期刊文献+
共找到9,464篇文章
< 1 2 250 >
每页显示 20 50 100
Research on intelligent search-and-secure technology in accelerator hazardous areas based on machine vision
1
作者 Ying-Lin Ma Yao Wang +1 位作者 Hong-Mei Shi Hui-Jie Zhang 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第4期96-107,共12页
Prompt radiation emitted during accelerator operation poses a significant health risk,necessitating a thorough search and securing of hazardous areas prior to initiation.Currently,manual sweep methods are employed.How... Prompt radiation emitted during accelerator operation poses a significant health risk,necessitating a thorough search and securing of hazardous areas prior to initiation.Currently,manual sweep methods are employed.However,the limitations of manual sweeps have become increasingly evident with the implementation of large-scale accelerators.By leveraging advancements in machine vision technology,the automatic identification of stranded personnel in controlled areas through camera imagery presents a viable solution for efficient search and security.Given the criticality of personal safety for stranded individuals,search and security processes must be sufficiently reliable.To ensure comprehensive coverage,180°camera groups were strategically positioned on both sides of the accelerator tunnel to eliminate blind spots within the monitoring range.The YOLOV8 network model was modified to enable the detection of small targets,such as hands and feet,as well as larger targets formed by individuals near the cameras.Furthermore,the system incorporates a pedestrian recognition model that detects human body parts,and an information fusion strategy is used to integrate the detected head,hands,and feet with the identified pedestrians as a cohesive unit.This strategy enhanced the capability of the model to identify pedestrians obstructed by equipment,resulting in a notable improvement in the recall rate.Specifically,recall rates of 0.915 and 0.82were obtained for Datasets 1 and 2,respectively.Although there was a slight decrease in accuracy,it aligned with the intended purpose of the search-and-secure software design.Experimental tests conducted within an accelerator tunnel demonstrated the effectiveness of this approach in achieving reliable recognition outcomes. 展开更多
关键词 Search and secure Machine vision CAMERA Human body parts recognition Particle accelerator hazardous area
下载PDF
Implementation of a Comprehensive Information Management Platform for Public Security Based on Java Technology
2
作者 Jin Xue Yali Yuan 《计算机科学与技术汇刊(中英文版)》 2023年第1期11-16,共6页
Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development... Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development of public security,there are more and more provisions for standard administrative department management system,improving office efficiency and enhancing decision encouragement.Therefore,it is of great practical value to design and complete a comprehensive public security business information system.Based on java technology,this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business,and also gets good feedback during the actual test,which confirms the feasibility of the system. 展开更多
关键词 public security Comprehensive Business Information System JAVA WORKFLOW Web Information security
下载PDF
Entomophagy and Public Health: A Review of Microbiological Hazards
3
作者 Pauline Kooh Ermolaos Ververis +2 位作者 Vincent Tesson Géraldine Boué Michel Federighi 《Health》 2019年第10期1272-1290,共19页
The world population’s constant increase and the continuous need to ensure food safety and security are among the major challenges to be faced in the next 30 years. In addition, human diet is evolving with a decrease... The world population’s constant increase and the continuous need to ensure food safety and security are among the major challenges to be faced in the next 30 years. In addition, human diet is evolving with a decreased inclusion of proteins from animal sources. In this context, consumption of insects by humans (entomophagy) could be an alternative solution to the intake of protein derived from conventional livestock, due to the lower environmental impact of insect rearing compared to traditional farming. Furthermore, various insect species have promising nutritional profiles regarding both macro and micronutrients. Nowadays, it is recognized that about 2 billion people consume insects at a worldwide scale, with more than 2000 different species to have been reported. Since the beginning of the 2000s, mass rearing of insects for human consumption has been developing all over the world. Nevertheless edible insects are foodstuffs of animal origin and are usually consumed in their entirety, including the digestive tract, meaning that they may contain biological agents with hazardous potential (e.g. bacteria, parasites, viruses, prions, yeasts, molds, mycotoxins, histamine, and antibiotic resistance genes) and they must undergo a thorough analysis. Therefore, establishing the synthesis of the current knowledge on entomophagy and the related biological hazards is the main purpose of this review. 展开更多
关键词 ENTOMOPHAGY MICROBIAL hazards public HEALTH FOOD Safety
下载PDF
Chinese public participation monitoring and warning system for geological hazards
4
作者 WU Sheng-nan LEI Yu +2 位作者 CUI Peng CHEN Rong YIN Pi-hua 《Journal of Mountain Science》 SCIE CSCD 2020年第7期1553-1564,共12页
In China,many geological hazards occurred in remote mountainous regions,and it was time-consuming to disseminate disaster information for the responsible parties to make timely judgements.Besides,only relying on profe... In China,many geological hazards occurred in remote mountainous regions,and it was time-consuming to disseminate disaster information for the responsible parties to make timely judgements.Besides,only relying on professionals to monitor and manage disasters was demanding and costly.The Chinese government created a system to engage residents in the process of disaster risk management,namely’Public Participation Monitoring and Warning’(PPMW),to disseminate timely disaster information and bring down management costs.The objective of this system was to reduce casualties with minimum cost by organizing residents to evacuate from disasters in advance.This paper introduced the PPMW system,including its structure,operation mechanism by reviewing government documents and research articles,and its implementation by a case study of a landslide at Boli village(E 101°01’,N 27°29’),Yanyuan County,Sichuan Province,China on July 19th 2018.Further,this paper analyzed the strengths and limitations of the system and discussed its future development.It had the potential to become an affordable disaster risk management tool for other countries facing similar situations to China. 展开更多
