At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper pro...At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. .展开更多
Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development...Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development of public security,there are more and more provisions for standard administrative department management system,improving office efficiency and enhancing decision encouragement.Therefore,it is of great practical value to design and complete a comprehensive public security business information system.Based on java technology,this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business,and also gets good feedback during the actual test,which confirms the feasibility of the system.展开更多
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell...In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.展开更多
Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manne...Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manner would be meant that it is well-protected the society’s mentality.The malicious uses of AI in the case of Iran are mattered by the three issues-the huge sanctions imposed to Iran by the Western countries,the psychological dissonance there is in the Iran’s decision making process,and by ontological security perceived by the Iran’s officials.It is tried to examine them in accordance with the technical,cognitive,and the institutional levels of AI.展开更多
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all...For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.展开更多
With the development of economy,China has to fight against the increasing public security risk. The theory of risk society points out that the traditional system of hierarchical management should be transformed into t...With the development of economy,China has to fight against the increasing public security risk. The theory of risk society points out that the traditional system of hierarchical management should be transformed into the governance system led by government and participated in by multiple parties to avoid and reduce risk in modern society. In order to achieve modernization of the national governance system and capacity,we have to deal with these two important subjects,that is,what can we learn from the Western risk society theory and how to establish a scientific and efficient public security risk management system based on the characteristics of modern public security risk.展开更多
Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in diffe...Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in different cases.The paper collected cases from 2018 to 2020 in the study area,extracted effective information through BML,combined cluster analysis and OLS analysis,and analyzed the factors that generate cases according to environmental behaviors and criminal geography.It was concluded that case occurrence and influencing factors were correlated in District B of City A.展开更多
The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulatio...The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulations, training control, site equipment, safety supervision and emergency plan, scienti??cally and rationally constructing a security system in relevant public security colleges. This paper has carried out a comprehensive research on Hebei Vocational College of Public Security Police, and provided corresponding safety theory and guarantee for the security protection of the college during the police training period.展开更多
Everyone is surrounded by crisis just like the air we breathe at every moment;therefore, all countries, organizations and person are confronted with the risk challenges. Nowadays, the human society has evolved to a re...Everyone is surrounded by crisis just like the air we breathe at every moment;therefore, all countries, organizations and person are confronted with the risk challenges. Nowadays, the human society has evolved to a relatively advanced stage, and along with society progress, complicated social relationship and environment will result in more dangerous elements, thus bringing in more risks. This paper introduces the public security crisis management model based on diversified cooperation in detail from the concept of public security crisis and puts forward safeguard mechanism construction for enhancing the crisis management under diversified cooperation in a brief manner, thus improving the efficiency of crisis management under diversified cooperation.展开更多
In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a pro...In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a profound impact on the strategic decision-making of public security work,risk prevention and control,the prevention of illegal and criminal activities as well.This article,by constructing SEM(Structural Equation Model)which takes the organizational support,perceived behavioral control,the intelligence sharing,external constraint factors,and public security intelligence analysis efficiency as latent variables,explores the deep inner link among latent variables,in order to provide the public security intelligence analysis efficiency with scientific,objective,and reliable guidance theory and practice research efficaciously.展开更多
Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security...Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept.展开更多
This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying ...This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.展开更多
Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis...Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency.展开更多
From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment ...From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment mechanisms, and makes systematic summarization of the Chinese and foreign historic experiences. Then, the paper puts forward some designs on structure of the Chinese urban public security system structure. This paper is of the opinion that at present the management of urban public security concerning unexpected incidents should be strengthened. The effective way is to set up the sound urban public security system, urban public security mechanism and related laws and regulations.展开更多
Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of pub...Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges.展开更多
Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our cou...Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our country. Therefore, to reshape education concept from the teaching and research point of view, develop professional level of public security colleges and universities, and create a good team ofteachers are the most important cause of public security education.展开更多
In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, bu...In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, but also has an important role in the coordination and stability of the whole system of public security colleges and universities. Based on the theory of Psychological Contract, this paper expounds the basic understanding and research value of Psychological Contract, and puts forward the measures to cultivate teachers' good character and understanding, and as well as coordinate teachers' needs, effectively change teachers' attitude and actively promote the establishment of good interpersonal relationship to explain the research on the Management Mechanism of Teachers in Public Security Colleges and Universities from the Perspective of Psychological Contract.展开更多
