Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ...Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL.展开更多
In the new phase of sustainable development,agriculture is seeking sustainable management of the water-land-energy-economy-environment-food nexus.At present,there are few studies on optimizing crop planting structure ...In the new phase of sustainable development,agriculture is seeking sustainable management of the water-land-energy-economy-environment-food nexus.At present,there are few studies on optimizing crop planting structure and analyzing its spatial layout with consideration of natural and socio-economic factors.Herein,we proposed a framework for addressing this issue.In this framework,the NSGA-II algorithm was used to construct the multi-objective optimization model of crop planting structures with consideration of water and energy consumption,greenhouse gas(GHG)emissions,economic benefits,as well as food,land,and water security constraints,while the model for planting spatial layout optimization was established with consideration of crop suitability using the MaxEnt model and the improved Hungarian algorithm.This framework was further applied in the Black Soil Region of Northeast China(BSRNC)for analyzing optimized crop planting structures and spatial layouts of three main crops(rice,maize,and soybean)under various scenarios.This study showed that the sown area of rice in the BSRNC decreased by up to 40.73%and 35.30%in the environmental priority scenario and economic-environmental balance scenario,respectively,whereas that of soybean increased by up to 112.44%and 63.31%,respectively.In the economic priority scenario,the sown area of rice increased by up to 93.98%.Expanding the sown area of soybean was effective in reducing GHG emissions.On the contrary,rice production led to greater environmental costs though it provided higher economic returns.Among the three crops,maize exhibited an advantage in balancing environmental and economic benefits.Hegang-Jixi area in the northeast of the BSRNC was identified as the key area with the most intense crop planting transfer among different scenarios.Overall,this framework provides a new methodology for optimizing crop planting structures and spatial layouts with con-sideration of the nexus of various factors.Moreover,the case study demonstrates the applicability and expansion potential of the framework in the fields of sustainable agricultural development and food security assurance.展开更多
The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier sharehol...The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier shareholding structure is that the company issues two classes of shares with different voting rights.It enables the concentration and stabilization of corporate control,which has a positive effect on the long-term development of the company and resistance to hostile takeovers.Against the background of the rapid development of the capital market and the continuous innovation of corporate governance structure,the two-tier shareholding structure has begun to be adopted by many enterprises.While this structure can improve the efficiency of corporate governance and promote corporate growth,it also raises a number of challenges.In particular,for small and medium-sized shareholders,their shareholdings may face the problem of limited or no voting rights,as well as the lack of an effective internal and external monitoring mechanism for the company.These issues may lead to the impairment of the rights of small and medium-sized shareholders.Currently,challenges in practice include inadequate laws and regulations,insufficient disclosure of information,and inadequate monitoring mechanisms.Therefore,exploring the path to protect the rights and interests of small and medium-sized shareholders and analyzing their current situation has become an important area in the study of two-tier shareholding structures.This paper starts from the actual situation,analyzes the problems exposed in the operation process of two-tier shareholding structure,and then explores the practical and feasible methods to protect the rights and interests of small and medium-sized shareholders on this basis,with a view to putting forward valuable references for the development of China’s securities market.展开更多
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro...In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.展开更多
Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis...Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency.展开更多
BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hosp...BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hospitalization costs and structure,and explored the impact of China Healthcare Security Diagnosis Related Groups(CHS-DRG)management on patient costs.It aimed to provide medical institutions with ways to reduce costs,optimize cost structures,reduce patient burden,and improve service efficiency.AIM To study the CHS-DRG payment system’s impact on breast cancer surgery costs.METHODS Using the CHS-DRG(version 1.1)grouping criteria,4073 patients,who underwent the radical resection of breast malignant tumors from January to December 2023,were included in the JA29 group;1028 patients were part of the CHS-DRG payment system,unlike the rest.Through an independent sample t-test,the length of hospital stay as well as total hospitalization,medicine and consumables,medical,nursing,medical technology,and management expenses were compared.Pearson’s correlation coefficient was used to test the cost correlation.RESULTS In terms of hospitalization expenses,patients in the CHS-DRG payment group had lower medical,nursing,and management expenses than those in the diagnosis-related group(DRG)non-payment group.For patients in the DRG payment group,the factors affecting the total hospitalization cost,in descending order of relevance,were medicine and consumable costs,consumable costs,medicine costs,medical costs,medical technology costs,management costs,nursing costs,and length of hospital stay.For patients in the DRG nonpayment group,the factors affecting the total hospitalization expenses in descending order of relevance were medicines and consumable expenses,consumable expenses,medical technology expenses,the cost of medicines,medical expenses,nursing expenses,length of hospital stay,and management expenses.CONCLUSION The CHS-DRG system can help control and reduce unnecessary medical expenses by controlling medicine costs,medical consumable costs,and the length of hospital stay while ensuring medical safety.展开更多
