The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, e...The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities.展开更多
Blockchain has recently sparked interest in both the technological and businessfirms.The Internet of Things's(IoT)core principle emerged due to the connectivity of several new technologies,including wireless techno...Blockchain has recently sparked interest in both the technological and businessfirms.The Internet of Things's(IoT)core principle emerged due to the connectivity of several new technologies,including wireless technology,the Inter-net,embedded automation systems,and micro-electromechanical devices.Manu-facturing environments and operations have been successfully converted by implementing recent advanced technology like Cloud Computing(CC),Cyber-Physical System(CSP),Information and Communication Technologies(ICT)and Enterprise Model,and other technological innovations into the fourth indus-trial revolution referred to as Industry 4.0.Data management is defined as the pro-cess of accumulation in order to make better business decisions,and process,secure and store information about a company.In the incipient model,there are interconnected contrivances and Machine-to-Machine(M2M)interactions,and transaction data are stored on the Blockchain.Security is a challenging aspect that must be punctiliously considered during the design and development phases of a CSP.In this research article,we proposed a Secure and Distributed Framework for Resource Management(SDFRM)in Industry 4.0 environments within a distribu-ted and collaborative Industry 4.0 system,the dynamic and trust-based Distributed Management Framework(DMF)of shared resource access.Such issues are focused by taking into account of the traditional characteristics of IoT/Industrial Internet of Things’(IIoT)-predicated environments,an SDFRM in Industry 4.0 environments within a distributed and collaborative Industry 4.0 system.Also,to ensure strong privacy over the procedures associated with Access Control(AC),a privacy-preserving method is proposed and integrated into the DMF.The proposed DMF,based on blockchain technology and peer-to-peer networks,allows dynamic access management and system governance without using third parties who could be attacked.We worked hard to design and implement the pro-posal to demonstrate its viability and evaluate its performance.Our proposal out-performs the Multichain Blockchain in terms of successful storage transactions with an achieved average throughput of 98.15%.展开更多
In order to improve the security of high school campus networks,this paper introduces the goal,system composition,and function of the network security of high school campus networks,and puts forward a series of strate...In order to improve the security of high school campus networks,this paper introduces the goal,system composition,and function of the network security of high school campus networks,and puts forward a series of strategies,including the establishment of network security protection system,data backup and recovery mechanism,and strengthening network security management and training.Through these strategies,the safety and stable operation of the campus network can be ensured,the quality of education can be improved,and school’s development can be promoted.展开更多
Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private s...Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively.展开更多
To solve the contradiction between supply and demand of land, the con- struction of land resource security guarantee system is an important part to coordi- nate the economic development and cultivated land protection ...To solve the contradiction between supply and demand of land, the con- struction of land resource security guarantee system is an important part to coordi- nate the economic development and cultivated land protection in the core grain pro- duction region. Based on the deep analysis on the land resources characteristics and problems using the combined method of literature review method with qualita- tive and quantitative analysis, we constructed the land resource security system for different categories according to the land use principles of optimization, intensivism, improvement, and overall planning, and proposed the corresponding supporting mea- sures. The results showed that controlling the new increase, promoting the reclama- tion and improvement of land are the basis for land resource security, clearing the idle, improving the utilization rate of stock are the core of the efficient use of land resources, and establishing a unified urban and rural construction land market is the key to promoting the economical and intensive utilization of land resources, provid- ing scientific basis for the sustainable utilization of land resources in the core grain production regions.展开更多
With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management cond...With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction.展开更多
The objective of this paper is to examine an effective strategy for maintaining and utilizing the traditional arts resources of Japan. The authors explore two pillars of the strategy. One is to improve the quality of ...The objective of this paper is to examine an effective strategy for maintaining and utilizing the traditional arts resources of Japan. The authors explore two pillars of the strategy. One is to improve the quality of Japanese traditional performing arts by securing incomes for artists. The other is to utilize the traditional arts as a medium to expand Japanese cultural influence in foreign countries and to improve Japan's branding as a nation. First, the authors focus on the income security system practiced in traditional Japanese music and describe the discrepancy between short- and long-run optimality. The authors prove that the reputation of this art form affects its popularity and that it is optimal for the Iemoto (the head of the music school) to restrict the number of pupils in onstage performances in order to maintain stage quality. Second, the authors provide evidence that effective methods for a country to expand its cultural influence across the world differ among nations. The authors conduct willingness-to-pay (WTP) experiments and find that while German audiences largely prefer traditional Japanese music, those in the USA are slightly partial to its mixed fusion form. Therefore, the effective ways to expand Japanese cultural influence in foreign countries differ from one country to another.展开更多