This paper provides for the presentation, in an integrated manner, of a sequence of results addressing the consequences of the presence of an information steward in an ecosystem under attack and establishes the approp...This paper provides for the presentation, in an integrated manner, of a sequence of results addressing the consequences of the presence of an information steward in an ecosystem under attack and establishes the appropriate defensive investment responses, thus allowing for a cohesive understanding of the nature of the information steward in a variety of attack contexts. We determine the level of investment in information security and attacking intensity when agents react in a non-coordinated manner and compare them to the case of the system’s coordinated response undertaken under the guidance of a steward. We show that only in the most well-designed institutional set-up the presence of the well-informed steward provides for an increase of the system’s resilience to attacks. In the case in which both the information available to the steward and its policy instruments are curtailed, coordinated policy responses yield no additional benefits to individual agents and in some case they actually compared unfavourably to atomistic responses. The system’s sustainability does improve in the presence of a steward, which deters attackers and reduces the numbers and intensity of attacks. In most cases, the resulting investment expenditure undertaken by the agents in the ecosystem exceeds its Pareto efficient magnitude.展开更多
On August 28, 2005, China's highest legislature adopted the Law on Penalties in Respect to Public Security Management (hereinafterrefen'ed to as the Public Security Penalties Law for short). The Law, adopted at th...On August 28, 2005, China's highest legislature adopted the Law on Penalties in Respect to Public Security Management (hereinafterrefen'ed to as the Public Security Penalties Law for short). The Law, adopted at the 17th meeting of the Standing Committee of the Tenth National People's Congress, shall become effective for implementation on March 1, 2006 to replace the Regulations on Penalties in Respect to Public: Security Management (Herein after referred to as the Public Security Penalties Regulations for short) that has been in practice for 18 years.展开更多
文摘At present, the emotion classification method of Weibo public opinions based on graph neural network cannot solve the polysemy problem well, and the scale of global graph with fixed weight is too large. This paper proposes a feature fusion network model Bert-TextLevelGCN based on BERT pre-training and improved TextGCN. On the one hand, Bert is introduced to obtain the initial vector input of graph neural network containing rich semantic features. On the other hand, the global graph connection window of traditional TextGCN is reduced to the text level, and the message propagation mechanism of global sharing is applied. Finally, the output vector of BERT and TextLevelGCN is fused by interpolation update method, and a more robust mapping of positive and negative sentiment classification of public opinion text of “Tangshan Barbecue Restaurant beating people” is obtained. In the context of the national anti-gang campaign, it is of great significance to accurately and efficiently analyze the emotional characteristics of public opinion in sudden social violence events with bad social impact, which is of great significance to improve the government’s public opinion warning and response ability to public opinion in sudden social security events. .
文摘Due to the rapid development of electronic information technology,the development of Internet technology and system software development technology has become more and more common.Especially,along with the development of public security,there are more and more provisions for standard administrative department management system,improving office efficiency and enhancing decision encouragement.Therefore,it is of great practical value to design and complete a comprehensive public security business information system.Based on java technology,this paper designs and builds a comprehensive information management platform for public security through the analysis of comprehensive public security business,and also gets good feedback during the actual test,which confirms the feasibility of the system.
文摘In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one.
文摘Artificial intelligence(AI)is attracted great attention in the world,because its uses are going to be prevailed in many areas and issues.As a result,keeping the situation to use AI in the positive and optimistic manner would be meant that it is well-protected the society’s mentality.The malicious uses of AI in the case of Iran are mattered by the three issues-the huge sanctions imposed to Iran by the Western countries,the psychological dissonance there is in the Iran’s decision making process,and by ontological security perceived by the Iran’s officials.It is tried to examine them in accordance with the technical,cognitive,and the institutional levels of AI.
基金partially supported by the National Natural Science Foundation of China under grant no.62372245the Foundation of Yunnan Key Laboratory of Blockchain Application Technology under Grant 202105AG070005+1 种基金in part by the Foundation of State Key Laboratory of Public Big Datain part by the Foundation of Key Laboratory of Computational Science and Application of Hainan Province under Grant JSKX202202。
文摘For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks.
文摘With the development of economy,China has to fight against the increasing public security risk. The theory of risk society points out that the traditional system of hierarchical management should be transformed into the governance system led by government and participated in by multiple parties to avoid and reduce risk in modern society. In order to achieve modernization of the national governance system and capacity,we have to deal with these two important subjects,that is,what can we learn from the Western risk society theory and how to establish a scientific and efficient public security risk management system based on the characteristics of modern public security risk.
基金Sponsored by Beijing Municipal Education Commission Social Science Project (KM202010009002)。
文摘Taking 5 types of cases affecting public security in District B of City A as the main research objects,this study explored the significant differences in the factors that influence the occurrence of the cases in different cases.The paper collected cases from 2018 to 2020 in the study area,extracted effective information through BML,combined cluster analysis and OLS analysis,and analyzed the factors that generate cases according to environmental behaviors and criminal geography.It was concluded that case occurrence and influencing factors were correlated in District B of City A.
文摘The security system for police technical and tactical training in public security colleges in China is mainly composed of seven security guarantee systems: management organization, safety education, laws and regulations, training control, site equipment, safety supervision and emergency plan, scienti??cally and rationally constructing a security system in relevant public security colleges. This paper has carried out a comprehensive research on Hebei Vocational College of Public Security Police, and provided corresponding safety theory and guarantee for the security protection of the college during the police training period.
文摘Everyone is surrounded by crisis just like the air we breathe at every moment;therefore, all countries, organizations and person are confronted with the risk challenges. Nowadays, the human society has evolved to a relatively advanced stage, and along with society progress, complicated social relationship and environment will result in more dangerous elements, thus bringing in more risks. This paper introduces the public security crisis management model based on diversified cooperation in detail from the concept of public security crisis and puts forward safeguard mechanism construction for enhancing the crisis management under diversified cooperation in a brief manner, thus improving the efficiency of crisis management under diversified cooperation.
