In the new era,the Communist Party of China(CPC)has made historic achievements in respecting and protecting human rights.Building upon the principle of the“two integrations”(integrating the basic tenets of Marxism w...In the new era,the Communist Party of China(CPC)has made historic achievements in respecting and protecting human rights.Building upon the principle of the“two integrations”(integrating the basic tenets of Marxism with China’s specific realities and fine traditional culture),it has nurtured new theories on respecting and protecting human rights in the new era,which can address the fundamental questions of whom and what the human rights protection efforts in the new era are for.Guided by the principle of“taking our own path,”it has charted a distinct course for the development of human rights,diverging from the Western approach.The CPC has maintained the unity between Party leadership and the respect for and protection of human rights,promoting progress in human rights through the pursuit of“high-quality development,”and ensuring various fundamental rights of the people through the rule of law.Building upon the past experience,the CPC has established the“source”of the institutional framework for respecting and protecting human rights in the new era,crafted the“body”of this institutional framework,and introduced its practical“application.”In promoting the comprehensive advancement of human rights protection,the CPC has facilitated the connotative development of human rights protection in China,empowering China in international human rights discourse,and contributing Chinese strength and wisdom to global human rights governance.展开更多
This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and ca...This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and case study, so as to promote the quality of demonstration area constructed for modem public sports services, truly show the social application value of the construction of demonstration area for modem public sports services, and achieve national fitness and the development of public sports.展开更多
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu...With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.展开更多
90 counties (cities) in Guangxi Province being taken as the tested region,the ecosystem service value of those counties (cities) was measured with the data of land-using in 2005 by means of the Table of Terrestrial Ec...90 counties (cities) in Guangxi Province being taken as the tested region,the ecosystem service value of those counties (cities) was measured with the data of land-using in 2005 by means of the Table of Terrestrial Ecosystem Services Value in China.The result indicated that the value of the ecosystem services per unit was divided into 3 categories:the first category with high ecosystem services value,the second category with medium ecosystem services value and the third category with low ecosystem services value.The region of the first category was mainly distributed in the mountain area of northern,northwestern,eastern and northeast part of Guangxi;the second category,in the hilly area of southern part and the mountain area in the southwestern part of Guangxi and the third category,in the basin area of central Guangxi,the karst area of western and northwestern Guangxi Province.展开更多
Via database technology, a perfect lightning protection integrated service work platform is established, thereby realizing paperless data management of routine business.
Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to ...Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to realize joint allocation of computing and connectivity resources in survivable inter-datacenter EONs,a survivable routing,modulation level,spectrum,and computing resource allocation algorithm(SRMLSCRA)algorithm and three datacenter selection strategies,i.e.Computing Resource First(CRF),Shortest Path First(SPF)and Random Destination(RD),are proposed for different scenarios.Unicast and manycast are applied to the communication of computing requests,and the routing strategies are calculated respectively.Simulation results show that SRMLCRA-CRF can serve the largest amount of protected computing tasks,and the requested calculation blocking probability is reduced by 29.2%,28.3%and 30.5%compared with SRMLSCRA-SPF,SRMLSCRA-RD and the benchmark EPS-RMSA algorithms respectively.Therefore,it is more applicable to the networks with huge calculations.Besides,SRMLSCRA-SPF consumes the least spectrum,thereby exhibiting its suitability for scenarios where the amount of calculation is small and communication resources are scarce.The results demonstrate that the proposed methods realize the joint allocation of computing and connectivity resources,and could provide efficient protection for services under single-link failure and occupy less spectrum.展开更多