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n...A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures.展开更多
BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers account...BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers accounted for the highest number of new cases.Real-world data(RWD)is now widely preferred to traditional clinical trials in various fields of medicine and healthcare,as the traditional research approach often involves highly selected populations and interventions and controls that are strictly regulated.Additionally,research results from the RWD match global reality better than those from traditional clinical trials.AIM To analyze the cost disparity between surgical treatments for liver and pancreatic cancer under various factors.METHODS This study analyzed RWD 1137 cases within the HB1 group(patients who underwent pancreatectomy,hepatectomy,and/or shunt surgery)in 2023.It distinguished different expenditure categories,including medical,nursing,technical,management,drug,and consumable costs.Additionally,it assessed the contribution of each expenditure category to total hospital costs and performed cross-group comparisons using the non-parametric Kruskal–Wallis test.This study used the Steel–Dwass test for post-hoc multiple comparisons and the Spearman correlation coefficient to examine the relationships between variables.RESULTS The study found that in HB11 and HB13,the total hospitalization costs were significantly higher for pancreaticoduodenectomy than for pancreatectomy and hepatectomy.Although no significant difference was observed in the length of hospital stay between patients who underwent pancreaticoduodenectomy and pancreatectomy,both were significantly longer than those who underwent liver resection.In HB15,no significant difference was observed in the total cost of hospitalization between pancreaticoduodenectomy and pancreatectomy;however,both were significantly higher than those in hepatectomy.Additionally,the length of hospital stay was significantly longer for patients who underwent pancreaticoduodenectomy than for those who underwent pancreatectomy or liver resection.CONCLUSION China Healthcare Security Diagnosis Related Groups payment system positively impacts liver and pancreatic cancer surgeries by improving medical quality and controlling costs.Further research could refine this grouping system and ensure continuous effectiveness and sustainability.展开更多
A large number of mathematical models were developed for supporting agricultural production structure optimization decisions; however, few of them can address various uncertainties existing in many factors (e.g., eco...A large number of mathematical models were developed for supporting agricultural production structure optimization decisions; however, few of them can address various uncertainties existing in many factors (e.g., eco-social benefit maximization, food security, employment stability and ecosystem balance). In this study, an interval-probabilistic agricultural production structure optimization model (IPAPSOM) is formulated for tackling uncertainty presented as discrete intervals and/or probability distribution. The developed model improves upon the existing probabilistic programming and inexact optimization approaches. The IPAPSOM considers not only food security policy constraints, but also involves rural households’income increase and eco-environmental conversation, which can effectively reflect various interrelations among different aspects in an agricultural production structure optimization system. Moreover, it can also help examine the reliability of satisfying (or risk of violating) system constraints under uncertainty. The model is applied to a real case of long-term agricultural production structure optimization in Dancheng County, which is located in Henan Province of Central China as one of the major grain producing areas. Interval solutions associated with different risk levels of constraint violation are obtained. The results are useful for generating a range of decision alternatives under various system benefit conditions, and thus helping decision makers to identify the desired agricultural production structure optimization strategy under uncertainty.展开更多
World Health Organization through tuberculosis (TB) control averted up to six million deaths and cured thirty-six million people in 1995-2008, but had less success in reducing TB incidence, especially in thirteen high...World Health Organization through tuberculosis (TB) control averted up to six million deaths and cured thirty-six million people in 1995-2008, but had less success in reducing TB incidence, especially in thirteen high burden countries, including Indonesia. Therefore, TB control will need to have more emphasis on the issues of social determinants, as social determinants affect TB’s incidence directly and/-or through TB’s risk factors. This study aimed to identify a significant effect of social determinants and the risk factors of TB incidence. The research setting was at twenty-seven primary health centers and one hospital that have implemented the Directly Observed Treatment Short Course (DOTS) strategy in Bandar Lampung municipality, Indonesia. Respondents of this research were 238 smear-positive TB patients as case group and 238 patients without TB as control group. Research variables consisted of “social determinants”, “housing condition”, “household food security” and “health access” which were set as latent variables and measured through their indicators. Data had been collected by using questionnaire and then was analyzed with Structural Equation Modeling using SmartPLS 2.0 software. The result showed that “social determinants” through “housing condition” and “household food security” affected “TB incidence”. Moreover, “social determinants”, “housing condition” and “household food security” can be used to explain 34.1% variation of “TB incidence”. In conclusion, the knowledge can be used to support the TB control program, particularly to implement the DOTS strategy together with improving social determinants, housing condition and household food security.展开更多
