In the present paper, the problem of sidebranches in the binary dendritic growth with enforced flow is studied. The positions of the first sidebranch and spacing of dendritic sidebranches are presented. For the neutra...In the present paper, the problem of sidebranches in the binary dendritic growth with enforced flow is studied. The positions of the first sidebranch and spacing of dendritic sidebranches are presented. For the neutral stable mode of dendritic growth, effects of various parameters on sidebranches are analysed. Our result shows that sidebranches are produced behind a critical point ξC′.展开更多
The tire-road friction coefficient(TRFC)plays a critical role in vehicle safety and dynamic stability,with model-based approaches being the primary method for TRFC estimation.However,the accuracy of these methods is o...The tire-road friction coefficient(TRFC)plays a critical role in vehicle safety and dynamic stability,with model-based approaches being the primary method for TRFC estimation.However,the accuracy of these methods is often constrained by the complexity of tire force expressions and uncertainties in tire model parameters,particularly under diverse and complex driving conditions.To address these challenges,this paper proposes a novel data enforced unscented Kalman filter(DeUKF)approach for precise TRFC estimation in intelligent chassis systems.First,an Unscented Kalman Filter is constructed using a nominal tire model-based vehicle dynamics formulation.Then,leveraging Willems’Fundamental Lemma and historical real-world driving data,the vehicle dynamics model is adap-tively corrected within the Unscented Kalman Filter framework.This correction effectively mitigates the adverse effects of tire model uncertainties,thereby enhancing TRFC estimation accuracy.Finally,real vehicle experiments are conducted to validate the effectiveness and superiority of the proposed method.展开更多
Non-selective hunting of waterbirds poses a significant challenge in biodiversity-rich areas such as Important Bird Areas (IBAs), where protected and game species congregate. Here, we present evidence from three conse...Non-selective hunting of waterbirds poses a significant challenge in biodiversity-rich areas such as Important Bird Areas (IBAs), where protected and game species congregate. Here, we present evidence from three consecutive hunting seasons spanning autumn 2021 to spring 2024 at a Natura 2000 site in western Poland, based on analyses of hunting bag photographs, local hunting records, and standardized bird monitoring data. We recorded 1331 hunted individuals from 14 species, 43% of which are protected under national or EU legislation. Among these was the Vulnerable Common Pochard (Aythya ferina), listed on the IUCN Red List. For nearly all species, harvest rates exceeded the sustainable thresholds defined by BirdLife International. Statistical comparisons between species' environmental abundance and their representation in hunting bags indicated no selectivity in shooting, pointing to indiscriminate hunting practices. Simultaneous waterbird monitoring (2018–2024) revealed steep declines in the local waterbird community and a marked decrease in Common Crane (Grus grus) numbers, with average autumn roost counts dropping from over 2000 individuals prior to hunting to 320 during hunting seasons. Although causality cannot be directly confirmed, these patterns suggest substantial disturbance effects. Our findings demonstrate the impracticality of selective hunting in species-rich wetland refuges and highlight the systematic killing of protected species. We recommend banning waterbird hunting in IBAs and implementing mandatory bird identification training and certification for hunters to reduce unintended impacts on vulnerable species.展开更多
This study examines the role of village regulations within China’s Litigation Source Governance(LSG)framework,specifically analyzing Tianjin Municipality’s 2023 Model Village Regulations.Employing legal analysis and...This study examines the role of village regulations within China’s Litigation Source Governance(LSG)framework,specifically analyzing Tianjin Municipality’s 2023 Model Village Regulations.Employing legal analysis and Natural Language Processing(NLP)techniques,the research evaluates the effectiveness,enforceability,and thematic orientation of these regulations in grassroots dispute resolution.Findings reveal a pronounced reliance on moral governance provisions,limited judicial recognition,and significant implementation challenges due to the predominance of non-binding(soft)clauses.The study recommends enhancing judicial recognition through formal confirmation mechanisms,increasing legally binding clauses,and integrating village-level governance more closely with formal judicial processes.This approach not only strengthens local governance but also provides valuable insights for nationwide replication,supporting broader goals of rural stability and governance modernization.展开更多