Scientific and technological services are necessary for strengthening agriculture.Under the new situation,agricultural research institutes should give full play to their advantages,strive to innovate scientific and te...Scientific and technological services are necessary for strengthening agriculture.Under the new situation,agricultural research institutes should give full play to their advantages,strive to innovate scientific and technological services methods,and improve scientific and technological service levels.Combined with the practice of science and technology work of Institute of Plant Protection of Hebei Academy of Agricultural and Forestry Sciences,this paper made an in-depth analysis on the present situations and existing problems in the scientific and technological services of agricultural research institutes.Based on the analysis,it came up with recommendations including change ideological concepts,strengthening service awareness,adhering to people-oriented principle,enhancing the team building,improving mechanism construction,stimulating innovative vitality,exploring service methods,and enriching service connotation,so as to improve scientific and technological service works.展开更多
When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of p...When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of privacy information.To solve this problem,a new generalized k-anonymity location privacy protection scheme in location based services(LPPS-GKA)with the third trust servicer is proposed.And it can guarantee the users get good location-based services(LBS)without leaking the information of the geo-location region,which has protected the perfect privacy.Analysis shows that LPPS-GKA is more secure in protecting location privacy,including region information,and is more efficient than other similar schemes in computational and communicational aspects.It is suitable for dynamic environment for different user’s various privacy protection requests.展开更多
The Communist Party of China has been concerned with the protection of the rights and interests of persons with disabilities since its founding.in the period of the new democratic Revolution and after the founding of ...The Communist Party of China has been concerned with the protection of the rights and interests of persons with disabilities since its founding.in the period of the new democratic Revolution and after the founding of the People’s Republic of China,it adopted a series of protective measures in various forms in line with local conditions.Since the reform and opening-up,the cause of persons with disabilities has developed in an all-around way under the leadership of the CPC.especially since the 18th national Congress of the Communist Party of China,the protection of human rights for persons with disabilities has been innovatively developed,and persons with disabilities have been truly participating in social affairs and share the country’s development gains as equal subjects of rights.The centennial history of the Party’s protection of the rights and interests of persons with disabilities shows that the CPC’s ideas of human rights protection consecutively comprise humanitarian assistance,humanitarian protection,and people-centered human rights protection.The main identity of persons with disabilities has changed from the object of protection during the revolution to the object of medical care and social welfare,and the subject of human rights.The content of protection of rights and interests has developed from survival assistance to comprehensive protection including education,rehabilitation,employment,etc.The dignity,autonomy,equality,and social participation of persons with disabilities as the subject of human rights have become increasingly prominent.展开更多
Protection of criminals' human rights is an important issue that has received full atten- tion at home and abroad. The Communist Party of China (CPC) has always attached much importance to the protection of crimin...Protection of criminals' human rights is an important issue that has received full atten- tion at home and abroad. The Communist Party of China (CPC) has always attached much importance to the protection of criminals' human rights. Since the founding of New China, the Party and the state have paid full attention to protecting the human rights of criminals.展开更多
With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing co...With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data.展开更多
The estimated total area of wetland in China is more than 25.9 million hectares including about 11.9 million hectares of marshes and bogs, 9.1 million hectares of lake and about 2.2 million hectares of coastal salt ma...The estimated total area of wetland in China is more than 25.9 million hectares including about 11.9 million hectares of marshes and bogs, 9.1 million hectares of lake and about 2.2 million hectares of coastal salt marshes and mudflats. The area of wetland is equivalent to 2.7% of the land surface. China also has 2.7 million hectares of shallow sea water (less 5m in depth at low tide). Marshes and bogs are equivalent 1.3% of the land surface. Only three provinces(regions)— Qinghai, Xizang (Tibet)and Heilongjiang— have a larger total area of marsh and bog. According to the structure, type and development of wetland in different river basins, wetland can be classified nine main regions. The experiments indicate that the coefficient of the marsh to regulate flood is similar to that of lakes. Wetlands occupy 17.8% of the Sanjiang Plain area, the annual carbon contribution is 0.78× 104t. Carbon released from marsh soil return into atmosphere is 3.95× 106t/a. At present there is a sharp contradiction between population growth and natural resources shortage, causing wetland to be exerted with huge pressures and serious threats.展开更多