In order to cultivate the top-notch innovative talents with the intemational perspectives, on the basis of the principles of objective, utility, humanities and practice, medical institutions should update the concept ...In order to cultivate the top-notch innovative talents with the intemational perspectives, on the basis of the principles of objective, utility, humanities and practice, medical institutions should update the concept of talent cultivation led by employment, innovate teaching mode by deepening teaching reform, optimize the teaching staff by strengthening cooperation between college and enterprise, widen the practical teaching by participating interaction with pharmaceutical industries, and improve the teaching supervision system by implementing quality requirements to construct quality security system in the cultivation of top-notch innovative medical talents.展开更多
The third plenary session of the 18 through "the central committee of the communist party of China on deepening reform of certain major issue decision" is put forward for the first time, to establish a fair and sust...The third plenary session of the 18 through "the central committee of the communist party of China on deepening reform of certain major issue decision" is put forward for the first time, to establish a fair and sustainable social security system. This article mainly about fairness in social security and the sustainable problem preliminary exploration, proposed "sustainable" attaches great importance to the "fair" and ", deepen the reform of the social security system.展开更多
The first 20 years of this century is the period of strategic opportunities of building a weU-offsociety in an all-round way, at the same time, China's social development is also facing a lot of systemic risk. Econom...The first 20 years of this century is the period of strategic opportunities of building a weU-offsociety in an all-round way, at the same time, China's social development is also facing a lot of systemic risk. Economic change and social transformation puts forward new requirements for the social security system reform. This paper studies the theoretical basis of the social security system reform, analyzes the status quo of China's social security system and the existing problems and experience in social security system of other countries for reference, on the basis of perfecting China's pension, medical, unemployment and other social security system, the construction is suitable for the situation of our country's social security system with Chinese characteristics, ensuring and improving people's livelihood, the achievements of reform and opening to the public to achieve genuine sharing is of great significance.展开更多
With the acceleration of urbanization, the lifestyles and living expenses of farmers and urban residents is increasingly more and more similar .However, from the measures in terms of the minimum living guarantee, the ...With the acceleration of urbanization, the lifestyles and living expenses of farmers and urban residents is increasingly more and more similar .However, from the measures in terms of the minimum living guarantee, the level of protection of rural and urban residents really have a large gap. The Third Plenary Session of the 18th Central Committee noted "to promote urban and rural minimum living security system and rural development", "to speed up and improve the social security management system and operate the service system",These tell us that only to realize the integration of urban and rural subsistence allowances, improve the underpinning of the social security system, can we build a moderately prosperous society.展开更多
The establishment and improvement of the social system is an important indicator of a nation political cultures and social development, and is the basic guarantee of social harmony. In recent years, our urban social s...The establishment and improvement of the social system is an important indicator of a nation political cultures and social development, and is the basic guarantee of social harmony. In recent years, our urban social security system is maturing, but rural social security system is almost a blank, affecting the economic and political development, and the progress of the farmers, and restricting the process of service government construction.Service government is a new model of government, which orients the purpose of fundamental interests for the whole people. The rural and the farmers are the focus of our country, and the improvement of rural social security system is the key point for solving the problems. Therefore, it is really important to deal with the relationship between the improvement of rural social security system and the service government construction.In my essay, based on the analysis of the theory of rural social security system and the service government, I will put forward the ideas of the improvement of rural social security system and the service government construction.展开更多
