Prompt radiation emitted during accelerator operation poses a significant health risk,necessitating a thorough search and securing of hazardous areas prior to initiation.Currently,manual sweep methods are employed.How...Prompt radiation emitted during accelerator operation poses a significant health risk,necessitating a thorough search and securing of hazardous areas prior to initiation.Currently,manual sweep methods are employed.However,the limitations of manual sweeps have become increasingly evident with the implementation of large-scale accelerators.By leveraging advancements in machine vision technology,the automatic identification of stranded personnel in controlled areas through camera imagery presents a viable solution for efficient search and security.Given the criticality of personal safety for stranded individuals,search and security processes must be sufficiently reliable.To ensure comprehensive coverage,180°camera groups were strategically positioned on both sides of the accelerator tunnel to eliminate blind spots within the monitoring range.The YOLOV8 network model was modified to enable the detection of small targets,such as hands and feet,as well as larger targets formed by individuals near the cameras.Furthermore,the system incorporates a pedestrian recognition model that detects human body parts,and an information fusion strategy is used to integrate the detected head,hands,and feet with the identified pedestrians as a cohesive unit.This strategy enhanced the capability of the model to identify pedestrians obstructed by equipment,resulting in a notable improvement in the recall rate.Specifically,recall rates of 0.915 and 0.82were obtained for Datasets 1 and 2,respectively.Although there was a slight decrease in accuracy,it aligned with the intended purpose of the search-and-secure software design.Experimental tests conducted within an accelerator tunnel demonstrated the effectiveness of this approach in achieving reliable recognition outcomes.展开更多
This paper investigated the complex relationship between climate change and security in Lamu County, with focus on community perceptions, vulnerabilities, and adaptation strategies. The study utilized a participatory ...This paper investigated the complex relationship between climate change and security in Lamu County, with focus on community perceptions, vulnerabilities, and adaptation strategies. The study utilized a participatory approach involving Focus Group Discussions (FGDs) and Key Informant Interviews (KIIs) to gather insights from diverse community members. Results revealed a growing recognition of climate change as a significant factor amplifying security risks, including resource-based conflicts, food and water insecurity, pest and disease outbreaks, and rising sea levels. The analysis of historical climate data indicated shifts in rainfall patterns and rising temperatures, exacerbating these hazards. Furthermore, it underscores the need to mainstream climate change actions across various sectors for sustainable development and human security. Lamu County in Kenya faces a myriad of security challenges stemming from climate change, with the community perceiving droughts, pests, diseases, and conflicts as prominent hazards. These climatic impacts have led to crop failures, livestock losses, water scarcity, property damage, displacement, and instability. Local adaptation strategies have shown varying degrees of effectiveness, highlighting the need for community-specific and sustainable solutions. The study identified local adaptation strategies and emphasized the importance of early warning systems, informed decision-making, and mainstreaming climate change actions across sectors to enhance human security and sustainable development. However, it also acknowledges limitations in community participation and suggests future research avenues to ensure the inclusion of marginalized voices in such studies.展开更多
In the organizational setting of marine engineering,a significant number of information security incidents have been arised from the employees’failure to comply with the information security policies(ISPs).This may b...In the organizational setting of marine engineering,a significant number of information security incidents have been arised from the employees’failure to comply with the information security policies(ISPs).This may be treated as a principal-agent problem with moral hazard between the employer and the employee for the practical compliance effort of an employee is not observable without high cost-.On the other hand,according to the deterrence theory,the employer and the employee are inherently self-interested beings.It is worth examining to what extent the employee is self-interested in the marine ISPs compliance context.Moreover,it is important to clarify the proper degree of severity of punishment in terms of the deterrent effect.In this study,a marine ISPs compliance game model has been proposed to evaluate the deterrence effect of punishment on the non-compliance behavior of employee individuals.It is found that in a non-punishment contract,the employee will decline to comply with the marine ISPs;but in a punishment contract,appropriate punishment will lead her to select the marine ISPs compliance effort level expected by the employer,and cause no potential backfire effect.展开更多
文摘Prompt radiation emitted during accelerator operation poses a significant health risk,necessitating a thorough search and securing of hazardous areas prior to initiation.Currently,manual sweep methods are employed.However,the limitations of manual sweeps have become increasingly evident with the implementation of large-scale accelerators.By leveraging advancements in machine vision technology,the automatic identification of stranded personnel in controlled areas through camera imagery presents a viable solution for efficient search and security.Given the criticality of personal safety for stranded individuals,search and security processes must be sufficiently reliable.To ensure comprehensive coverage,180°camera groups were strategically positioned on both sides of the accelerator tunnel to eliminate blind spots within the monitoring range.The YOLOV8 network model was modified to enable the detection of small targets,such as hands and feet,as well as larger targets formed by individuals near the cameras.Furthermore,the system incorporates a pedestrian recognition model that detects human body parts,and an information fusion strategy is used to integrate the detected head,hands,and feet with the identified pedestrians as a cohesive unit.This strategy enhanced the capability of the model to identify pedestrians obstructed by equipment,resulting in a notable improvement in the recall rate.Specifically,recall rates of 0.915 and 0.82were obtained for Datasets 1 and 2,respectively.Although there was a slight decrease in accuracy,it aligned with the intended purpose of the search-and-secure software design.Experimental tests conducted within an accelerator tunnel demonstrated the effectiveness of this approach in achieving reliable recognition outcomes.
文摘This paper investigated the complex relationship between climate change and security in Lamu County, with focus on community perceptions, vulnerabilities, and adaptation strategies. The study utilized a participatory approach involving Focus Group Discussions (FGDs) and Key Informant Interviews (KIIs) to gather insights from diverse community members. Results revealed a growing recognition of climate change as a significant factor amplifying security risks, including resource-based conflicts, food and water insecurity, pest and disease outbreaks, and rising sea levels. The analysis of historical climate data indicated shifts in rainfall patterns and rising temperatures, exacerbating these hazards. Furthermore, it underscores the need to mainstream climate change actions across various sectors for sustainable development and human security. Lamu County in Kenya faces a myriad of security challenges stemming from climate change, with the community perceiving droughts, pests, diseases, and conflicts as prominent hazards. These climatic impacts have led to crop failures, livestock losses, water scarcity, property damage, displacement, and instability. Local adaptation strategies have shown varying degrees of effectiveness, highlighting the need for community-specific and sustainable solutions. The study identified local adaptation strategies and emphasized the importance of early warning systems, informed decision-making, and mainstreaming climate change actions across sectors to enhance human security and sustainable development. However, it also acknowledges limitations in community participation and suggests future research avenues to ensure the inclusion of marginalized voices in such studies.
基金funded in part by the National Natural Science Foundation of China (No.70972058,No.71272092 and No.71431002)。
文摘In the organizational setting of marine engineering,a significant number of information security incidents have been arised from the employees’failure to comply with the information security policies(ISPs).This may be treated as a principal-agent problem with moral hazard between the employer and the employee for the practical compliance effort of an employee is not observable without high cost-.On the other hand,according to the deterrence theory,the employer and the employee are inherently self-interested beings.It is worth examining to what extent the employee is self-interested in the marine ISPs compliance context.Moreover,it is important to clarify the proper degree of severity of punishment in terms of the deterrent effect.In this study,a marine ISPs compliance game model has been proposed to evaluate the deterrence effect of punishment on the non-compliance behavior of employee individuals.It is found that in a non-punishment contract,the employee will decline to comply with the marine ISPs;but in a punishment contract,appropriate punishment will lead her to select the marine ISPs compliance effort level expected by the employer,and cause no potential backfire effect.