With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accur...With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accurate,convenient and prompt method. Therefore,it is very urgent to investigate individualized information service of library. In this paper,based on the development of the individualized information service for the reader in the college library,the individualized information service is clarified by using three perspectives,including establishment of individualized information demand model,integration of internal and external resource and protection of the reader privacy. Finally,the corresponding strategy and related measure are presented.展开更多
The report of the 19th National Congress of the Communist Party of China stated that it was necessary to establish and practice the concept that lucid waters and lush mountains are invaluable assets,treat the ecologic...The report of the 19th National Congress of the Communist Party of China stated that it was necessary to establish and practice the concept that lucid waters and lush mountains are invaluable assets,treat the ecological environment as life,and coordinate the management of mountains,rivers,forests,farmlands,lakes and grasslands.In recent years,China has organized a series of pilot projects for the ecological protection and restoration of mountains,rivers,forests,farmlands,lakes and grasslands,breaking the boundary between administrative divisions,departmental management and ecological elements,and implementing conservation and restoration oriented towards the improvement of ecosystem services,so as to solve the problem of the lack of overall planning for ecological protection and restoration projects and the separated management of ecological elements.This study systematically elaborated the theoretical basis and connotation characteristics of ecological protection and restoration of mountains,rivers,forests,farmlands,lakes and grasslands.It proposed the implementation path of ecological protection and restoration project of mountains,rivers,forests,farmlands,lakes and grasslands by taking the water source conservation area of Beijing-Tianjin-Hebei as a case,so as to provide reference for the implementation and decision-making management of ecological protection and restoration projects in various regions.展开更多
Human activities such as the implementation of ecological protection projects and expansion of construction land can cause complex land use changes that affect ecosystem service values (ESV). In this study, we inves...Human activities such as the implementation of ecological protection projects and expansion of construction land can cause complex land use changes that affect ecosystem service values (ESV). In this study, we investigated changes in ESV in response to land use changes in Ningwu County, in eastern Loess Plateau of China. Our aim is to provide guidance for sustainable land use planning in this region. We used remote sensing to evaluate land use changes, and applied a fast, proxy-based method for evaluating ESVat three points in time: 1990, 2000, and 2010. More than 89% of the total ESV in Ningwu County was attributable to woodland and grassland. The ESV in western mountain areas show the greatest increase from 1990 to 2010, but ESV decreased the most in the low-elevation northeastern area of flat terrain These tradeoffs led to a slight net decrease (1.0%) in Ningwu County's total ESV. Although the decline in ESV was relatively low compared to the rate of economic growth, total ESV was much lower than global and national average levels at the end of the study period.展开更多
In order to meet the requirements of information exchange varieties and manners in wide area protection system, a communication service model based on IEC 61850 is proposed. This service model can realize communicatio...In order to meet the requirements of information exchange varieties and manners in wide area protection system, a communication service model based on IEC 61850 is proposed. This service model can realize communication consistency and cooperation between different types of devices. Furthermore, the communication reliability and time delay performance are guaranteed to meet the requirements of relay protection from the upper layer. Message structure of generic sub-station event (GSE) and its communication mechanism are discussed. General methods to communicate digital information by generic substation status event (GSSE) and communicate analog sampling information by sampling analog value (SAV) of GSE are proposed.展开更多