The rural minimum living security system has the function ofguaranteeing the basic right of life, maintaining social stability and promoting social fairness. In the course of practice, the minimum living guarantee sys...The rural minimum living security system has the function ofguaranteeing the basic right of life, maintaining social stability and promoting social fairness. In the course of practice, the minimum living guarantee system has also created the problem that hinders its normal function, This paper, based on the rural subsistence allowances policy itself, the implementation of the main body, the object, the system of social environment and other aspects of the operation of rural subsistence allowances in recent years, the problems and causes of the study carried out, and on this basis, Rural low subsistence allowances research and development direction of the future, with a view to the rural minimum living system of further theoretical research, the specific practice to provide reference.展开更多
China,already possessing a large number of retirees,will become one of the countries with a predominant-ly aged population by the end of the century.A retirement boom is ex-pected for the year 2030,when China will hav...China,already possessing a large number of retirees,will become one of the countries with a predominant-ly aged population by the end of the century.A retirement boom is ex-pected for the year 2030,when China will have over 100 million senior citizens living on an annual pension of billions of yuan.There-fore China is working to legislate a Chinese style social insurance system by the year 2000.This system will be independent of enterprises and cov-er workers in both rural and urban areas.It will be reasonable in its.expenditures because its funding will come from a wide range of sources.It will make a balanced and rational use of these funds and will be run by a highly socialized and coordinated administration.展开更多
In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two...In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers.展开更多
The construction of eco-security system was a complicated systematic project, included the comprehensive construction and collaborative propulsion of eco-environment system, eco-economy system, eco-culture system, eco...The construction of eco-security system was a complicated systematic project, included the comprehensive construction and collaborative propulsion of eco-environment system, eco-economy system, eco-culture system, eco-society system and eco-law system. The comprehensive, coordinated and sustainable development of ecology, economy and society only could be achieved under the guidance of ecological civilization concept by the integrated consideration, comprehensive planning and multi-coordination.展开更多
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro...In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.展开更多
The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructu...The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.展开更多
This paper uses SWOT analysis, feasibility analysis of integration of urban and rural residents in China, including the overall analysis of the urban and rural integration China internal conditions, mainly for its ove...This paper uses SWOT analysis, feasibility analysis of integration of urban and rural residents in China, including the overall analysis of the urban and rural integration China internal conditions, mainly for its overall advantages and disadvantages are analyzed; and the external environment, the system is mainly to raise the opportunities and threats were analyzed; in these. The external conditions are analyzed based on the construction of SWOT strategic matrix, found the advantages and disadvantages of the reform process of the integration of urban and rural subsistence allowances system in coexist, opportunities outweigh the challenges, so China's overall urban and rural integration construction is feasible.展开更多
文摘The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities.
文摘Blockchain has recently sparked interest in both the technological and businessfirms.The Internet of Things's(IoT)core principle emerged due to the connectivity of several new technologies,including wireless technology,the Inter-net,embedded automation systems,and micro-electromechanical devices.Manu-facturing environments and operations have been successfully converted by implementing recent advanced technology like Cloud Computing(CC),Cyber-Physical System(CSP),Information and Communication Technologies(ICT)and Enterprise Model,and other technological innovations into the fourth indus-trial revolution referred to as Industry 4.0.Data management is defined as the pro-cess of accumulation in order to make better business decisions,and process,secure and store information about a company.In the incipient model,there are interconnected contrivances and Machine-to-Machine(M2M)interactions,and transaction data are stored on the Blockchain.Security is a challenging aspect that must be punctiliously considered during the design and development phases of a CSP.In this research article,we proposed a Secure and Distributed Framework for Resource Management(SDFRM)in Industry 4.0 environments within a distribu-ted and collaborative Industry 4.0 system,the dynamic and trust-based Distributed Management Framework(DMF)of shared resource access.Such issues are focused by taking into account of the traditional characteristics of IoT/Industrial Internet of Things’(IIoT)-predicated environments,an SDFRM in Industry 4.0 environments within a distributed and collaborative Industry 4.0 system.Also,to ensure strong privacy over the procedures associated with Access Control(AC),a privacy-preserving method is proposed and integrated into the DMF.The proposed DMF,based on blockchain technology and peer-to-peer networks,allows dynamic access management and system governance without using third parties who could be attacked.We worked hard to design and implement the pro-posal to demonstrate its viability and evaluate its performance.Our proposal out-performs the Multichain Blockchain in terms of successful storage transactions with an achieved average throughput of 98.15%.