For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig...For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible.展开更多
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper an...This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.展开更多
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper an...This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.展开更多
Aiming to improve the Structured Query Language( SQL) injection penetration test accuracy through the formalismguided test case generation,an attack purpose based attack tree model of SQL injection is proposed,and the...Aiming to improve the Structured Query Language( SQL) injection penetration test accuracy through the formalismguided test case generation,an attack purpose based attack tree model of SQL injection is proposed,and then under the guidance of this model, the formal descriptions for the SQL injection vulnerability feature and SQL injection attack inputs are established. Moreover,according to new coverage criteria,these models are instantiated and the executable test cases are generated.Experiments show that compared with the random enumerated test case used in other works,the test case generated by our method can detect the SQL injection vulnerability more effectively. Therefore,the false negative is reduced and the test accuracy is improved.展开更多
Through overview of relevant literature and on the basis of basically grasping frontier study and development trend,this paper discussed the grain security from industrial structure,farmland protection,grain import,ur...Through overview of relevant literature and on the basis of basically grasping frontier study and development trend,this paper discussed the grain security from industrial structure,farmland protection,grain import,urbanization and industrialization,grain reserve,ecological protection,and grain security pre-warning,in the hope of providing some convenience and reference for future related researches.展开更多
Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack ...Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack on any system exploits some undesired (malicious or accidental) functionality in the components of the system. Unfortunately, it is far from practical to eliminate undesired functionality in every component of a system. The contribution of this paper is a novel architecture for securing SCADA systems that guarantee that “any malicious modification of the deployment configuration or the design configuration of the SCADA system will be detected”—even if undesired functionality may exist in SCADA system components.展开更多
The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:th...The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:the lack of accurate use of resources,the lack of protection of the mobile device from the overall point of view,the unclear division of responsibility among specialized agencies,and unclear members’responsibilities for their own duties.This study applies the structure behavior coalescence(SBC)methodology to integrate the organizational structure of the participating management and control units with effective management behaviors in a visualized and useful manner.The units can effectively communicate with each other and solve the four issues faced by the military barrack-areas for the control of mobile devices.This research fulfills improving the lack of control of the military mobile devices by using of management resources effectively and the establishment of mobile devices management with the overall concept,and strengthening the rights and responsibilities and information security awareness,through the logical verification and enterprise interview results.展开更多
With the continuous development of society, the number of civil engineering projects is also increasing with the development of society. Civil engineering safety management is a very important part of it. It is necess...With the continuous development of society, the number of civil engineering projects is also increasing with the development of society. Civil engineering safety management is a very important part of it. It is necessary to have a strong sense of safety management and ensure the structural safety of civil engineering so as to promote the rapid development of China's construction industry more effectively. To civil engineering structure security problems, in fact, is refers to the engineering structural indicators, the indicators including ability to resist collapse and corruption based on the external environment. And the indicators for the civil engineering construction are the core content. The corresponding indexes must be reached to ensure the civil engineering in the construction and in the later use process has no accidents. In the study of this paper, based on the actual situation of the safety of advanced civil construction structures in China, the possible problems in civil engineering design are discussed, and combined with specific investigation and analysis, according to the requirements of relevant indicators and relevant factors, put forward targeted countermeasures and suggestions for improvement.展开更多
With the continuous improvement of construction technology and construction level, the current development trend of construction is large-scale and high-rise. Based on this, the reliability requirements for buildings ...With the continuous improvement of construction technology and construction level, the current development trend of construction is large-scale and high-rise. Based on this, the reliability requirements for buildings are becoming higher and higher. There is a great relationship between the reliability in the design of building structures and the safety performance of buildings, so it is very necessary to carry out in-depth analysis and research to ensure the reliability of building structures and improve the safety factor. In this paper, the reliability factors affecting the design of building structures are analyzed and studied, and the influencing factors are optimized for reference by relevant practitioners.展开更多
基金supported by the Natural Science Foundation of China(No.U22A2099)the Innovation Project of Guangxi Graduate Education(YCBZ2023130).