<strong>Background:</strong> Multicentric prospective cohort investigation survey conducted between 1<sup>st</sup> of March and 1<sup>st</sup> of April 2021on SARS-CoV-2 occupationa...<strong>Background:</strong> Multicentric prospective cohort investigation survey conducted between 1<sup>st</sup> of March and 1<sup>st</sup> of April 2021on SARS-CoV-2 occupational risk for German Emergency Medical Services (EMS) personnel. <strong>Study Objectives: Primary:</strong> The objective is to take stock of the use and availability of Personal Protective Equipment (PPE) in German EMS, both at managerial and employee level, during the SARS-CoV-2 pandemic. <strong>Secondary:</strong> Generate additional data on individual perceptions of risk of infection and occurrence of infections at respective places of service. <strong>Methods:</strong> Multicentric prospective cohort investigation survey conducted online at two levels of German EMS personnel—EMS managers and EMS employees, both medical and paramedical—with questions adapted slightly to fit the respective study population. <strong>Results:</strong> A total of 34 responses were received in the managerial group;a total of 2389 responses were received in the group of employees. Self-reported PPE adherence of EMS employees for confirmed SARS-CoV-2 positive patients: use of gloves (99.8%), FFP2 or FFP3 masks (99.8%), gowns or coveralls (99.1%), goggles (89.7%), face shields (24.0%), surgical masks (0.0%). Self-reported PPE adherence of EMS employees for suspected SARS-CoV-2 positive patients: gloves (98.8%), FFP2 or FFP3 masks (total: 99.4%), gowns or coveralls (total: 95.9%), goggles (85.6%), face shields (19.2%), surgical masks (0.2%). <strong>Conclusions:</strong> Findings included an overall improved self-reported adherence to PPE compared to studies that were conducted before the pandemic. Self-reported general adherence to PPE recommendations when attending to confirmed SARS-CoV-2 positive patients was good, with the exception of goggles. Self-reported adherence to PPE recommendations dropped when attending to suspected SARS-CoV-2 positive patients.展开更多
The environmental damage arising from the construction and engineering services was responsible for the appearance of several norms and resolutions regulating and directing the sector’s performance. In this article, ...The environmental damage arising from the construction and engineering services was responsible for the appearance of several norms and resolutions regulating and directing the sector’s performance. In this article, we research how professionals with experience in public bids assess the difficulty degree of the implementation of those requirements and how they assess the environmental legislation regarding the protection and conservation of the environment, impact on costs, deadlines and the solution to environmental problems. The results show that industry professionals consider as “high” the level of difficulty to implement the addressed sustainability requirements, and that the Brazilian environmental legislation does not comply with its environmental protection role, increases the possibility of delays and costs of projects and services and hampers the emergence of solutions that could solve environmental problems.展开更多
Cyber attacks are continuing to hamper working of Internet services despite increase in the use of network security systems such as, firewalls and Intrusion protection systems (IPS). Recent Denial of Service (DoS) att...Cyber attacks are continuing to hamper working of Internet services despite increase in the use of network security systems such as, firewalls and Intrusion protection systems (IPS). Recent Denial of Service (DoS) attack on Independence Day weekend, on July 4th, 2009 launched to debilitate the US and South Korean governments’ websites is indicative of the fact that the security systems may not have been adequately deployed to counteract such attacks. IPS is a vital security device which is commonly used as a front line defense mechanism to defend against such DoS attacks. Before deploying a firewall or an IPS device for network protection, in many deployments, the performance of firewalls is seldom evaluated for their effectiveness. Many times, these IPS’s can become bottleneck to the network performance and they may not be effective in stopping DoS attacks. In this paper, we intend to drive the point that deploying IPS may not always be effective in stopping harmful effects of DoS attacks. It is important to evaluate the capability of IPS before they are deployed to protect a network or a server against DoS attacks. In this paper, we evaluate performance of a commercial grade IPS Cisco ASA-5510 IPS to measure its effectiveness in stopping a DoS attacks namely TCP-SYN, UDP Flood, Ping Flood and ICMP Land Attacks. This IPS comes with features to counteract and provide security against these attacks. Performance of the IPS is measured under these attacks protection and compared with its performance when these protection features were not available (i.e. disabled). It was found that the IPS was unable to provide satisfactory protection despite the availability of the protection features against these flooding attacks. It is important for the network managers to measure the actual capabilities of an IPS system before its deployment to protect critical information infrastructure.展开更多
