers and the primary food production parties: raisers, growers, industrial partners, distribu...The recent succession of food crisis and the rise of food scare have endangered the relationship of trust between the consumers and the primary food production parties: raisers, growers, industrial partners, distributors, public institutions, as well as the secondary food production parties: consumer groups and medias. Facing a potentially risky product, the consumer in his collect of risk diminishing information, should be able to trust something or someone. But in order to trust a risk diminishing element, he must first trust its emitter. In order to enhance consumer perception towards Lebanese food safety, we began a survey on a sample of a population randomly selected. The study found significant difference among education levels concerning attitude towards food safety and knowledge. No significant effect of demographic profile and sex on food handling practices was found. These findings increase concerns about consumer safety knowledge and practices. It is advised that a national survey should be conducted, followed by a properly designed food safety public health campaign, to enhance household food safety awareness.展开更多
The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is div...The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is divided into several logical subnets by community discovery algorithm.The logical subnets and connections between them constitute the logical network.Then,based on the original and logical networks,the selection of attack path is optimized according to the monotonic principle of attack behavior.The proposed method can sharply reduce the attack path scale and hence tackle the state explosion problem in NSSA.The experiments results show that the generation of attack paths by this method consumes 0.029 s while the counterparts by other methods are more than 56 s.Meanwhile,this method can give the same security strategy with other methods.展开更多
The purpose of this study was to analyze the relationship between psychosocial working conditions and perceived safety climate onboard the Swedish merchant fleet. Data was collected by a cross-sectional survey. The sa...The purpose of this study was to analyze the relationship between psychosocial working conditions and perceived safety climate onboard the Swedish merchant fleet. Data was collected by a cross-sectional survey. The sample consisted of 640 Swedish employed engine room officers. A strong relationship was found between the psychosocial working conditions and perceived safety climate onboard (RZ = .204; P 〈 .001). While role conflict and role ambiguity showed a negative association, social support associated positively with safety climate onboard, lob demands and control showed no relation to safety climate. The conclusion is that the safety climate onboard is strongly associated with social and relational factors.展开更多
In this paper,we propose a securityoriented transmission scheme with the help of multiple relays in Cognitive Radio(CR).To maximise the Secrecy Capacity(SC)of the source-destination link in CR,both beamforming and coo...In this paper,we propose a securityoriented transmission scheme with the help of multiple relays in Cognitive Radio(CR).To maximise the Secrecy Capacity(SC)of the source-destination link in CR,both beamforming and cooperative jamming technologies are used to improve the performance of the Secondary User(SU)and protect the Primary User(PU).The effectiveness of the proposed scheme is demonstrated using extensive simulation.Both theoretical analyses and simulation results reveal that the proposed scheme contributes to the secure transmission of the SU with acceptable attenuation of the Signal-to-Noise Ratio(SNR)at the PU receiver,and the upper bound of the SC at the SU receiver is able to exploit the power allocation strategy.展开更多
Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are ...Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms.展开更多
With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security ri...With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures.展开更多
基金Supported by National Social and Science Foundation of China(13XSH017)Humanities and Social Sciences Research Foundation of the Ministry of Education(10YJAZH041)Social Science Foundation of Shaanxi(12D271)~~
文摘[Objective] The aim was to explore the tourist destination image measurement method, and have an empirical study on Xi'an City. [Method] With combination of non-structural and structured approach to design questionnaires, tourism image of Xi'an was explored using the SPSS software from both the qualitative and quantitative analyses. [Result] Xi'an tourism images serve a heritage historical monuments atmosphere with the Terracotta Warriors, City Wall, Big Wild Goose Pagoda,Huaqing Hot Springs, presenting a positive feeling among tourists in general. In the dissemination of travel, tourism infrastructure construction, tourism transportation,travel services have negative effects on the image of Xi'an tourism. [Conclusion]The evaluation on the tourism resources is highly spoken of by tourists than the scenic spot, indicating that despite high visibility of tourism resources in Xi'an, it has not formed strong core competitiveness and a complete tourism industrial chain. It is necessary to take the right marketing strategies to enhance tourist familiarity to Xi'an. Tourists demands, therefore, should be well considered in developing Xi'an scenic spots and new tourism products and projects be focused on to improve tourists' satisfaction.
文摘The pressurized water reactor CAP1400 is one of the sixteen National Science and Technology Major Projects. Developed from China's nuclear R&D system and manufacturing capability, as well as APIO00 technology introduction and assimilation, CAP1400 is an advanced large passive nuclear power plant with independent intellectual property rights. By discussing the top design principle, main performance objectives, general parameters, safety design, and important improvements in safety, economy, and oth- er advanced features, this paper reveals the technology innovation and competitiveness of CAP1400 as an internationally promising Gen-IIl PWR model. Moreover, the R&D of CAP1400 has greatly promoted China's domestic nuclear power industry from the Gen-II to the Gen-III level.