The Swiss-Ghana Amendments to the Basel Convention mark a significant milestone in global e-waste(electronic waste)management,requiring Prior Informed Consent(PIC)for all transboundary movements of Waste Electrical an...The Swiss-Ghana Amendments to the Basel Convention mark a significant milestone in global e-waste(electronic waste)management,requiring Prior Informed Consent(PIC)for all transboundary movements of Waste Electrical and Electronic Equipment(WEEE),regardless of their hazard classification.However,developing nations encounter substantial challenges in adhering to these amendments due to regulatory gaps,limited infrastructure,and an increasing influx of illicit e-waste imports.This study uses Malaysia as a case study to evaluate the readiness of developing nations to implement amendments,highlighting transferable solutions and recommendations.This study employs a mixedmethods approach that combines qualitative thematic analysis and bibliometric mapping to analyze academic literature,official reports,and international case studies.The findings reveal that while Malaysia has foundational policies in place,significant challenges remain in addressing informal recycling practices,improving enforcement mechanisms,and building the institutional capacity to implement PIC procedures effectively.This study identifies key areas for improvement,including regulatory reforms,infrastructure development,and enhanced monitoring systems.To address these issues,this study proposes a six-key Integrated Decision Framework that emphasizes legislative and regulatory updates,infrastructure development,international cooperation,capacity building and training,public awareness and engagement,and robust monitoring and enforcement mechanisms.Although tailored to Malaysia,the framework offers transferable solutions to align e-waste management systems with the Swiss-Ghana Amendments,providing a pathway for developing nations to strengthen regulatory readiness,mitigate environmental risks,and contribute to global sustainability.展开更多
In the management of land resources and the protection of cultivated land,the law enforcement of land satellite images is often used as one of the main means.In recent years,the policies and regulations of the law enf...In the management of land resources and the protection of cultivated land,the law enforcement of land satellite images is often used as one of the main means.In recent years,the policies and regulations of the law enforcement of land satellite images have become more and more strict and been adjusted increasingly frequently,playing a decisive role in preventing excessive non-agricultural and non-food urbanization.In the process of the law enforcement,the extraction of suspected illegal buildings is the most important and time-consuming content.Compared with the traditional deep learning model,fully convolutional networks(FCN)has a great advantage in remote sensing image processing because its input images are not limited by size,and both convolution and deconvolution are independent of the overall size of images.In this paper,an intelligent extraction model of suspected illegal buildings from land satellite images based on deep learning FCN was built.Kaiyuan City,Yunnan Province was taken as an example.The verification results show that the global accuracy of this model was 86.6%in the process of building extraction,and mean intersection over union(mIoU)was 73.6%.This study can provide reference for the extraction of suspected illegal buildings in the law enforcement work of land satellite images,and reduce the tedious manual operation to a certain extent.展开更多
The China National Committee on Ageing recently announced the revision of the law which protects the rights of elderly people was completed. Among the revised sections,a provision that grown-up children will have to v...The China National Committee on Ageing recently announced the revision of the law which protects the rights of elderly people was completed. Among the revised sections,a provision that grown-up children will have to visit society’s elderly seniors more often was included in the draft law.展开更多
Speeding in a work zone needs to be tackled effectively to enhance work zone safety. This study evaluates the influence of three different work zone signs—speed photo enforced signs, dynamic speed display signs and r...Speeding in a work zone needs to be tackled effectively to enhance work zone safety. This study evaluates the influence of three different work zone signs—speed photo enforced signs, dynamic speed display signs and reduced speed limit signs—on driver speeding behavior using a medium-fidelity driving simulator. The speed photo enforced and reduced speed limit signs were placed at intervals before the start of the work zone and in the work zone. A virtual work zone network was built to replicate the Baltimore–Washington Parkway(MD-295). A total of 66 participants from different socioeconomic backgrounds participated in 264 driving simulation sessions. The speeds were measured over four phases: initial speed area, sign visible area, sign readable area and post sign area. An analysis of variance and post hoc analysis showed that the speed photo enforced sign was the most effective of the three signs. The second speed photo enforced sign within the work zone was more effective at reducing speed than the sign before the start of the work zone, especially in the post sign area. It was observed that female participants tend to slow down more when encountering a speed photo enforcement sign.展开更多