文摘Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL.
基金funded by the Foundation for Innovative Research Groups of the National Natural Science Foundation of China(Grant No.72221002)the Strategic Priority Research Program of the Chinese Academy of Sciences(Grant No.XDA28060200)National Natural Science Foundation of Youth Project(Grant No.72303087).
文摘In the new phase of sustainable development,agriculture is seeking sustainable management of the water-land-energy-economy-environment-food nexus.At present,there are few studies on optimizing crop planting structure and analyzing its spatial layout with consideration of natural and socio-economic factors.Herein,we proposed a framework for addressing this issue.In this framework,the NSGA-II algorithm was used to construct the multi-objective optimization model of crop planting structures with consideration of water and energy consumption,greenhouse gas(GHG)emissions,economic benefits,as well as food,land,and water security constraints,while the model for planting spatial layout optimization was established with consideration of crop suitability using the MaxEnt model and the improved Hungarian algorithm.This framework was further applied in the Black Soil Region of Northeast China(BSRNC)for analyzing optimized crop planting structures and spatial layouts of three main crops(rice,maize,and soybean)under various scenarios.This study showed that the sown area of rice in the BSRNC decreased by up to 40.73%and 35.30%in the environmental priority scenario and economic-environmental balance scenario,respectively,whereas that of soybean increased by up to 112.44%and 63.31%,respectively.In the economic priority scenario,the sown area of rice increased by up to 93.98%.Expanding the sown area of soybean was effective in reducing GHG emissions.On the contrary,rice production led to greater environmental costs though it provided higher economic returns.Among the three crops,maize exhibited an advantage in balancing environmental and economic benefits.Hegang-Jixi area in the northeast of the BSRNC was identified as the key area with the most intense crop planting transfer among different scenarios.Overall,this framework provides a new methodology for optimizing crop planting structures and spatial layouts with con-sideration of the nexus of various factors.Moreover,the case study demonstrates the applicability and expansion potential of the framework in the fields of sustainable agricultural development and food security assurance.
文摘The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier shareholding structure is that the company issues two classes of shares with different voting rights.It enables the concentration and stabilization of corporate control,which has a positive effect on the long-term development of the company and resistance to hostile takeovers.Against the background of the rapid development of the capital market and the continuous innovation of corporate governance structure,the two-tier shareholding structure has begun to be adopted by many enterprises.While this structure can improve the efficiency of corporate governance and promote corporate growth,it also raises a number of challenges.In particular,for small and medium-sized shareholders,their shareholdings may face the problem of limited or no voting rights,as well as the lack of an effective internal and external monitoring mechanism for the company.These issues may lead to the impairment of the rights of small and medium-sized shareholders.Currently,challenges in practice include inadequate laws and regulations,insufficient disclosure of information,and inadequate monitoring mechanisms.Therefore,exploring the path to protect the rights and interests of small and medium-sized shareholders and analyzing their current situation has become an important area in the study of two-tier shareholding structures.This paper starts from the actual situation,analyzes the problems exposed in the operation process of two-tier shareholding structure,and then explores the practical and feasible methods to protect the rights and interests of small and medium-sized shareholders on this basis,with a view to putting forward valuable references for the development of China’s securities market.
基金supported by National Science and Technology Major Project under Grant No.2012ZX03002003Funds of Key Lab of Fujian Province University Network Security and Cryptology under Grant No.2011009Open Research Project of State Key Laboratory of Information Security in Institute of Software,Chinese Academy of Sciences
文摘In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted.
文摘Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency.
基金Research Center for Capital Health Management and Policy,No.2024JD09.