文摘This paper discusses some issues on human reliability model of time dependent human behavior. Some results of the crew reliability experiment on Tsinghua training simulator in China are given, Meanwhile, a case of calculation for human error probability during anticipated transient without scram (ATWS) based on the data drew from the recent experiment is offered.
基金Supported by the National Natural Science Foundation of China (No.60572111)
文摘The objective of steganography is to hide message securely in cover objects for secret communication.How to design a secure steganographic algorithm is still major challenge in this re-search field.In this letter,developing secure steganography is formulated as solving a constrained IP(Integer Programming) problem,which takes the relative entropy of cover and stego distributions as the objective function.Furthermore,a novel method is introduced based on BPSO(Binary Particle Swarm Optimization) for achieving the optimal solution of this programming problem.Experimental results show that the proposed method can achieve excellent performance on preserving neighboring co-occurrence features for JPEG steganography.
基金The project supported by the National Natural Science Foundation of China under Grant No. 10671054 and the Natural Science Foundation of Hebei Province under Grant Nos. A2004000141 and A2005000140
文摘We suggest a method for transferring an unknown quantum state. In this method the sender Alice first applies a controlled-not operation on the particle in the unknown quantum state and an ancillary particle which she wants to send to the receiver Bob. Then she sends the ancillary particle to Bob. When Alice is informed by Bob that the ancillary particle is received, she performs a local measurement on her particle and sends Bob the outcome of the local measurement via a classical channel. Depending on the outcome Bob can restore the unknown quantum state, which Alice destroyed, on the ancillary particle successfully. As an application of this method we propose a quantum secure direct communication protocol. By introducing the decoy qubits the security of the scheme is guaranteed.
基金supported in part by the National Key Research and Development Program of China under Grant 2016QY01W0204in part by Key Industrial Innovation Chain in Industrial Domain under Grant 2016KTZDGY-02in part by National High-Level TalentsSpecial Support Program of China under Grant CS31117200001
文摘In cognitive radio networks(CRNs), through recruiting secondary user(SU) as friendly jammer, the secrecy rate obtained by primary user(PU) can be improved. Previous work only considered a simple scenario with a single PU in their frameworks. In this paper, we will consider a more complicated scenario with multiple PUs and try to investigate the cooperative jamming between multiple PUs and a single SU. When there are multiple PUs in CRN, in order to obtain more spectrum for data transmission, SU will cooperate with multiple PUs at the same time. Considering that both PU and SU are rational and selfish individuals, the interaction between PUs and SU is formulated as a multi-leaders and single-follower Stackelberg game, wherein PU is the leader and SU is the follower. And the Stackelberg Equilibrium(SE) is considered as the final decisions accepted by all PUs and SU. Furthermore, we also prove that when a specific condition is satisfied, the existence of SE can be guaranteed. And a Gauss-Jacobi iterative algorithm is proposed to compute a SE. Finally, simulation results are given to verify the performance and demonstrate that both of the PUs' secrecy rate and the SU's transmission rate can be improved through cooperation.
文摘Patient safety is an important component of risk management in hospitals. The aim of the study is to measure physician and nurse awareness about four selected patient safety indicators by authors and events reported about these relevant indicators in the hospital. The study uses standardized four patientsafety indicators like "needle sticks, cut wounds, dressing allergy, infections indicators". Cross section study was conducted through three month period in 2011-2012 based on voluntary response to the questionnaire that intend to measure knowledge about four health indicators. Studypopulations consisted of accessible sample of 146 different specialty physicians and 108 nurses present on duty during survey period. The association between the patient safety indicators and events reported about indicators in questionswere analyzed. Meanpatient safety knowledge questionnaire scores of health staff (nurse and physician) for needle sticks, cut wounds, dressing allergy, infections indicators were 47.13(11.8), 39.04(14.5), 38.02(10.5), 39.72(9.7), respectively. Significant statistical differences were also found between the frequency of events reported according to department and patient safety indicators (F = 8.34; p 〈 0.05) Measuring patient safety culture via safety indicators is essential in improving patient safety. This matter is perfectly influence the financial management of the hospital.