The slippery slope framework explains tax compliance along two main dimensions,trust in authorities and power of authorities,which influence taxpayers’compliance attitudes.Through frequentist and Bayesian analyses,we...The slippery slope framework explains tax compliance along two main dimensions,trust in authorities and power of authorities,which influence taxpayers’compliance attitudes.Through frequentist and Bayesian analyses,we investigated the framework’s assumptions on a sample of 2786 self-employed taxpayers from eleven post-communist and non-post-communist countries doing business in five economic branches.After using scenarios that experimentally manipulated trust and power,our results confirmed the framework’s assumptions regarding the attitudes of the self-employed taxpayers;trust and power fostered intended tax compliance and diminished tax evasion,trust boosted voluntary tax compliance,whereas power increased enforced tax compliance.Additionally,self-employed taxpayers from post-communist countries reported higher intended tax compliance and lower tax evasion than those from non-post-communist countries.Our results offer tax authorities insights into how trust and power may contribute to obtaining and maintaining high tax compliance levels amid global economic challenges,downturns,and increasing tax compliance costs.展开更多
The main research purpose of this paper is to study the mechanical properties of the sand gravel packing of the retaining wall under the creep condition of reinforced materials, in order to figure it out, Indoor physi...The main research purpose of this paper is to study the mechanical properties of the sand gravel packing of the retaining wall under the creep condition of reinforced materials, in order to figure it out, Indoor physical experiments were carried out.展开更多
Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents ne...Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents need interaction and communication to achieve their overall goal. Coordination technologies for the Internet typically are concerned with enabling interaction among agents and helping them cooperate with each other. At the same time, access control should also be considered to constrain interaction to make it harmless. Access control should be regarded as the security counterpart of coordination. At present, the combination of coordination and access control remains an open problem. Thus, we propose a role Dased coordination model with policy enforcement in agent application systems. In this model, coordination is combined with access control so as to fully characterize the interactions in agent systems. A set of agents interacting with each other for a common global system task constitutes a coordination group. Role based access control is applied in this model to prevent unauthorized accesses. Coordination policy is enforced in a distributed manner so that the model can be applied to the open distributed systems such as Internet. An Internet online auction system is presented as a case study to illustrate the proposed coordination model and finally the performance analysis of the model is introduced.展开更多
Containerization is a fundamental component of modern cloud-native infrastructure,and Kubernetes is a prominent platform of container orchestration systems.However,containerization raises significant security concerns...Containerization is a fundamental component of modern cloud-native infrastructure,and Kubernetes is a prominent platform of container orchestration systems.However,containerization raises significant security concerns due to the nature of sharing a kernel among multiple containers,which can lead to container breakout or privilege escalation.Kubernetes cannot avoid it as well.While various tools,such as container image scanning and configuration checking,can mitigate container workload vulnerabilities,these are not foolproof and cannot guarantee perfect isolation or prevent every active threat in runtime.As such,a policy enforcement solution is required to tackle the problem,and existing solutions based on LSM(Linux Security Module)frameworks may not be adequate for some situations.To address this,we propose an enforcement system based on BPF-LSM,which leverages eBPF(extended Berkeley Packet Filter)technology to provide fine-grained control and dynamic adoption of security policies.In this paper,we compare different LSM implementations to highlight the challenges of current enforcement solutions before detailing the design of our eBPF-based Kubernetes Runtime Instrumentation and Enforcement System(KRSIE).Finally,we evaluate the effectiveness of our system using a real-world scenario,as measuring the performance of a policy enforcement system is a complex task.Our results show that KRSIE can successfully control containers’behaviors using LSM hooks at container runtime,offering improved container security for cloud-native infrastructure.展开更多
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e...To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.展开更多
Sustainable reclamation practices for large surface coal mines in USA semiarid environment contribute to the quality of the environmental on a long term basis where environmental resources are protected for future gen...Sustainable reclamation practices for large surface coal mines in USA semiarid environment contribute to the quality of the environmental on a long term basis where environmental resources are protected for future generation.Land,after reclamation,must be suitable for the previous use of greatest economic or social values to the community area.In the semiarid climate of USA,non-developed land is mainly utilized for crops,grazing,and wildlife.Completion of various stages of the reclamation processes includes verifcation and approval of reclamation criteria and performance standards created by state agencies.The sustainable reclamation practices were investigated at the USA’s largest surface coal mine of the semiarid environment in Wyoming.These practices include building post-mining topography to the approximate original contour and reestablish