文摘In order to improve the security of high school campus networks,this paper introduces the goal,system composition,and function of the network security of high school campus networks,and puts forward a series of strategies,including the establishment of network security protection system,data backup and recovery mechanism,and strengthening network security management and training.Through these strategies,the safety and stable operation of the campus network can be ensured,the quality of education can be improved,and school’s development can be promoted.
文摘Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively.
文摘To solve the contradiction between supply and demand of land, the con- struction of land resource security guarantee system is an important part to coordi- nate the economic development and cultivated land protection in the core grain pro- duction region. Based on the deep analysis on the land resources characteristics and problems using the combined method of literature review method with qualita- tive and quantitative analysis, we constructed the land resource security system for different categories according to the land use principles of optimization, intensivism, improvement, and overall planning, and proposed the corresponding supporting mea- sures. The results showed that controlling the new increase, promoting the reclama- tion and improvement of land are the basis for land resource security, clearing the idle, improving the utilization rate of stock are the core of the efficient use of land resources, and establishing a unified urban and rural construction land market is the key to promoting the economical and intensive utilization of land resources, provid- ing scientific basis for the sustainable utilization of land resources in the core grain production regions.
文摘With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction.
文摘The objective of this paper is to examine an effective strategy for maintaining and utilizing the traditional arts resources of Japan. The authors explore two pillars of the strategy. One is to improve the quality of Japanese traditional performing arts by securing incomes for artists. The other is to utilize the traditional arts as a medium to expand Japanese cultural influence in foreign countries and to improve Japan's branding as a nation. First, the authors focus on the income security system practiced in traditional Japanese music and describe the discrepancy between short- and long-run optimality. The authors prove that the reputation of this art form affects its popularity and that it is optimal for the Iemoto (the head of the music school) to restrict the number of pupils in onstage performances in order to maintain stage quality. Second, the authors provide evidence that effective methods for a country to expand its cultural influence across the world differ among nations. The authors conduct willingness-to-pay (WTP) experiments and find that while German audiences largely prefer traditional Japanese music, those in the USA are slightly partial to its mixed fusion form. Therefore, the effective ways to expand Japanese cultural influence in foreign countries differ from one country to another.
文摘In order to cultivate the top-notch innovative talents with the intemational perspectives, on the basis of the principles of objective, utility, humanities and practice, medical institutions should update the concept of talent cultivation led by employment, innovate teaching mode by deepening teaching reform, optimize the teaching staff by strengthening cooperation between college and enterprise, widen the practical teaching by participating interaction with pharmaceutical industries, and improve the teaching supervision system by implementing quality requirements to construct quality security system in the cultivation of top-notch innovative medical talents.
文摘The third plenary session of the 18 through "the central committee of the communist party of China on deepening reform of certain major issue decision" is put forward for the first time, to establish a fair and sustainable social security system. This article mainly about fairness in social security and the sustainable problem preliminary exploration, proposed "sustainable" attaches great importance to the "fair" and ", deepen the reform of the social security system.
文摘The first 20 years of this century is the period of strategic opportunities of building a weU-offsociety in an all-round way, at the same time, China's social development is also facing a lot of systemic risk. Economic change and social transformation puts forward new requirements for the social security system reform. This paper studies the theoretical basis of the social security system reform, analyzes the status quo of China's social security system and the existing problems and experience in social security system of other countries for reference, on the basis of perfecting China's pension, medical, unemployment and other social security system, the construction is suitable for the situation of our country's social security system with Chinese characteristics, ensuring and improving people's livelihood, the achievements of reform and opening to the public to achieve genuine sharing is of great significance.
文摘With the acceleration of urbanization, the lifestyles and living expenses of farmers and urban residents is increasingly more and more similar .However, from the measures in terms of the minimum living guarantee, the level of protection of rural and urban residents really have a large gap. The Third Plenary Session of the 18th Central Committee noted "to promote urban and rural minimum living security system and rural development", "to speed up and improve the social security management system and operate the service system",These tell us that only to realize the integration of urban and rural subsistence allowances, improve the underpinning of the social security system, can we build a moderately prosperous society.