关键词 Geological hazard Monitoring and early warning Disaster risk management public participation Affordable solution
下载PDF
Research on the Analytical Efficiency of Public Security Intelligence Based on SEM
5
作者 ZHANG Ting ZHANG Lebing YUAN Shenghe 《Psychology Research》 2022年第3期87-99,共13页
In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a pro... In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a profound impact on the strategic decision-making of public security work,risk prevention and control,the prevention of illegal and criminal activities as well.This article,by constructing SEM(Structural Equation Model)which takes the organizational support,perceived behavioral control,the intelligence sharing,external constraint factors,and public security intelligence analysis efficiency as latent variables,explores the deep inner link among latent variables,in order to provide the public security intelligence analysis efficiency with scientific,objective,and reliable guidance theory and practice research efficaciously. 展开更多
关键词 SEM the public security intelligence the analytical efficiency
下载PDF
China Initiates Voluntary Certification of Public Security Products
6
《China Standardization》 2004年第4期16-16,共1页
关键词 security China Initiates Voluntary Certification of public security Products
下载PDF
Exploring the Nexus between Climate Hazards and Conflict in Lamu County: Implications for Community Adaptation Action Plans
7
作者 Misiani Zachary Simeon Mwadiga +5 位作者 Mohamed Abubakar Hindada Boneya Onyango Linet Amos Okello Mohamed Rashid Dirie Monica Orero 《Journal of Environmental Protection》 2023年第12期984-1005,共22页
This paper investigated the complex relationship between climate change and security in Lamu County, with focus on community perceptions, vulnerabilities, and adaptation strategies. The study utilized a participatory ... This paper investigated the complex relationship between climate change and security in Lamu County, with focus on community perceptions, vulnerabilities, and adaptation strategies. The study utilized a participatory approach involving Focus Group Discussions (FGDs) and Key Informant Interviews (KIIs) to gather insights from diverse community members. Results revealed a growing recognition of climate change as a significant factor amplifying security risks, including resource-based conflicts, food and water insecurity, pest and disease outbreaks, and rising sea levels. The analysis of historical climate data indicated shifts in rainfall patterns and rising temperatures, exacerbating these hazards. Furthermore, it underscores the need to mainstream climate change actions across various sectors for sustainable development and human security. Lamu County in Kenya faces a myriad of security challenges stemming from climate change, with the community perceiving droughts, pests, diseases, and conflicts as prominent hazards. These climatic impacts have led to crop failures, livestock losses, water scarcity, property damage, displacement, and instability. Local adaptation strategies have shown varying degrees of effectiveness, highlighting the need for community-specific and sustainable solutions. The study identified local adaptation strategies and emphasized the importance of early warning systems, informed decision-making, and mainstreaming climate change actions across sectors to enhance human security and sustainable development. However, it also acknowledges limitations in community participation and suggests future research avenues to ensure the inclusion of marginalized voices in such studies. 展开更多
关键词 Kenya Climate Changes and Adaptation Pollution Climate hazards CONFLICT security Temperature Rainfall Sea Level Lamu County
下载PDF
Construction of Public Security Risk Governance System under the View of Risk Society Theory
8
作者 Ding Donghan 《学术界》 CSSCI 北大核心 2020年第6期193-201,共9页
With the development of economy,China has to fight against the increasing public security risk. The theory of risk society points out that the traditional system of hierarchical management should be transformed into t... With the development of economy,China has to fight against the increasing public security risk. The theory of risk society points out that the traditional system of hierarchical management should be transformed into the governance system led by government and participated in by multiple parties to avoid and reduce risk in modern society. In order to achieve modernization of the national governance system and capacity,we have to deal with these two important subjects,that is,what can we learn from the Western risk society theory and how to establish a scientific and efficient public security risk management system based on the characteristics of modern public security risk. 展开更多
关键词 risk society theory of risk society public security risk
下载PDF
Exploration of Influencing Factors of Public Security
9
作者 SUN Shuai GAO Debin LI Ziying 《Journal of Landscape Research》 2022年第4期33-38,共6页
Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in diffe... Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in different cases.The paper collected cases from 2018 to 2020 in the study area,extracted effective information through BML,combined cluster analysis and OLS analysis,and analyzed the factors that generate cases according to environmental behaviors and criminal geography.It was concluded that case occurrence and influencing factors were correlated in District B of City A. 展开更多
关键词 public security CASE Influencing factors
下载PDF
Research on the Construction of Safety Guarantee System for Police Technical and Tactical Training in Public Security Colleg
10
作者 Yuehua Zhang Ping Wang 《Journal of Educational Theory and Management》 2019年第1期17-21,共5页
The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulatio... The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulations, training control, site equipment, safety supervision and emergency plan, scienti??cally and rationally constructing a security system in relevant public security colleges. This paper has carried out a comprehensive research on Hebei Vocational College of Public Security Police, and provided corresponding safety theory and guarantee for the security protection of the college during the police training period. 展开更多