文摘BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hospitalization costs and structure,and explored the impact of China Healthcare Security Diagnosis Related Groups(CHS-DRG)management on patient costs.It aimed to provide medical institutions with ways to reduce costs,optimize cost structures,reduce patient burden,and improve service efficiency.AIM To study the CHS-DRG payment system’s impact on breast cancer surgery costs.METHODS Using the CHS-DRG(version 1.1)grouping criteria,4073 patients,who underwent the radical resection of breast malignant tumors from January to December 2023,were included in the JA29 group;1028 patients were part of the CHS-DRG payment system,unlike the rest.Through an independent sample t-test,the length of hospital stay as well as total hospitalization,medicine and consumables,medical,nursing,medical technology,and management expenses were compared.Pearson’s correlation coefficient was used to test the cost correlation.RESULTS In terms of hospitalization expenses,patients in the CHS-DRG payment group had lower medical,nursing,and management expenses than those in the diagnosis-related group(DRG)non-payment group.For patients in the DRG payment group,the factors affecting the total hospitalization cost,in descending order of relevance,were medicine and consumable costs,consumable costs,medicine costs,medical costs,medical technology costs,management costs,nursing costs,and length of hospital stay.For patients in the DRG nonpayment group,the factors affecting the total hospitalization expenses in descending order of relevance were medicines and consumable expenses,consumable expenses,medical technology expenses,the cost of medicines,medical expenses,nursing expenses,length of hospital stay,and management expenses.CONCLUSION The CHS-DRG system can help control and reduce unnecessary medical expenses by controlling medicine costs,medical consumable costs,and the length of hospital stay while ensuring medical safety.
基金Supported bythe National Basic Research Programof China(973 Program G1999035805)
文摘A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures.
基金Research Center for Capital Health Management and Policy,No.2024JD09.
文摘BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers accounted for the highest number of new cases.Real-world data(RWD)is now widely preferred to traditional clinical trials in various fields of medicine and healthcare,as the traditional research approach often involves highly selected populations and interventions and controls that are strictly regulated.Additionally,research results from the RWD match global reality better than those from traditional clinical trials.AIM To analyze the cost disparity between surgical treatments for liver and pancreatic cancer under various factors.METHODS This study analyzed RWD 1137 cases within the HB1 group(patients who underwent pancreatectomy,hepatectomy,and/or shunt surgery)in 2023.It distinguished different expenditure categories,including medical,nursing,technical,management,drug,and consumable costs.Additionally,it assessed the contribution of each expenditure category to total hospital costs and performed cross-group comparisons using the non-parametric Kruskal–Wallis test.This study used the Steel–Dwass test for post-hoc multiple comparisons and the Spearman correlation coefficient to examine the relationships between variables.RESULTS The study found that in HB11 and HB13,the total hospitalization costs were significantly higher for pancreaticoduodenectomy than for pancreatectomy and hepatectomy.Although no significant difference was observed in the length of hospital stay between patients who underwent pancreaticoduodenectomy and pancreatectomy,both were significantly longer than those who underwent liver resection.In HB15,no significant difference was observed in the total cost of hospitalization between pancreaticoduodenectomy and pancreatectomy;however,both were significantly higher than those in hepatectomy.Additionally,the length of hospital stay was significantly longer for patients who underwent pancreaticoduodenectomy than for those who underwent pancreatectomy or liver resection.CONCLUSION China Healthcare Security Diagnosis Related Groups payment system positively impacts liver and pancreatic cancer surgeries by improving medical quality and controlling costs.Further research could refine this grouping system and ensure continuous effectiveness and sustainability.
基金funded by the National Natural Science Foundation of China (41130748, 41101162)the Key Knowledge Innovation Project of Chinese Academy of Sciences (KZCX2-EW-304)
文摘A large number of mathematical models were developed for supporting agricultural production structure optimization decisions; however, few of them can address various uncertainties existing in many factors (e.g., eco-social benefit maximization, food security, employment stability and ecosystem balance). In this study, an interval-probabilistic agricultural production structure optimization model (IPAPSOM) is formulated for tackling uncertainty presented as discrete intervals and/or probability distribution. The developed model improves upon the existing probabilistic programming and inexact optimization approaches. The IPAPSOM considers not only food security policy constraints, but also involves rural households’income increase and eco-environmental conversation, which can effectively reflect various interrelations among different aspects in an agricultural production structure optimization system. Moreover, it can also help examine the reliability of satisfying (or risk of violating) system constraints under uncertainty. The model is applied to a real case of long-term agricultural production structure optimization in Dancheng County, which is located in Henan Province of Central China as one of the major grain producing areas. Interval solutions associated with different risk levels of constraint violation are obtained. The results are useful for generating a range of decision alternatives under various system benefit conditions, and thus helping decision makers to identify the desired agricultural production structure optimization strategy under uncertainty.
