期刊文献+
共找到8,853篇文章
< 1 2 250 >
每页显示 20 50 100
Public Sentiment Analysis of Social Security Emergencies Based on Feature Fusion Model of BERT and TextLevelGCN
1
作者 Linli Wang Hu Wang Hanlu Lei 《Journal of Computer and Communications》 2023年第5期194-204,共11页
At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper pro... At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. . 展开更多
关键词 Social security Emergencies Network public Opinion Emotion Analysis Graph Neural Network TextLevelGCN BERT
下载PDF
Implementation of a Comprehensive Information Management Platform for Public Security Based on Java Technology
2
作者 Jin Xue Yali Yuan 《计算机科学与技术汇刊(中英文版)》 2023年第1期11-16,共6页
Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development... Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development of public security,there are more and more provisions for standard administrative department management system,improving office efficiency and enhancing decision encouragement.Therefore,it is of great practical value to design and complete a comprehensive public security business information system.Based on java technology,this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business,and also gets good feedback during the actual test,which confirms the feasibility of the system. 展开更多
关键词 public security Comprehensive Business Information System JAVA WORKFLOW Web Information security
下载PDF
Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security 被引量:2
3
作者 FEIFei-yu CHENWen CHENKe-fei MAChang-she 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期248-250,共3页
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell... In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one. 展开更多
关键词 SIGNCRYPTION identity based public verifiability forward security
下载PDF
The Malicious Uses of Artificial Intelligence(MUAI)and Psychological Security in the Case of Iran
4
作者 Davoud Gharayagh-Zandi 《International Relations and Diplomacy》 2023年第6期266-270,共5页
Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manne... Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manner would be meant that it is well-protected the society’s mentality.The malicious uses of AI in the case of Iran are mattered by the three issues-the huge sanctions imposed to Iran by the Western countries,the psychological dissonance there is in the Iran’s decision making process,and by ontological security perceived by the Iran’s officials.It is tried to examine them in accordance with the technical,cognitive,and the institutional levels of AI. 展开更多
关键词 AI Iran malicious uses psychological security public policy
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data
5
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Construction of Public Security Risk Governance System under the View of Risk Society Theory
6
作者 Ding Donghan 《学术界》 CSSCI 北大核心 2020年第6期193-201,共9页
With the development of economy,China has to fight against the increasing public security risk. The theory of risk society points out that the traditional system of hierarchical management should be transformed into t... With the development of economy,China has to fight against the increasing public security risk. The theory of risk society points out that the traditional system of hierarchical management should be transformed into the governance system led by government and participated in by multiple parties to avoid and reduce risk in modern society. In order to achieve modernization of the national governance system and capacity,we have to deal with these two important subjects,that is,what can we learn from the Western risk society theory and how to establish a scientific and efficient public security risk management system based on the characteristics of modern public security risk. 展开更多
关键词 risk society theory of risk society public security risk
下载PDF
Exploration of Influencing Factors of Public Security
7
作者 SUN Shuai GAO Debin LI Ziying 《Journal of Landscape Research》 2022年第4期33-38,共6页
Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in diffe... Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in different cases.The paper collected cases from 2018 to 2020 in the study area,extracted effective information through BML,combined cluster analysis and OLS analysis,and analyzed the factors that generate cases according to environmental behaviors and criminal geography.It was concluded that case occurrence and influencing factors were correlated in District B of City A. 展开更多
关键词 public security CASE Influencing factors
下载PDF
Research on the Construction of Safety Guarantee System for Police Technical and Tactical Training in Public Security Colleg
8
作者 Yuehua Zhang Ping Wang 《Journal of Educational Theory and Management》 2019年第1期17-21,共5页
The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulatio... The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulations, training control, site equipment, safety supervision and emergency plan, scienti??cally and rationally constructing a security system in relevant public security colleges. This paper has carried out a comprehensive research on Hebei Vocational College of Public Security Police, and provided corresponding safety theory and guarantee for the security protection of the college during the police training period. 展开更多
