This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first ...This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first split into eight typographical categories. The classification scheme uses pattern matching to classify the characters in each category into a set of fuzzy prototypes based on a nonlinear weighted similarity function. The fuzzy unsupervised character classification, which is natural in the repre...展开更多
Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for ...Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.展开更多
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ...To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.展开更多
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in...In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.展开更多
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p...A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library.展开更多
The Chars Livelihoods Programme (CLP)'s response has been to provide a comprehensive package of support, which aims to increase resilience to disasters and build women's empowerment. In 2012, CLP developed an inno...The Chars Livelihoods Programme (CLP)'s response has been to provide a comprehensive package of support, which aims to increase resilience to disasters and build women's empowerment. In 2012, CLP developed an innovative approach to monitor women's empowerment. Understanding that empowerment is context specific, therefore CLP used qualitative approaches to understand how char households define empowerment. From this research, CLP developed a set of 10 (community and household level) indicators, which made up the chars empowerment scorecard. Results show that CLP has a considerable impact on women's empowennent. They also show that CLP has impacts at both the household and community level, driven by two main factors: increased knowledge (through social development training) and increased wealth (through CLP's Asset Transfer Project). Further, impacts on empowerment are seen to occur relatively quickly and sustain over time. The effects of climate change are only likely to further compound problems for char-dwellers. By increasing women's empowerment, CLP is confident that they will be better able to build sustainable livelihoods and increase their resilience to future disasters.展开更多
Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. Th...Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. This paper presents the results obtained from onsite testing that aimed at evaluating the treatment in terms of its aesthetic performance, the depth of treatment, the mechanical properties of the consolidated stone and the influence on water transport. To this end, the testing program included colorimetry, DRMS (drilling resistance measurement system) and water absorption through the contact sponge method. This study is Part One of the final phase of a wider research program which included two previous phases progressing from treating this same very porous stone type in a laboratory-based controlled environment to uncontrolled site conditions, seeking to quantify this treatment's effectiveness in the field. Results showed that onsite consolidation was achieved and that although some changes in colour and water absorption were brought about by the treatment, these were within acceptable tolerance limits. Besides carrying out these treatments and evaluations directly on the coast, this study anticipates further studies which will look at rural and urban sites where the types and concentrations of salts are expected to be different.展开更多
Approved by Lao Prime Minister’s Office,the Government of Lao PDR Ministry of Planning and Investment and Lao Asia Pacific Satellite Co.,Ltd.held the signing ceremony for the Lao Satellite Concession Agreement on Sep...Approved by Lao Prime Minister’s Office,the Government of Lao PDR Ministry of Planning and Investment and Lao Asia Pacific Satellite Co.,Ltd.held the signing ceremony for the Lao Satellite Concession Agreement on September2.The Vice Minister of the Ministry of Planning and Investment,Bounthavy SISOUPHANTHONG,and the President of the Lao Asia Pacific Satellite Co.,Ltd.,DING Yongbing,signed the agreement on behalf of each party.展开更多
Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout ...Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout the world. We discuss the effect of existing copyright treaties and various proposals, such as compulsory licensing and the public lending fight that would allow access to copyrighted works without requiring permission of their owners. We argue that these schemes are ineffective for purposes of the UDL. Instead, making use of the international consensus that copyright does not protect facts, information or processes, we propose to scan works digitally to extract their intellectual content, and then generate by machine synthetic works that capture this content, and then translate the generated works automatically into multiple languages and distribute them free of copyright restriction.展开更多
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em...Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.展开更多