基金a phased achievement of the National Social Science Foundation’s major bidding project “Research on the Theoretical System and Optimization Path of China’s Human Rights Development Path”(Project Approval Number 23ZDA067)
文摘In the new era,the Communist Party of China(CPC)has made historic achievements in respecting and protecting human rights.Building upon the principle of the“two integrations”(integrating the basic tenets of Marxism with China’s specific realities and fine traditional culture),it has nurtured new theories on respecting and protecting human rights in the new era,which can address the fundamental questions of whom and what the human rights protection efforts in the new era are for.Guided by the principle of“taking our own path,”it has charted a distinct course for the development of human rights,diverging from the Western approach.The CPC has maintained the unity between Party leadership and the respect for and protection of human rights,promoting progress in human rights through the pursuit of“high-quality development,”and ensuring various fundamental rights of the people through the rule of law.Building upon the past experience,the CPC has established the“source”of the institutional framework for respecting and protecting human rights in the new era,crafted the“body”of this institutional framework,and introduced its practical“application.”In promoting the comprehensive advancement of human rights protection,the CPC has facilitated the connotative development of human rights protection in China,empowering China in international human rights discourse,and contributing Chinese strength and wisdom to global human rights governance.
文摘This paper introduces the third party performance evaluation in the construction of demonstration area for modem public sports services in Changzhou through research methods such as literature, expert interview and case study, so as to promote the quality of demonstration area constructed for modem public sports services, truly show the social application value of the construction of demonstration area for modem public sports services, and achieve national fitness and the development of public sports.
基金financially supported by the National Natural Science Foundation of China(No.61303216,No.61272457,No.U1401251,and No.61373172)the National High Technology Research and Development Program of China(863 Program)(No.2012AA013102)National 111 Program of China B16037 and B08038
文摘With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services.
基金Supported by Guangxi Natural Sciences Funding Project
文摘90 counties (cities) in Guangxi Province being taken as the tested region,the ecosystem service value of those counties (cities) was measured with the data of land-using in 2005 by means of the Table of Terrestrial Ecosystem Services Value in China.The result indicated that the value of the ecosystem services per unit was divided into 3 categories:the first category with high ecosystem services value,the second category with medium ecosystem services value and the third category with low ecosystem services value.The region of the first category was mainly distributed in the mountain area of northern,northwestern,eastern and northeast part of Guangxi;the second category,in the hilly area of southern part and the mountain area in the southwestern part of Guangxi and the third category,in the basin area of central Guangxi,the karst area of western and northwestern Guangxi Province.
文摘Via database technology, a perfect lightning protection integrated service work platform is established, thereby realizing paperless data management of routine business.
基金supported by the National Natural Science Foundation of China(No.62001045)Beijing Municipal Natural Science Foundation(No.4214059)+1 种基金Fund of State Key Laboratory of IPOC(BUPT)(No.IPOC2021ZT17)Fundamental Research Funds for the Central Universities(No.2022RC09).
文摘Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to realize joint allocation of computing and connectivity resources in survivable inter-datacenter EONs,a survivable routing,modulation level,spectrum,and computing resource allocation algorithm(SRMLSCRA)algorithm and three datacenter selection strategies,i.e.Computing Resource First(CRF),Shortest Path First(SPF)and Random Destination(RD),are proposed for different scenarios.Unicast and manycast are applied to the communication of computing requests,and the routing strategies are calculated respectively.Simulation results show that SRMLCRA-CRF can serve the largest amount of protected computing tasks,and the requested calculation blocking probability is reduced by 29.2%,28.3%and 30.5%compared with SRMLSCRA-SPF,SRMLSCRA-RD and the benchmark EPS-RMSA algorithms respectively.Therefore,it is more applicable to the networks with huge calculations.Besides,SRMLSCRA-SPF consumes the least spectrum,thereby exhibiting its suitability for scenarios where the amount of calculation is small and communication resources are scarce.The results demonstrate that the proposed methods realize the joint allocation of computing and connectivity resources,and could provide efficient protection for services under single-link failure and occupy less spectrum.