a stable hydrologic system to drain surface water.All available spoil material is backflled and graded to achieve the post-mining topography which closely resembles the pre-mining topography.No overburden material or other coal waste material is left in stockpiles at the mine.Detailed planning until the end of mining,the knowledge of available volumes of suitable backfll material and soil is necessary for sustainable management practices.Diverse and permanent vegetation capable of stabilizing soil surfaces and capable of self-regeneration is established.Sustainable management of the reclamation efort is achieved by enforcement processes developed by the state and federal agencies.Monthly inspections of mining and reclamation operations and reviews of annual reports submitted by the operator help determine if the reclamation processes are occurring according to the permit plan.展开更多
The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic.In general,the mass–spring system is applied t...The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic.In general,the mass–spring system is applied to real-time cloth simulation with three types of springs.However,hard spring cloth simulation using the mass–spring system requires a small integration time-step in order to use a large stiffness coefficient.Furthermore,to obtain stable behavior,constraint enforcement is used instead of maintenance of the force of each spring.Constraint force computation involves a large sparse linear solving operation.Due to the large computation,we implement a cloth simulation using adaptive constraint activation and deactivation techniques that involve the mass-spring system and constraint enforcement method to prevent excessive elongation of cloth.At the same time,when the length of the spring is stretched or compressed over a defined threshold,adaptive constraint activation and deactivation method deactivates the spring and generate the implicit constraint.Traditional method that uses a serial process of the Central Processing Unit(CPU)to solve the system in every frame cannot handle the complex structure of cloth model in real-time.Our simulation utilizes the Graphic Processing Unit(GPU)parallel processing with compute shader in OpenGL Shading Language(GLSL)to solve the system effectively.In this paper,we design and implement parallel method for cloth simulation,and experiment on the performance and behavior comparison of the mass-spring system,constraint enforcement,and adaptive constraint activation and deactivation techniques the using GPU-based parallel method.展开更多
Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance;In order to proactively block such threats we need more integrated in...Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance;In order to proactively block such threats we need more integrated information security solution. To achieve this objective, we will analyze a real-world security platform, and focus on some key components Like, NAC, Firewall, and IPS/IDS then study their interaction in the perspective to propose a new security posture that coordinate and share security information between different network security components, using a central policy server that will be the NAC server or the PDP (the Policy Decision Point), playing an orchestration role as a central point of control. Finally we will conclude with potential research paths that will impact NAC technology evolution.展开更多
Albania is facing serious problems with the national food safety control system in terms of legislation, control and enforcement. The objective of this paper is to analyse consumer perceptions about safety of small ru...Albania is facing serious problems with the national food safety control system in terms of legislation, control and enforcement. The objective of this paper is to analyse consumer perceptions about safety of small ruminant meat in Tirana, in a context of weak enforcement of the food safety system. Applying two-step clustering analyses, consumers were classified in four socio-demographic clusters, and it was found that the cluster composed of female consumers with lower education and income levels, and the two clusters composed of male consumers perceive consumed meat as safe. Consumers in the cluster composed of females with university education and higher income are, on average, more concerned with current meat safety measures and tend to place more trust in the veterinarian stamp on meat carcasses rather than in local butchers.展开更多
China is one of the major markets for patent filing and patent exploitation.A powerful enforcement environment may boost both of patent filing and exploitation.A two-track system for the patent enforcement is availabl...China is one of the major markets for patent filing and patent exploitation.A powerful enforcement environment may boost both of patent filing and exploitation.A two-track system for the patent enforcement is available in China:the administrative system via local intellectual property offices,and the judicial system via courts.展开更多
基金Project supported by the High Technology Research and Development Programme of China (Grant No. 2007AA03Z108)
文摘In the present paper, the problem of sidebranches in the binary dendritic growth with enforced flow is studied. The positions of the first sidebranch and spacing of dendritic sidebranches are presented. For the neutral stable mode of dendritic growth, effects of various parameters on sidebranches are analysed. Our result shows that sidebranches are produced behind a critical point ξC′.