关键词 public security COLLEGES POLICE TECHNICAL and tactical TRAINING security system
下载PDF
Public Security Crisis Management Model Based on Diversified Cooperation
9
作者 Wenjing Peng 《Review of Educational Theory》 2018年第2期36-39,共4页
Everyone is surrounded by crisis just like the air we breathe at every moment;therefore, all countries, organizations and person are confronted with the risk challenges. Nowadays, the human society has evolved to a re... Everyone is surrounded by crisis just like the air we breathe at every moment;therefore, all countries, organizations and person are confronted with the risk challenges. Nowadays, the human society has evolved to a relatively advanced stage, and along with society progress, complicated social relationship and environment will result in more dangerous elements, thus bringing in more risks. This paper introduces the public security crisis management model based on diversified cooperation in detail from the concept of public security crisis and puts forward safeguard mechanism construction for enhancing the crisis management under diversified cooperation in a brief manner, thus improving the efficiency of crisis management under diversified cooperation. 展开更多
关键词 Diversified COOPERATION public security public MANAGEMENT MANAGEMENT MODEL
下载PDF
Research on the Analytical Efficiency of Public Security Intelligence Based on SEM
10
作者 ZHANG Ting ZHANG Lebing YUAN Shenghe 《Psychology Research》 2022年第3期87-99,共13页
In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a pro... In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a profound impact on the strategic decision-making of public security work,risk prevention and control,the prevention of illegal and criminal activities as well.This article,by constructing SEM(Structural Equation Model)which takes the organizational support,perceived behavioral control,the intelligence sharing,external constraint factors,and public security intelligence analysis efficiency as latent variables,explores the deep inner link among latent variables,in order to provide the public security intelligence analysis efficiency with scientific,objective,and reliable guidance theory and practice research efficaciously. 展开更多
关键词 SEM the public security intelligence the analytical efficiency
下载PDF
Study on the Community Policing Administration Innovation from the Perspective of the Public Security Governance
11
作者 Jian LIN 《International Journal of Technology Management》 2015年第8期69-71,共3页
Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security... Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept. 展开更多
关键词 public security COMMUNITY POLICING INNOVATION
下载PDF
Public Security Risk m Large Scale Activities and the Standardization Prospects
12
作者 Xiong Fei,Ma Na Yan Shaoqing research center or Shanghai Institute of Standardization. senior engineer,director or research center of standardization,Shanghai Institute of Standardization,secretary general of SAC/TC 269/SC 3 on third party logistics service,secretary general of SAC/TC 234/SC 1 on project management maturity assessment, 《China Standardization》 2010年第5期31-38,共8页
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ... This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China. 展开更多
关键词 Large Scale Activities public security STANDARDIZATION
下载PDF
Research on Occurrence Mechanism of Public Security Emergency from the perspective of the Structure Box
13
作者 Jian Lin Bo Kang 《International Journal of Technology Management》 2016年第9期1-6,共6页
Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis... Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency. 展开更多
关键词 public security emergency Structure box Emotional resonance Resonance effect Supporting network
下载PDF
Comparison of Chinese and Foreign Urban Public Security Treatment Mechanisms and Analysis of Policy References
14
作者 Li Xuejun Zhang Mingyu 《工程科学(英文版)》 2007年第1期49-56,共8页
From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment ... From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment mechanisms, and makes systematic summarization of the Chinese and foreign historic experiences. Then, the paper puts forward some designs on structure of the Chinese urban public security system structure. This paper is of the opinion that at present the management of urban public security concerning unexpected incidents should be strengthened. The effective way is to set up the sound urban public security system, urban public security mechanism and related laws and regulations. 展开更多
关键词 public security urban management COMPARISON and ANALYSIS security system
下载PDF
Reflection on strengthening basic Construction of basic Education to improve student Management work in Public Security Colleges
15
作者 LI Enfeng 《International English Education Research》 2018年第1期31-33,共3页
Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of pub... Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges. 展开更多
关键词 grassroots basic Construction public security College student Management
下载PDF
On the Professional Development of Teachers in Public Security colleges and universities
16
作者 SI Jianping SONG Liqu 《International English Education Research》 2017年第4期66-68,共3页
Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our cou... Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our country. Therefore, to reshape education concept from the teaching and research point of view, develop professional level of public security colleges and universities, and create a good team ofteachers are the most important cause of public security education. 展开更多
关键词 public security colleges teachers professional development team building
下载PDF
China Initiates Voluntary Certification of Public Security Products
17
《China Standardization》 2004年第4期16-16,共1页
关键词 security China Initiates Voluntary Certification of public security Products
下载PDF
Research on the Management Mechanism of Teachers in Public Security Colleges and Universities Based on Psychological Contract
18
作者 SONG Liqu 《International English Education Research》 2017年第4期24-25,共2页
In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, bu... In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, but also has an important role in the coordination and stability of the whole system of public security colleges and universities. Based on the theory of Psychological Contract, this paper expounds the basic understanding and research value of Psychological Contract, and puts forward the measures to cultivate teachers' good character and understanding, and as well as coordinate teachers' needs, effectively change teachers' attitude and actively promote the establishment of good interpersonal relationship to explain the research on the Management Mechanism of Teachers in Public Security Colleges and Universities from the Perspective of Psychological Contract. 展开更多
关键词 Psychological Contract public security colleges and universities teacher management mechanism
下载PDF
Is Public Co-Ordination of Investment in Information Security Desirable?
19
作者 Christos Ioannidis David Pym Julian Williams 《Journal of Information Security》 2016年第2期60-80,共21页
This paper provides for the presentation, in an integrated manner, of a sequence of results addressing the consequences of the presence of an information steward in an ecosystem under attack and establishes the approp... This paper provides for the presentation, in an integrated manner, of a sequence of results addressing the consequences of the presence of an information steward in an ecosystem under attack and establishes the appropriate defensive investment responses, thus allowing for a cohesive understanding of the nature of the information steward in a variety of attack contexts. We determine the level of investment in information security and attacking intensity when agents react in a non-coordinated manner and compare them to the case of the system’s coordinated response undertaken under the guidance of a steward. We show that only in the most well-designed institutional set-up the presence of the well-informed steward provides for an increase of the system’s resilience to attacks. In the case in which both the information available to the steward and its policy instruments are curtailed, coordinated policy responses yield no additional benefits to individual agents and in some case they actually compared unfavourably to atomistic responses. The system’s sustainability does improve in the presence of a steward, which deters attackers and reduces the numbers and intensity of attacks. In most cases, the resulting investment expenditure undertaken by the agents in the ecosystem exceeds its Pareto efficient magnitude. 展开更多
关键词 Information security Information Stewardship INVESTMENT public Co-Ordination
下载PDF
Public Security Penalties Law Respects, Protects Human Rights
20
作者 WANG JINGUI The author is a staff member of the People’s Prosecution magazine published by the People’s Republic of China Supreme People’s Procuratorate. 《The Journal of Human Rights》 2006年第1期31-32,共2页
On August 28, 2005, China's highest legislature adopted the Law on Penalties in Respect to Public Security Management (hereinafterrefen'ed to as the Public Security Penalties Law for short). The Law, adopted at th... On August 28, 2005, China's highest legislature adopted the Law on Penalties in Respect to Public Security Management (hereinafterrefen'ed to as the Public Security Penalties Law for short). The Law, adopted at the 17th meeting of the Standing Committee of the Tenth National People's Congress, shall become effective for implementation on March 1, 2006 to replace the Regulations on Penalties in Respect to Public: Security Management (Herein after referred to as the Public Security Penalties Regulations for short) that has been in practice for 18 years. 展开更多
关键词 security Protects Human Rights public security Penalties Law Respects
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部