文摘Scientific and technological services are necessary for strengthening agriculture.Under the new situation,agricultural research institutes should give full play to their advantages,strive to innovate scientific and technological services methods,and improve scientific and technological service levels.Combined with the practice of science and technology work of Institute of Plant Protection of Hebei Academy of Agricultural and Forestry Sciences,this paper made an in-depth analysis on the present situations and existing problems in the scientific and technological services of agricultural research institutes.Based on the analysis,it came up with recommendations including change ideological concepts,strengthening service awareness,adhering to people-oriented principle,enhancing the team building,improving mechanism construction,stimulating innovative vitality,exploring service methods,and enriching service connotation,so as to improve scientific and technological service works.
基金This work was supported in part by the National Natural Science Foundation of China(Nos.61272492 and 61572521),Shaanxi Province Natural Science Foundation of China(No.2015JM6353)and the Basic Foundation of Engineering University of CAPF(No.WJY201521).
文摘When the user getting location based services by the traditional technology,his location information of region is always be exposed.However,in modern mobile networks,even the current geographical region is a part of privacy information.To solve this problem,a new generalized k-anonymity location privacy protection scheme in location based services(LPPS-GKA)with the third trust servicer is proposed.And it can guarantee the users get good location-based services(LBS)without leaking the information of the geo-location region,which has protected the perfect privacy.Analysis shows that LPPS-GKA is more secure in protecting location privacy,including region information,and is more efficient than other similar schemes in computational and communicational aspects.It is suitable for dynamic environment for different user’s various privacy protection requests.
基金a research result of the major planning project of Renmin University of China“History of Thoughts on Human Rights in China”(20XNLG02)
文摘The Communist Party of China has been concerned with the protection of the rights and interests of persons with disabilities since its founding.in the period of the new democratic Revolution and after the founding of the People’s Republic of China,it adopted a series of protective measures in various forms in line with local conditions.Since the reform and opening-up,the cause of persons with disabilities has developed in an all-around way under the leadership of the CPC.especially since the 18th national Congress of the Communist Party of China,the protection of human rights for persons with disabilities has been innovatively developed,and persons with disabilities have been truly participating in social affairs and share the country’s development gains as equal subjects of rights.The centennial history of the Party’s protection of the rights and interests of persons with disabilities shows that the CPC’s ideas of human rights protection consecutively comprise humanitarian assistance,humanitarian protection,and people-centered human rights protection.The main identity of persons with disabilities has changed from the object of protection during the revolution to the object of medical care and social welfare,and the subject of human rights.The content of protection of rights and interests has developed from survival assistance to comprehensive protection including education,rehabilitation,employment,etc.The dignity,autonomy,equality,and social participation of persons with disabilities as the subject of human rights have become increasingly prominent.
文摘Protection of criminals' human rights is an important issue that has received full atten- tion at home and abroad. The Communist Party of China (CPC) has always attached much importance to the protection of criminals' human rights. Since the founding of New China, the Party and the state have paid full attention to protecting the human rights of criminals.
基金This work has been partly supported by the National Natural Science Foundation of China under Grant No.61702212the Fundamental Research Funds for the Central Universities under Grand NO.CCNU19TS017.
文摘With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data.
基金Under the auspices of the Key B Item of the Chinese Academy of Sciences(KZ951-B1-201-02).