基金Supported by the China’s National Key R&D Program(Grant No.2022YFB2503103).
文摘The tire-road friction coefficient(TRFC)plays a critical role in vehicle safety and dynamic stability,with model-based approaches being the primary method for TRFC estimation.However,the accuracy of these methods is often constrained by the complexity of tire force expressions and uncertainties in tire model parameters,particularly under diverse and complex driving conditions.To address these challenges,this paper proposes a novel data enforced unscented Kalman filter(DeUKF)approach for precise TRFC estimation in intelligent chassis systems.First,an Unscented Kalman Filter is constructed using a nominal tire model-based vehicle dynamics formulation.Then,leveraging Willems’Fundamental Lemma and historical real-world driving data,the vehicle dynamics model is adap-tively corrected within the Unscented Kalman Filter framework.This correction effectively mitigates the adverse effects of tire model uncertainties,thereby enhancing TRFC estimation accuracy.Finally,real vehicle experiments are conducted to validate the effectiveness and superiority of the proposed method.
文摘Non-selective hunting of waterbirds poses a significant challenge in biodiversity-rich areas such as Important Bird Areas (IBAs), where protected and game species congregate. Here, we present evidence from three consecutive hunting seasons spanning autumn 2021 to spring 2024 at a Natura 2000 site in western Poland, based on analyses of hunting bag photographs, local hunting records, and standardized bird monitoring data. We recorded 1331 hunted individuals from 14 species, 43% of which are protected under national or EU legislation. Among these was the Vulnerable Common Pochard (Aythya ferina), listed on the IUCN Red List. For nearly all species, harvest rates exceeded the sustainable thresholds defined by BirdLife International. Statistical comparisons between species' environmental abundance and their representation in hunting bags indicated no selectivity in shooting, pointing to indiscriminate hunting practices. Simultaneous waterbird monitoring (2018–2024) revealed steep declines in the local waterbird community and a marked decrease in Common Crane (Grus grus) numbers, with average autumn roost counts dropping from over 2000 individuals prior to hunting to 320 during hunting seasons. Although causality cannot be directly confirmed, these patterns suggest substantial disturbance effects. Our findings demonstrate the impracticality of selective hunting in species-rich wetland refuges and highlight the systematic killing of protected species. We recommend banning waterbird hunting in IBAs and implementing mandatory bird identification training and certification for hunters to reduce unintended impacts on vulnerable species.
基金Tianjin Education Commission Research Program,Humanities and Social Sciences,(Project No.:2022SK064)Innovation Training Program at Tianjin Normal University in 2024,“Research on the Function of Rural Norms in Source Governance of Disputes from the Perspective of Rural Revitalization”(Project No.:202410065027)。
文摘This study examines the role of village regulations within China’s Litigation Source Governance(LSG)framework,specifically analyzing Tianjin Municipality’s 2023 Model Village Regulations.Employing legal analysis and Natural Language Processing(NLP)techniques,the research evaluates the effectiveness,enforceability,and thematic orientation of these regulations in grassroots dispute resolution.Findings reveal a pronounced reliance on moral governance provisions,limited judicial recognition,and significant implementation challenges due to the predominance of non-binding(soft)clauses.The study recommends enhancing judicial recognition through formal confirmation mechanisms,increasing legally binding clauses,and integrating village-level governance more closely with formal judicial processes.This approach not only strengthens local governance but also provides valuable insights for nationwide replication,supporting broader goals of rural stability and governance modernization.