The aim of this study is to identify the development of patient rights in Turkey and to analyze patient complaints in the country. An attempt was made to determine how the issues discussed in patient rights committees...The aim of this study is to identify the development of patient rights in Turkey and to analyze patient complaints in the country. An attempt was made to determine how the issues discussed in patient rights committees are differentiated from the applications made to the patient rights units of the hospitals within the body of Ministry of Health in 2009, depending on variables such as branch, province, region, hospital type, title, gender, and subject of application, 18,634 applications were content analysed after they were classified in terms of subject, unit, title, branch, province, and region, and were transformed into numerical codes to prepare the data for analysis. The results show on a regional basis that Marmara is in the first place with 34.9% and East Anatolia is in the last place with 4.6%. The unit receiving the most complaints is outpatient services with 43.1%. Regarding position title, specialists ranked first with 37.9% and managers ranked next with 11.3%. When reviewing the subjects of the applications, they are ranked as follows: (1) lack of benefiting from the services (44%); and (2) lack of receiving respect and comfort (26.8%). Patient rights violations were detected in 12.7% but not in 51.6% of the applications made.展开更多
This paper will discuss one topic in the current debate on higher education: How power is exercised between universities? How do colleges determine what the best college is? What are the differences in the excersis...This paper will discuss one topic in the current debate on higher education: How power is exercised between universities? How do colleges determine what the best college is? What are the differences in the excersise of power in the digital age? The authors analyze one of the mechanisms of relationship and contact between different universities: the rankings. They will discuss the practices that allow certain values and organizations they are becoming central nodes between universities and the influences of the information and communication technologies in the measurement mechanisms. The authors seek to show the rankings serve as mechanisms to exercise power among universities. These measurements become a tool and justification in competition between universities for resources such as funding, prestige, and student demand. The analysis is based on the University of Mexico, the authors use the ranking of the best universities in Latin America and the best universities in Mexico.展开更多
The notions of human rights and World Community are inseparably related. It is on the basis of mutual trust that we can construct World Community, so it is quite natural that the respect of human rights is the basic c...The notions of human rights and World Community are inseparably related. It is on the basis of mutual trust that we can construct World Community, so it is quite natural that the respect of human rights is the basic condition of the participant countries. The World Community is aiming at making a peaceful global village where the lives of people are mutually encouraged and the diverse merits of different civilizations are shared together. True human welfare should imply in its concept harmony between all existences. In the history of the world, we can see the irresistible current moving towards the realization of human rights and World Community. Even if we accept this affirmative development of history in the long run, we should be always alert to the dangers and traps on the road. There have been many cases of frustration and reversion by strong counteractions or self-deceptions. In the actual situation of its age, humanity has been always at the crossroads. It is the duty of philosophy and history to shed light on the situation and present a direction.展开更多
Using the recent compilation of the isotopic composition data of surface snow of Antarctic ice sheet, we proposed an improved interpolation method of δD, which utilizes geographical factors (i.e., latitude and altit...Using the recent compilation of the isotopic composition data of surface snow of Antarctic ice sheet, we proposed an improved interpolation method of δD, which utilizes geographical factors (i.e., latitude and altitude) as the primary predictors and incorporates inverse distance weighting (IDW) technique. The method was applied to a high-resolution digital elevation model (DEM) to produce a grid map of multi-year mean δD values with lkm spatial resolution for Antarctica. The mean absolute deviation between observed and estimated data in the map is about 5.4‰, and the standard deviation is 9‰. The resulting δD pattern resembles well known characteristics such as the depletion of the heavy isotopes with increasing latitude and distance from coast line, but also reveals the complex topographic effects.展开更多
Neurons with complex-valued weights have stronger capability because of their multi-valued threshold logic. Neurons with such features may be suitable for solution of different kinds of problems including associative ...Neurons with complex-valued weights have stronger capability because of their multi-valued threshold logic. Neurons with such features may be suitable for solution of different kinds of problems including associative memory,image recognition and digital logical mapping. In this paper,robustness or tolerance is introduced and newly defined for this kind of neuron ac-cording to both their mathematical model and the perceptron neuron's definition of robustness. Also,the most robust design for basic digital logics of multiple variables is proposed based on these robust neurons. Our proof procedure shows that,in robust design each weight only takes the value of i or -i,while the value of threshold is with respect to the number of variables. The results demonstrate the validity and simplicity of using robust neurons for realizing arbitrary digital logical functions.展开更多