文摘World Health Organization through tuberculosis (TB) control averted up to six million deaths and cured thirty-six million people in 1995-2008, but had less success in reducing TB incidence, especially in thirteen high burden countries, including Indonesia. Therefore, TB control will need to have more emphasis on the issues of social determinants, as social determinants affect TB’s incidence directly and/-or through TB’s risk factors. This study aimed to identify a significant effect of social determinants and the risk factors of TB incidence. The research setting was at twenty-seven primary health centers and one hospital that have implemented the Directly Observed Treatment Short Course (DOTS) strategy in Bandar Lampung municipality, Indonesia. Respondents of this research were 238 smear-positive TB patients as case group and 238 patients without TB as control group. Research variables consisted of “social determinants”, “housing condition”, “household food security” and “health access” which were set as latent variables and measured through their indicators. Data had been collected by using questionnaire and then was analyzed with Structural Equation Modeling using SmartPLS 2.0 software. The result showed that “social determinants” through “housing condition” and “household food security” affected “TB incidence”. Moreover, “social determinants”, “housing condition” and “household food security” can be used to explain 34.1% variation of “TB incidence”. In conclusion, the knowledge can be used to support the TB control program, particularly to implement the DOTS strategy together with improving social determinants, housing condition and household food security.
基金the National Natural Science Foundation of China(No.60374066)
文摘For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible.
文摘This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.
文摘This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR.
基金National Natural Science Foundation of China(No.51274150)Tianjin Major Project of Application Foundation and Advanced Technology,China(No.12JCZDJC27800)
文摘Aiming to improve the Structured Query Language( SQL) injection penetration test accuracy through the formalismguided test case generation,an attack purpose based attack tree model of SQL injection is proposed,and then under the guidance of this model, the formal descriptions for the SQL injection vulnerability feature and SQL injection attack inputs are established. Moreover,according to new coverage criteria,these models are instantiated and the executable test cases are generated.Experiments show that compared with the random enumerated test case used in other works,the test case generated by our method can detect the SQL injection vulnerability more effectively. Therefore,the false negative is reduced and the test accuracy is improved.
基金Supported by Key and Emerging Agricultural Discipline Construction Project of Anhui Provincial Department of Finance(13A1425)
文摘Through overview of relevant literature and on the basis of basically grasping frontier study and development trend,this paper discussed the grain security from industrial structure,farmland protection,grain import,urbanization and industrialization,grain reserve,ecological protection,and grain security pre-warning,in the hope of providing some convenience and reference for future related researches.
文摘Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack on any system exploits some undesired (malicious or accidental) functionality in the components of the system. Unfortunately, it is far from practical to eliminate undesired functionality in every component of a system. The contribution of this paper is a novel architecture for securing SCADA systems that guarantee that “any malicious modification of the deployment configuration or the design configuration of the SCADA system will be detected”—even if undesired functionality may exist in SCADA system components.
文摘The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:the lack of accurate use of resources,the lack of protection of the mobile device from the overall point of view,the unclear division of responsibility among specialized agencies,and unclear members’responsibilities for their own duties.This study applies the structure behavior coalescence(SBC)methodology to integrate the organizational structure of the participating management and control units with effective management behaviors in a visualized and useful manner.The units can effectively communicate with each other and solve the four issues faced by the military barrack-areas for the control of mobile devices.This research fulfills improving the lack of control of the military mobile devices by using of management resources effectively and the establishment of mobile devices management with the overall concept,and strengthening the rights and responsibilities and information security awareness,through the logical verification and enterprise interview results.
文摘With the continuous development of society, the number of civil engineering projects is also increasing with the development of society. Civil engineering safety management is a very important part of it. It is necessary to have a strong sense of safety management and ensure the structural safety of civil engineering so as to promote the rapid development of China's construction industry more effectively. To civil engineering structure security problems, in fact, is refers to the engineering structural indicators, the indicators including ability to resist collapse and corruption based on the external environment. And the indicators for the civil engineering construction are the core content. The corresponding indexes must be reached to ensure the civil engineering in the construction and in the later use process has no accidents. In the study of this paper, based on the actual situation of the safety of advanced civil construction structures in China, the possible problems in civil engineering design are discussed, and combined with specific investigation and analysis, according to the requirements of relevant indicators and relevant factors, put forward targeted countermeasures and suggestions for improvement.
文摘With the continuous improvement of construction technology and construction level, the current development trend of construction is large-scale and high-rise. Based on this, the reliability requirements for buildings are becoming higher and higher. There is a great relationship between the reliability in the design of building structures and the safety performance of buildings, so it is very necessary to carry out in-depth analysis and research to ensure the reliability of building structures and improve the safety factor. In this paper, the reliability factors affecting the design of building structures are analyzed and studied, and the influencing factors are optimized for reference by relevant practitioners.