基金support through an MTUN matching grant[Grant No.INDUSTRI(MTUN)/MEGATRAX/2024/FTKIP/I00089]supported by the Kesidang Scholarship awarded by UTeM to the main author.
文摘The Swiss-Ghana Amendments to the Basel Convention mark a significant milestone in global e-waste(electronic waste)management,requiring Prior Informed Consent(PIC)for all transboundary movements of Waste Electrical and Electronic Equipment(WEEE),regardless of their hazard classification.However,developing nations encounter substantial challenges in adhering to these amendments due to regulatory gaps,limited infrastructure,and an increasing influx of illicit e-waste imports.This study uses Malaysia as a case study to evaluate the readiness of developing nations to implement amendments,highlighting transferable solutions and recommendations.This study employs a mixedmethods approach that combines qualitative thematic analysis and bibliometric mapping to analyze academic literature,official reports,and international case studies.The findings reveal that while Malaysia has foundational policies in place,significant challenges remain in addressing informal recycling practices,improving enforcement mechanisms,and building the institutional capacity to implement PIC procedures effectively.This study identifies key areas for improvement,including regulatory reforms,infrastructure development,and enhanced monitoring systems.To address these issues,this study proposes a six-key Integrated Decision Framework that emphasizes legislative and regulatory updates,infrastructure development,international cooperation,capacity building and training,public awareness and engagement,and robust monitoring and enforcement mechanisms.Although tailored to Malaysia,the framework offers transferable solutions to align e-waste management systems with the Swiss-Ghana Amendments,providing a pathway for developing nations to strengthen regulatory readiness,mitigate environmental risks,and contribute to global sustainability.
文摘In the management of land resources and the protection of cultivated land,the law enforcement of land satellite images is often used as one of the main means.In recent years,the policies and regulations of the law enforcement of land satellite images have become more and more strict and been adjusted increasingly frequently,playing a decisive role in preventing excessive non-agricultural and non-food urbanization.In the process of the law enforcement,the extraction of suspected illegal buildings is the most important and time-consuming content.Compared with the traditional deep learning model,fully convolutional networks(FCN)has a great advantage in remote sensing image processing because its input images are not limited by size,and both convolution and deconvolution are independent of the overall size of images.In this paper,an intelligent extraction model of suspected illegal buildings from land satellite images based on deep learning FCN was built.Kaiyuan City,Yunnan Province was taken as an example.The verification results show that the global accuracy of this model was 86.6%in the process of building extraction,and mean intersection over union(mIoU)was 73.6%.This study can provide reference for the extraction of suspected illegal buildings in the law enforcement work of land satellite images,and reduce the tedious manual operation to a certain extent.
文摘The China National Committee on Ageing recently announced the revision of the law which protects the rights of elderly people was completed. Among the revised sections,a provision that grown-up children will have to visit society’s elderly seniors more often was included in the draft law.
基金the Maryland State Highway Association (SHA) for its funding support throughout the study
文摘Speeding in a work zone needs to be tackled effectively to enhance work zone safety. This study evaluates the influence of three different work zone signs—speed photo enforced signs, dynamic speed display signs and reduced speed limit signs—on driver speeding behavior using a medium-fidelity driving simulator. The speed photo enforced and reduced speed limit signs were placed at intervals before the start of the work zone and in the work zone. A virtual work zone network was built to replicate the Baltimore–Washington Parkway(MD-295). A total of 66 participants from different socioeconomic backgrounds participated in 264 driving simulation sessions. The speeds were measured over four phases: initial speed area, sign visible area, sign readable area and post sign area. An analysis of variance and post hoc analysis showed that the speed photo enforced sign was the most effective of the three signs. The second speed photo enforced sign within the work zone was more effective at reducing speed than the sign before the start of the work zone, especially in the post sign area. It was observed that female participants tend to slow down more when encountering a speed photo enforcement sign.
基金funded through the following research grants:Czech Science Foundation Project No.18-14082SUni-versity of Economics(Prague),Faculty of Finance and Accounting VSE Project No.IP 100040+1 种基金Science without Borders program no.229760/2013-9(CNPq—Brazilian National Council for Scientific and Technological Development)CAPES-PrInt Project No.88887.310237/2018-00“Cérebro,Cognição e Comportamento:Teoria e Aplicação para Inovação em Negócios”.