文摘The estimated total area of wetland in China is more than 25.9 million hectares including about 11.9 million hectares of marshes and bogs, 9.1 million hectares of lake and about 2.2 million hectares of coastal salt marshes and mudflats. The area of wetland is equivalent to 2.7% of the land surface. China also has 2.7 million hectares of shallow sea water (less 5m in depth at low tide). Marshes and bogs are equivalent 1.3% of the land surface. Only three provinces(regions)— Qinghai, Xizang (Tibet)and Heilongjiang— have a larger total area of marsh and bog. According to the structure, type and development of wetland in different river basins, wetland can be classified nine main regions. The experiments indicate that the coefficient of the marsh to regulate flood is similar to that of lakes. Wetlands occupy 17.8% of the Sanjiang Plain area, the annual carbon contribution is 0.78× 104t. Carbon released from marsh soil return into atmosphere is 3.95× 106t/a. At present there is a sharp contradiction between population growth and natural resources shortage, causing wetland to be exerted with huge pressures and serious threats.
文摘With the massive increase of digital resource based on the network,it becomes very important that how to help readers acquire the information needed according to the individualized requirement and interest in an accurate,convenient and prompt method. Therefore,it is very urgent to investigate individualized information service of library. In this paper,based on the development of the individualized information service for the reader in the college library,the individualized information service is clarified by using three perspectives,including establishment of individualized information demand model,integration of internal and external resource and protection of the reader privacy. Finally,the corresponding strategy and related measure are presented.
文摘The report of the 19th National Congress of the Communist Party of China stated that it was necessary to establish and practice the concept that lucid waters and lush mountains are invaluable assets,treat the ecological environment as life,and coordinate the management of mountains,rivers,forests,farmlands,lakes and grasslands.In recent years,China has organized a series of pilot projects for the ecological protection and restoration of mountains,rivers,forests,farmlands,lakes and grasslands,breaking the boundary between administrative divisions,departmental management and ecological elements,and implementing conservation and restoration oriented towards the improvement of ecosystem services,so as to solve the problem of the lack of overall planning for ecological protection and restoration projects and the separated management of ecological elements.This study systematically elaborated the theoretical basis and connotation characteristics of ecological protection and restoration of mountains,rivers,forests,farmlands,lakes and grasslands.It proposed the implementation path of ecological protection and restoration project of mountains,rivers,forests,farmlands,lakes and grasslands by taking the water source conservation area of Beijing-Tianjin-Hebei as a case,so as to provide reference for the implementation and decision-making management of ecological protection and restoration projects in various regions.
基金supported by the Open Fund Project of the Key Laboratory of Desert and Desertification,Chinese Academy of Sciences(No.KLDD-2014-001)the Important Specialized Science and Technology Item of Shanxi Province,China(No.20121101011)the Natural Science Foundation of China(Nos.41271513,41271030)
文摘Human activities such as the implementation of ecological protection projects and expansion of construction land can cause complex land use changes that affect ecosystem service values (ESV). In this study, we investigated changes in ESV in response to land use changes in Ningwu County, in eastern Loess Plateau of China. Our aim is to provide guidance for sustainable land use planning in this region. We used remote sensing to evaluate land use changes, and applied a fast, proxy-based method for evaluating ESVat three points in time: 1990, 2000, and 2010. More than 89% of the total ESV in Ningwu County was attributable to woodland and grassland. The ESV in western mountain areas show the greatest increase from 1990 to 2010, but ESV decreased the most in the low-elevation northeastern area of flat terrain These tradeoffs led to a slight net decrease (1.0%) in Ningwu County's total ESV. Although the decline in ESV was relatively low compared to the rate of economic growth, total ESV was much lower than global and national average levels at the end of the study period.
基金National Natural Science Foundation of China(No.50777040)
文摘In order to meet the requirements of information exchange varieties and manners in wide area protection system, a communication service model based on IEC 61850 is proposed. This service model can realize communication consistency and cooperation between different types of devices. Furthermore, the communication reliability and time delay performance are guaranteed to meet the requirements of relay protection from the upper layer. Message structure of generic sub-station event (GSE) and its communication mechanism are discussed. General methods to communicate digital information by generic substation status event (GSSE) and communicate analog sampling information by sampling analog value (SAV) of GSE are proposed.