Let G be a graph with degree sequence ( dv). If the maximum degree of any subgraph induced by a neighborhood of G is at most m, then the independence number of G is at least $\sum\limits_v {f_{m + 1} \left( {d_v } \ri...Let G be a graph with degree sequence ( dv). If the maximum degree of any subgraph induced by a neighborhood of G is at most m, then the independence number of G is at least $\sum\limits_v {f_{m + 1} \left( {d_v } \right)} $ , where fm+1( x) is a function greater than $\frac{{log\left( {x/\left( {m + 1} \right)} \right) - 1}}{x}for x > 0$ for x> 0. For a weighted graph G = ( V, E, w), we prove that its weighted independence number (the maximum sum of the weights of an independent set in G) is at least $\sum\limits_v {\frac{{w_v }}{{1 + d_v }}} $ where wv is the weight of v.展开更多
Generalized Farey tree network (GFTN) and generalized Farey organized pyramid network (CFOPN) model are proposed, and their topological characteristics are studied by both theoretical analysis and numerical simula...Generalized Farey tree network (GFTN) and generalized Farey organized pyramid network (CFOPN) model are proposed, and their topological characteristics are studied by both theoretical analysis and numerical simulations, which are in good accordance with each other. Then weighted GFTN is studied using cumulative distributions of its Farey number value, edge weight, and node strength. These results maybe helpful for future theoretical development of hybrid models.展开更多
We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can u...We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications.展开更多
文摘This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first split into eight typographical categories. The classification scheme uses pattern matching to classify the characters in each category into a set of fuzzy prototypes based on a nonlinear weighted similarity function. The fuzzy unsupervised character classification, which is natural in the repre...
基金supported by the National Natural Science Foundation of China under Grant 61272519the Research Funds of Blockchain Joint Lab between BUPT and BCTthe joint Blockchain and Security Lab between BUPT and CAPSTONE
文摘Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications.
文摘To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.
基金ACKNOWLEDGEMENTS This work has been supported by the National Natural Science Foundation of China under Grant No. 61272519, 61121061.
文摘In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient.
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
基金Supported in part by the National Natural Science Foundation of China (No.60072044).
文摘A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library.
文摘The Chars Livelihoods Programme (CLP)'s response has been to provide a comprehensive package of support, which aims to increase resilience to disasters and build women's empowerment. In 2012, CLP developed an innovative approach to monitor women's empowerment. Understanding that empowerment is context specific, therefore CLP used qualitative approaches to understand how char households define empowerment. From this research, CLP developed a set of 10 (community and household level) indicators, which made up the chars empowerment scorecard. Results show that CLP has a considerable impact on women's empowennent. They also show that CLP has impacts at both the household and community level, driven by two main factors: increased knowledge (through social development training) and increased wealth (through CLP's Asset Transfer Project). Further, impacts on empowerment are seen to occur relatively quickly and sustain over time. The effects of climate change are only likely to further compound problems for char-dwellers. By increasing women's empowerment, CLP is confident that they will be better able to build sustainable livelihoods and increase their resilience to future disasters.
文摘Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. This paper presents the results obtained from onsite testing that aimed at evaluating the treatment in terms of its aesthetic performance, the depth of treatment, the mechanical properties of the consolidated stone and the influence on water transport. To this end, the testing program included colorimetry, DRMS (drilling resistance measurement system) and water absorption through the contact sponge method. This study is Part One of the final phase of a wider research program which included two previous phases progressing from treating this same very porous stone type in a laboratory-based controlled environment to uncontrolled site conditions, seeking to quantify this treatment's effectiveness in the field. Results showed that onsite consolidation was achieved and that although some changes in colour and water absorption were brought about by the treatment, these were within acceptable tolerance limits. Besides carrying out these treatments and evaluations directly on the coast, this study anticipates further studies which will look at rural and urban sites where the types and concentrations of salts are expected to be different.