文摘The slippery slope framework explains tax compliance along two main dimensions,trust in authorities and power of authorities,which influence taxpayers’compliance attitudes.Through frequentist and Bayesian analyses,we investigated the framework’s assumptions on a sample of 2786 self-employed taxpayers from eleven post-communist and non-post-communist countries doing business in five economic branches.After using scenarios that experimentally manipulated trust and power,our results confirmed the framework’s assumptions regarding the attitudes of the self-employed taxpayers;trust and power fostered intended tax compliance and diminished tax evasion,trust boosted voluntary tax compliance,whereas power increased enforced tax compliance.Additionally,self-employed taxpayers from post-communist countries reported higher intended tax compliance and lower tax evasion than those from non-post-communist countries.Our results offer tax authorities insights into how trust and power may contribute to obtaining and maintaining high tax compliance levels amid global economic challenges,downturns,and increasing tax compliance costs.
文摘The main research purpose of this paper is to study the mechanical properties of the sand gravel packing of the retaining wall under the creep condition of reinforced materials, in order to figure it out, Indoor physical experiments were carried out.
文摘Coordination technology addresses the construction of open, flexible systems from active and independent software agents in concurrent and distributed systems. In most open distributed applications, multiple agents need interaction and communication to achieve their overall goal. Coordination technologies for the Internet typically are concerned with enabling interaction among agents and helping them cooperate with each other. At the same time, access control should also be considered to constrain interaction to make it harmless. Access control should be regarded as the security counterpart of coordination. At present, the combination of coordination and access control remains an open problem. Thus, we propose a role Dased coordination model with policy enforcement in agent application systems. In this model, coordination is combined with access control so as to fully characterize the interactions in agent systems. A set of agents interacting with each other for a common global system task constitutes a coordination group. Role based access control is applied in this model to prevent unauthorized accesses. Coordination policy is enforced in a distributed manner so that the model can be applied to the open distributed systems such as Internet. An Internet online auction system is presented as a case study to illustrate the proposed coordination model and finally the performance analysis of the model is introduced.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation (IITP)grant funded by the Korea Government (MSIT), (No.2020-0-00952,Development of 5G edge security technology for ensuring 5G+service stability and availability,50%)the Institute of Information and Communications Technology Planning and Evaluation (IITP)grant funded by the MSIT (Ministry of Science and ICT),Korea (No.IITP-2023-2020-0-01602,ITRC (Information Technology Research Center)support program,50%).
文摘Containerization is a fundamental component of modern cloud-native infrastructure,and Kubernetes is a prominent platform of container orchestration systems.However,containerization raises significant security concerns due to the nature of sharing a kernel among multiple containers,which can lead to container breakout or privilege escalation.Kubernetes cannot avoid it as well.While various tools,such as container image scanning and configuration checking,can mitigate container workload vulnerabilities,these are not foolproof and cannot guarantee perfect isolation or prevent every active threat in runtime.As such,a policy enforcement solution is required to tackle the problem,and existing solutions based on LSM(Linux Security Module)frameworks may not be adequate for some situations.To address this,we propose an enforcement system based on BPF-LSM,which leverages eBPF(extended Berkeley Packet Filter)technology to provide fine-grained control and dynamic adoption of security policies.In this paper,we compare different LSM implementations to highlight the challenges of current enforcement solutions before detailing the design of our eBPF-based Kubernetes Runtime Instrumentation and Enforcement System(KRSIE).Finally,we evaluate the effectiveness of our system using a real-world scenario,as measuring the performance of a policy enforcement system is a complex task.Our results show that KRSIE can successfully control containers’behaviors using LSM hooks at container runtime,offering improved container security for cloud-native infrastructure.
基金The National Key Research and Development Program of China(No.2019YFB1600200).
文摘To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.