文摘<strong>Background:</strong> Multicentric prospective cohort investigation survey conducted between 1<sup>st</sup> of March and 1<sup>st</sup> of April 2021on SARS-CoV-2 occupational risk for German Emergency Medical Services (EMS) personnel. <strong>Study Objectives: Primary:</strong> The objective is to take stock of the use and availability of Personal Protective Equipment (PPE) in German EMS, both at managerial and employee level, during the SARS-CoV-2 pandemic. <strong>Secondary:</strong> Generate additional data on individual perceptions of risk of infection and occurrence of infections at respective places of service. <strong>Methods:</strong> Multicentric prospective cohort investigation survey conducted online at two levels of German EMS personnel—EMS managers and EMS employees, both medical and paramedical—with questions adapted slightly to fit the respective study population. <strong>Results:</strong> A total of 34 responses were received in the managerial group;a total of 2389 responses were received in the group of employees. Self-reported PPE adherence of EMS employees for confirmed SARS-CoV-2 positive patients: use of gloves (99.8%), FFP2 or FFP3 masks (99.8%), gowns or coveralls (99.1%), goggles (89.7%), face shields (24.0%), surgical masks (0.0%). Self-reported PPE adherence of EMS employees for suspected SARS-CoV-2 positive patients: gloves (98.8%), FFP2 or FFP3 masks (total: 99.4%), gowns or coveralls (total: 95.9%), goggles (85.6%), face shields (19.2%), surgical masks (0.2%). <strong>Conclusions:</strong> Findings included an overall improved self-reported adherence to PPE compared to studies that were conducted before the pandemic. Self-reported general adherence to PPE recommendations when attending to confirmed SARS-CoV-2 positive patients was good, with the exception of goggles. Self-reported adherence to PPE recommendations dropped when attending to suspected SARS-CoV-2 positive patients.
文摘The environmental damage arising from the construction and engineering services was responsible for the appearance of several norms and resolutions regulating and directing the sector’s performance. In this article, we research how professionals with experience in public bids assess the difficulty degree of the implementation of those requirements and how they assess the environmental legislation regarding the protection and conservation of the environment, impact on costs, deadlines and the solution to environmental problems. The results show that industry professionals consider as “high” the level of difficulty to implement the addressed sustainability requirements, and that the Brazilian environmental legislation does not comply with its environmental protection role, increases the possibility of delays and costs of projects and services and hampers the emergence of solutions that could solve environmental problems.
文摘Cyber attacks are continuing to hamper working of Internet services despite increase in the use of network security systems such as, firewalls and Intrusion protection systems (IPS). Recent Denial of Service (DoS) attack on Independence Day weekend, on July 4th, 2009 launched to debilitate the US and South Korean governments’ websites is indicative of the fact that the security systems may not have been adequately deployed to counteract such attacks. IPS is a vital security device which is commonly used as a front line defense mechanism to defend against such DoS attacks. Before deploying a firewall or an IPS device for network protection, in many deployments, the performance of firewalls is seldom evaluated for their effectiveness. Many times, these IPS’s can become bottleneck to the network performance and they may not be effective in stopping DoS attacks. In this paper, we intend to drive the point that deploying IPS may not always be effective in stopping harmful effects of DoS attacks. It is important to evaluate the capability of IPS before they are deployed to protect a network or a server against DoS attacks. In this paper, we evaluate performance of a commercial grade IPS Cisco ASA-5510 IPS to measure its effectiveness in stopping a DoS attacks namely TCP-SYN, UDP Flood, Ping Flood and ICMP Land Attacks. This IPS comes with features to counteract and provide security against these attacks. Performance of the IPS is measured under these attacks protection and compared with its performance when these protection features were not available (i.e. disabled). It was found that the IPS was unable to provide satisfactory protection despite the availability of the protection features against these flooding attacks. It is important for the network managers to measure the actual capabilities of an IPS system before its deployment to protect critical information infrastructure.