关键词 public security COLLEGES POLICE TECHNICAL and tactical TRAINING security system
下载PDF
Study on the Community Policing Administration Innovation from the Perspective of the Public Security Governance
11
作者 Jian LIN 《International Journal of Technology Management》 2015年第8期69-71,共3页
Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security... Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept. 展开更多
关键词 public security COMMUNITY POLICING INNOVATION
下载PDF
Research on Occurrence Mechanism of Public Security Emergency from the perspective of the Structure Box
12
作者 Jian Lin Bo Kang 《International Journal of Technology Management》 2016年第9期1-6,共6页
Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis... Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency. 展开更多
关键词 public security emergency Structure box Emotional resonance Resonance effect Supporting network
下载PDF
Comparison of Chinese and Foreign Urban Public Security Treatment Mechanisms and Analysis of Policy References
13
作者 Li Xuejun Zhang Mingyu 《工程科学(英文版)》 2007年第1期49-56,共8页
From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment ... From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment mechanisms, and makes systematic summarization of the Chinese and foreign historic experiences. Then, the paper puts forward some designs on structure of the Chinese urban public security system structure. This paper is of the opinion that at present the management of urban public security concerning unexpected incidents should be strengthened. The effective way is to set up the sound urban public security system, urban public security mechanism and related laws and regulations. 展开更多
关键词 public security urban management COMPARISON and ANALYSIS security system
下载PDF
Reflection on strengthening basic Construction of basic Education to improve student Management work in Public Security Colleges
14
作者 LI Enfeng 《International English Education Research》 2018年第1期31-33,共3页
Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of pub... Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges. 展开更多
关键词 grassroots basic Construction public security College student Management
下载PDF
On the Professional Development of Teachers in Public Security colleges and universities
15
作者 SI Jianping SONG Liqu 《International English Education Research》 2017年第4期66-68,共3页
Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our cou... Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our country. Therefore, to reshape education concept from the teaching and research point of view, develop professional level of public security colleges and universities, and create a good team ofteachers are the most important cause of public security education. 展开更多
关键词 public security colleges teachers professional development team building
下载PDF
Research on the Management Mechanism of Teachers in Public Security Colleges and Universities Based on Psychological Contract
16
作者 SONG Liqu 《International English Education Research》 2017年第4期24-25,共2页
In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, bu... In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, but also has an important role in the coordination and stability of the whole system of public security colleges and universities. Based on the theory of Psychological Contract, this paper expounds the basic understanding and research value of Psychological Contract, and puts forward the measures to cultivate teachers' good character and understanding, and as well as coordinate teachers' needs, effectively change teachers' attitude and actively promote the establishment of good interpersonal relationship to explain the research on the Management Mechanism of Teachers in Public Security Colleges and Universities from the Perspective of Psychological Contract. 展开更多
关键词 Psychological Contract public security colleges and universities teacher management mechanism
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
17
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN
18
作者 Linli Wang Hu Wang Hanlu Lei 《Journal of Computer and Communications》 2023年第5期194-204,共11页
At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper pro... At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. . 展开更多
关键词 Social security Emergencies Network public Opinion Emotion Analysis Graph Neural Network TextLevelGCN BERT
下载PDF
Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security 被引量:2
19
作者 FEIFei-yu CHENWen CHENKe-fei MAChang-she 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期248-250,共3页
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell... In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one. 展开更多
关键词 SIGNCRYPTION identity based public verifiability forward security
下载PDF
The Routine and Emergency Coordinated Management of Public Security
20
作者 Ning Liu 《Frontiers of Engineering Management》 2015年第4期331-338,393-394,共10页
The paper presents a study based on the observation of public security programme situations.Nowadays, public security management is faced with challenges such as the increase in non-traditional safety threats, high oc... The paper presents a study based on the observation of public security programme situations.Nowadays, public security management is faced with challenges such as the increase in non-traditional safety threats, high occurrence probability, obvious complex chain reactions, high security demand, vulnerable bearing systems and world-wide influences. For the new adapted requirements of public security management, this paper puts forward the concept of the coordinated routine and emergency management, which combines the routine management at normal status and the emergency management at the abnormal status based on the whole process of public security management. This paper analyzes the coordinated management system and establishes the decision-making objectives, decision-making model and constraints. In addition, this paper proposes the basic strategy of achieving the coordinated management of public security. 展开更多
关键词 public security routine management emergency management coordinated management
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部