文摘Sustainable reclamation practices for large surface coal mines in USA semiarid environment contribute to the quality of the environmental on a long term basis where environmental resources are protected for future generation.Land,after reclamation,must be suitable for the previous use of greatest economic or social values to the community area.In the semiarid climate of USA,non-developed land is mainly utilized for crops,grazing,and wildlife.Completion of various stages of the reclamation processes includes verifcation and approval of reclamation criteria and performance standards created by state agencies.The sustainable reclamation practices were investigated at the USA’s largest surface coal mine of the semiarid environment in Wyoming.These practices include building post-mining topography to the approximate original contour and reestablish a stable hydrologic system to drain surface water.All available spoil material is backflled and graded to achieve the post-mining topography which closely resembles the pre-mining topography.No overburden material or other coal waste material is left in stockpiles at the mine.Detailed planning until the end of mining,the knowledge of available volumes of suitable backfll material and soil is necessary for sustainable management practices.Diverse and permanent vegetation capable of stabilizing soil surfaces and capable of self-regeneration is established.Sustainable management of the reclamation efort is achieved by enforcement processes developed by the state and federal agencies.Monthly inspections of mining and reclamation operations and reviews of annual reports submitted by the operator help determine if the reclamation processes are occurring according to the permit plan.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF-2019R1F1A1062752)funded by the Ministry of Education+1 种基金funded by BK21 FOUR(Fostering Outstanding Universities for Research)(No.:5199990914048)supported by the Soonchunhyang University Research Fund.
文摘The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic.In general,the mass–spring system is applied to real-time cloth simulation with three types of springs.However,hard spring cloth simulation using the mass–spring system requires a small integration time-step in order to use a large stiffness coefficient.Furthermore,to obtain stable behavior,constraint enforcement is used instead of maintenance of the force of each spring.Constraint force computation involves a large sparse linear solving operation.Due to the large computation,we implement a cloth simulation using adaptive constraint activation and deactivation techniques that involve the mass-spring system and constraint enforcement method to prevent excessive elongation of cloth.At the same time,when the length of the spring is stretched or compressed over a defined threshold,adaptive constraint activation and deactivation method deactivates the spring and generate the implicit constraint.Traditional method that uses a serial process of the Central Processing Unit(CPU)to solve the system in every frame cannot handle the complex structure of cloth model in real-time.Our simulation utilizes the Graphic Processing Unit(GPU)parallel processing with compute shader in OpenGL Shading Language(GLSL)to solve the system effectively.In this paper,we design and implement parallel method for cloth simulation,and experiment on the performance and behavior comparison of the mass-spring system,constraint enforcement,and adaptive constraint activation and deactivation techniques the using GPU-based parallel method.
文摘Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance;In order to proactively block such threats we need more integrated information security solution. To achieve this objective, we will analyze a real-world security platform, and focus on some key components Like, NAC, Firewall, and IPS/IDS then study their interaction in the perspective to propose a new security posture that coordinate and share security information between different network security components, using a central policy server that will be the NAC server or the PDP (the Policy Decision Point), playing an orchestration role as a central point of control. Finally we will conclude with potential research paths that will impact NAC technology evolution.
基金partially based on a study(survey)that was commissioned by United Nations Development Program(UNDP)Project"Improving the Performance of the Livestock Sector in Albania"to provide inputs for their strategy to support the Albanian small ruminants sector.The study was developed/designed by the authors of this paper
文摘Albania is facing serious problems with the national food safety control system in terms of legislation, control and enforcement. The objective of this paper is to analyse consumer perceptions about safety of small ruminant meat in Tirana, in a context of weak enforcement of the food safety system. Applying two-step clustering analyses, consumers were classified in four socio-demographic clusters, and it was found that the cluster composed of female consumers with lower education and income levels, and the two clusters composed of male consumers perceive consumed meat as safe. Consumers in the cluster composed of females with university education and higher income are, on average, more concerned with current meat safety measures and tend to place more trust in the veterinarian stamp on meat carcasses rather than in local butchers.
文摘China is one of the major markets for patent filing and patent exploitation.A powerful enforcement environment may boost both of patent filing and exploitation.A two-track system for the patent enforcement is available in China:the administrative system via local intellectual property offices,and the judicial system via courts.