文摘The recent succession of food crisis and the rise of food scare have endangered the relationship of trust between the consumers and the primary food production parties: raisers, growers, industrial partners, distributors, public institutions, as well as the secondary food production parties: consumer groups and medias. Facing a potentially risky product, the consumer in his collect of risk diminishing information, should be able to trust something or someone. But in order to trust a risk diminishing element, he must first trust its emitter. In order to enhance consumer perception towards Lebanese food safety, we began a survey on a sample of a population randomly selected. The study found significant difference among education levels concerning attitude towards food safety and knowledge. No significant effect of demographic profile and sex on food handling practices was found. These findings increase concerns about consumer safety knowledge and practices. It is advised that a national survey should be conducted, followed by a properly designed food safety public health campaign, to enhance household food safety awareness.
基金National Natural Science Foundation of China(No.61772478)
文摘The real-time of network security situation awareness(NSSA)is always affected by the state explosion problem.To solve this problem,a new NSSA method based on layered attack graph(LAG)is proposed.Firstly,network is divided into several logical subnets by community discovery algorithm.The logical subnets and connections between them constitute the logical network.Then,based on the original and logical networks,the selection of attack path is optimized according to the monotonic principle of attack behavior.The proposed method can sharply reduce the attack path scale and hence tackle the state explosion problem in NSSA.The experiments results show that the generation of attack paths by this method consumes 0.029 s while the counterparts by other methods are more than 56 s.Meanwhile,this method can give the same security strategy with other methods.
文摘The purpose of this study was to analyze the relationship between psychosocial working conditions and perceived safety climate onboard the Swedish merchant fleet. Data was collected by a cross-sectional survey. The sample consisted of 640 Swedish employed engine room officers. A strong relationship was found between the psychosocial working conditions and perceived safety climate onboard (RZ = .204; P 〈 .001). While role conflict and role ambiguity showed a negative association, social support associated positively with safety climate onboard, lob demands and control showed no relation to safety climate. The conclusion is that the safety climate onboard is strongly associated with social and relational factors.
基金supported by the National Natural Science Foundation of China under Grants No. 61201150, No. 61171097the Fundamental Research Funds for the Central Universities of BUPT under Grant No. 2013RC0202the State Major Science and Technology Special Projects under Grant No. 2012ZX03004001
文摘In this paper,we propose a securityoriented transmission scheme with the help of multiple relays in Cognitive Radio(CR).To maximise the Secrecy Capacity(SC)of the source-destination link in CR,both beamforming and cooperative jamming technologies are used to improve the performance of the Secondary User(SU)and protect the Primary User(PU).The effectiveness of the proposed scheme is demonstrated using extensive simulation.Both theoretical analyses and simulation results reveal that the proposed scheme contributes to the secure transmission of the SU with acceptable attenuation of the Signal-to-Noise Ratio(SNR)at the PU receiver,and the upper bound of the SC at the SU receiver is able to exploit the power allocation strategy.
基金supported by the National Nature Science Foundation of China(Grant61572188)A Project Supported by Scientif ic Research Fund of Hunan Provincial Education Department(14A047)+4 种基金the Natural Science Foundation of Fujian Province(Grant no.2014J05079)the Young and Middle-Aged Teachers Education Scientific Research Project of Fujian province(Grant nos.JA13248JA14254 and JA15368)the special scientific research funding for colleges and universities from Fujian Provincial Education Department(Grant no.JK2013043)the Research Project supported by Xiamen University of Technology(YKJ15019R)
文摘Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information.However,other performance requirements such as life cycle of nodes,stability and security are not set as primary design objectives.This makes data collection ability of vehicular nodes in real application environment inferior.By considering the features of nodes in wireless IoV,such as large scales of deployment,volatility and low time delay,an efficient data collection algorithm is proposed for mobile vehicle network environment.An adaptive sensing model is designed to establish vehicular data collection protocol.The protocol adopts group management in model communication.The vehicular sensing node in group can adjust network sensing chain according to sensing distance threshold with surrounding nodes.It will dynamically choose a combination of network sensing chains on basis of remaining energy and location characteristics of surrounding nodes.In addition,secure data collection between sensing nodes is undertaken as well.The simulation and experiments show that the vehicular node can realize secure and real-time data collection.Moreover,the proposed algorithm is superior in vehicular network life cycle,power consumption and reliability of data collection by comparing to other algorithms.
文摘With the development and popularization of network technology, such as attacks from the network is also facing serious challenges, showing a "one foot in mind that" the situation. How can detect possible security risks and the type of attack, and provide preventive strategy is to network managers have been pursuing the goal of network security situational awareness can speak a variety of services and associated data as a highly organic whole, summarized network security and dependency relationships come more comprehensive, complete, accurate decision-making for network security assessment and countermeasures.