基金Young and Middle-Aged Social Science Program of China People’s Police University(ZQN202214,ZQN2020025).
文摘In the new era,the efficiency of public security intelligence analysis is one of the decisive factors for the reforms of public security work quality,efficiency as well as the impetus transforming,which also has a profound impact on the strategic decision-making of public security work,risk prevention and control,the prevention of illegal and criminal activities as well.This article,by constructing SEM(Structural Equation Model)which takes the organizational support,perceived behavioral control,the intelligence sharing,external constraint factors,and public security intelligence analysis efficiency as latent variables,explores the deep inner link among latent variables,in order to provide the public security intelligence analysis efficiency with scientific,objective,and reliable guidance theory and practice research efficaciously.
文摘Since the 20th century, human public security accidents occurred frequently, so that the developed countries such as the United States, Japan, and Russia took the lead in strengthening the study of the public security administration. Since the 21th century, all walks of life have paid more attention to the public security administration in China, along with the deepened implementation of the reform and opening-up policy and the rapid development of economic construction and the effects from the outbreak of the SARS crisis and the frequent occurrence of many coal mine security accidents, etc. In this process, the non-traditional security issues and man-made crisis are gradually becoming the main threats currently to the public security of China, because the conflicts of interest and the social contradictions overlap and the social crisis such as cadres-masses and police-masses conflicts is being aggravated. At present, the Ministry of Public Security of China is pushing forward a community policing reform and great numbers of community polices in community policing administration will directly confront with the challenges of the public security administration complexity, and therefore, the promotion of community policing urgently needs the innovation of administration concept.
文摘This paper generalizes the definition and its scope of large scale activity based on its current practice and supervision system in China, makes risk analysis during activities, and puts forward proposals on carrying out relevant standardization works after discussions about the actuality and prospect of social security on large scale activities in China.
文摘Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency.
文摘From the viewpoint of disaster prevention in the urban areas, this paper analyzes the value of urban public security system, selects typical cases to make a comparison of Chinese and foreign public security treatment mechanisms, and makes systematic summarization of the Chinese and foreign historic experiences. Then, the paper puts forward some designs on structure of the Chinese urban public security system structure. This paper is of the opinion that at present the management of urban public security concerning unexpected incidents should be strengthened. The effective way is to set up the sound urban public security system, urban public security mechanism and related laws and regulations.
文摘Public security colleges shoulder the responsibility of cultivating and transporting qualified policemen to public security institutions. They are the cradle cultivating police. Strengthening basic construction of public security colleges and universities ,combining each aspect management and teaching work thus forming a perfect management system is the cornerstone promoting long-term development of public security education undertakings. Since 2011, Students' Affairs Office of Criminal Police College of China has developed and implemented basic construction programs, starting with students organizations at grassroots level, achievinv better results. It has certain reference significance for improving student management work in public security colleges.
文摘Teachers in public security colleges and universities are faced with professional dilemma in the process of carrying out education, which brings many problems to the development of public security education in our country. Therefore, to reshape education concept from the teaching and research point of view, develop professional level of public security colleges and universities, and create a good team ofteachers are the most important cause of public security education.
文摘In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, but also has an important role in the coordination and stability of the whole system of public security colleges and universities. Based on the theory of Psychological Contract, this paper expounds the basic understanding and research value of Psychological Contract, and puts forward the measures to cultivate teachers' good character and understanding, and as well as coordinate teachers' needs, effectively change teachers' attitude and actively promote the establishment of good interpersonal relationship to explain the research on the Management Mechanism of Teachers in Public Security Colleges and Universities from the Perspective of Psychological Contract.
文摘This paper provides for the presentation, in an integrated manner, of a sequence of results addressing the consequences of the presence of an information steward in an ecosystem under attack and establishes the appropriate defensive investment responses, thus allowing for a cohesive understanding of the nature of the information steward in a variety of attack contexts. We determine the level of investment in information security and attacking intensity when agents react in a non-coordinated manner and compare them to the case of the system’s coordinated response undertaken under the guidance of a steward. We show that only in the most well-designed institutional set-up the presence of the well-informed steward provides for an increase of the system’s resilience to attacks. In the case in which both the information available to the steward and its policy instruments are curtailed, coordinated policy responses yield no additional benefits to individual agents and in some case they actually compared unfavourably to atomistic responses. The system’s sustainability does improve in the presence of a steward, which deters attackers and reduces the numbers and intensity of attacks. In most cases, the resulting investment expenditure undertaken by the agents in the ecosystem exceeds its Pareto efficient magnitude.
文摘On August 28, 2005, China's highest legislature adopted the Law on Penalties in Respect to Public Security Management (hereinafterrefen'ed to as the Public Security Penalties Law for short). The Law, adopted at the 17th meeting of the Standing Committee of the Tenth National People's Congress, shall become effective for implementation on March 1, 2006 to replace the Regulations on Penalties in Respect to Public: Security Management (Herein after referred to as the Public Security Penalties Regulations for short) that has been in practice for 18 years.