文摘The establishment and improvement of the social system is an important indicator of a nation political cultures and social development, and is the basic guarantee of social harmony. In recent years, our urban social security system is maturing, but rural social security system is almost a blank, affecting the economic and political development, and the progress of the farmers, and restricting the process of service government construction.Service government is a new model of government, which orients the purpose of fundamental interests for the whole people. The rural and the farmers are the focus of our country, and the improvement of rural social security system is the key point for solving the problems. Therefore, it is really important to deal with the relationship between the improvement of rural social security system and the service government construction.In my essay, based on the analysis of the theory of rural social security system and the service government, I will put forward the ideas of the improvement of rural social security system and the service government construction.
文摘The rural minimum living security system has the function ofguaranteeing the basic right of life, maintaining social stability and promoting social fairness. In the course of practice, the minimum living guarantee system has also created the problem that hinders its normal function, This paper, based on the rural subsistence allowances policy itself, the implementation of the main body, the object, the system of social environment and other aspects of the operation of rural subsistence allowances in recent years, the problems and causes of the study carried out, and on this basis, Rural low subsistence allowances research and development direction of the future, with a view to the rural minimum living system of further theoretical research, the specific practice to provide reference.
文摘China,already possessing a large number of retirees,will become one of the countries with a predominant-ly aged population by the end of the century.A retirement boom is ex-pected for the year 2030,when China will have over 100 million senior citizens living on an annual pension of billions of yuan.There-fore China is working to legislate a Chinese style social insurance system by the year 2000.This system will be independent of enterprises and cov-er workers in both rural and urban areas.It will be reasonable in its.expenditures because its funding will come from a wide range of sources.It will make a balanced and rational use of these funds and will be run by a highly socialized and coordinated administration.
基金supported by the National Basic Research Program of China under Grant 2013CB329003in part by the National Natural Science Foundation General Program of China under Grant 61171110
文摘In this paper, a multiple parameters weighted fractional Fourier transform(MPWFRFT) and constellation scrambling(CS) method based physical layer(PHY) security system is proposed. The proposed scheme is executed by two steps. In the first step, MPWFRFT, implemented as the constellation beguiling(CB) method, is applied to change the signal's identity. In the second step the additional pseudo random phase information, regarded as the encryption key, is attached to the original signal to enhance the security. Typically, the pseudo random phase information can be removed effectively by the legitimate receiver. In contrast to the cryptography based encryption algorithms and the conventional PHY secrecy techniques, the main contribution of the proposed scheme is concentrated on the variation in signal's characteristics. Simulation results show that the proposed scheme can prevent the exchanging signal from eavesdroppers' classifi cation or inception. Moreover, the proposed scheme can guarantee the BER performance at a tolerate increasing in computational complexity for the legitimate receivers.
文摘The construction of eco-security system was a complicated systematic project, included the comprehensive construction and collaborative propulsion of eco-environment system, eco-economy system, eco-culture system, eco-society system and eco-law system. The comprehensive, coordinated and sustainable development of ecology, economy and society only could be achieved under the guidance of ecological civilization concept by the integrated consideration, comprehensive planning and multi-coordination.
基金supported by National Science and Technology Major Project under Grant No.2012ZX03002003Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No.2011009Open Research Project of State Key Laboratory of Information Security in Institute of Software,Chinese Academy of Sciences
文摘In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.
文摘The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.
文摘This paper uses SWOT analysis, feasibility analysis of integration of urban and rural residents in China, including the overall analysis of the urban and rural integration China internal conditions, mainly for its overall advantages and disadvantages are analyzed; and the external environment, the system is mainly to raise the opportunities and threats were analyzed; in these. The external conditions are analyzed based on the construction of SWOT strategic matrix, found the advantages and disadvantages of the reform process of the integration of urban and rural subsistence allowances system in coexist, opportunities outweigh the challenges, so China's overall urban and rural integration construction is feasible.