文摘Approved by Lao Prime Minister’s Office,the Government of Lao PDR Ministry of Planning and Investment and Lao Asia Pacific Satellite Co.,Ltd.held the signing ceremony for the Lao Satellite Concession Agreement on September2.The Vice Minister of the Ministry of Planning and Investment,Bounthavy SISOUPHANTHONG,and the President of the Lao Asia Pacific Satellite Co.,Ltd.,DING Yongbing,signed the agreement on behalf of each party.
文摘Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout the world. We discuss the effect of existing copyright treaties and various proposals, such as compulsory licensing and the public lending fight that would allow access to copyrighted works without requiring permission of their owners. We argue that these schemes are ineffective for purposes of the UDL. Instead, making use of the international consensus that copyright does not protect facts, information or processes, we propose to scan works digitally to extract their intellectual content, and then generate by machine synthetic works that capture this content, and then translate the generated works automatically into multiple languages and distribute them free of copyright restriction.
文摘Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.
文摘The aim of this study is to identify the development of patient rights in Turkey and to analyze patient complaints in the country. An attempt was made to determine how the issues discussed in patient rights committees are differentiated from the applications made to the patient rights units of the hospitals within the body of Ministry of Health in 2009, depending on variables such as branch, province, region, hospital type, title, gender, and subject of application, 18,634 applications were content analysed after they were classified in terms of subject, unit, title, branch, province, and region, and were transformed into numerical codes to prepare the data for analysis. The results show on a regional basis that Marmara is in the first place with 34.9% and East Anatolia is in the last place with 4.6%. The unit receiving the most complaints is outpatient services with 43.1%. Regarding position title, specialists ranked first with 37.9% and managers ranked next with 11.3%. When reviewing the subjects of the applications, they are ranked as follows: (1) lack of benefiting from the services (44%); and (2) lack of receiving respect and comfort (26.8%). Patient rights violations were detected in 12.7% but not in 51.6% of the applications made.
文摘This paper will discuss one topic in the current debate on higher education: How power is exercised between universities? How do colleges determine what the best college is? What are the differences in the excersise of power in the digital age? The authors analyze one of the mechanisms of relationship and contact between different universities: the rankings. They will discuss the practices that allow certain values and organizations they are becoming central nodes between universities and the influences of the information and communication technologies in the measurement mechanisms. The authors seek to show the rankings serve as mechanisms to exercise power among universities. These measurements become a tool and justification in competition between universities for resources such as funding, prestige, and student demand. The analysis is based on the University of Mexico, the authors use the ranking of the best universities in Latin America and the best universities in Mexico.
文摘The notions of human rights and World Community are inseparably related. It is on the basis of mutual trust that we can construct World Community, so it is quite natural that the respect of human rights is the basic condition of the participant countries. The World Community is aiming at making a peaceful global village where the lives of people are mutually encouraged and the diverse merits of different civilizations are shared together. True human welfare should imply in its concept harmony between all existences. In the history of the world, we can see the irresistible current moving towards the realization of human rights and World Community. Even if we accept this affirmative development of history in the long run, we should be always alert to the dangers and traps on the road. There have been many cases of frustration and reversion by strong counteractions or self-deceptions. In the actual situation of its age, humanity has been always at the crossroads. It is the duty of philosophy and history to shed light on the situation and present a direction.
基金Under the auspices of National Natural Science Foundation of China (No. 40825017, 40576001)100 Talents Project of Chinese Academy of SciencesNational Key Technologies R&D Program of China (No. 2006BAB18B01)
文摘Using the recent compilation of the isotopic composition data of surface snow of Antarctic ice sheet, we proposed an improved interpolation method of δD, which utilizes geographical factors (i.e., latitude and altitude) as the primary predictors and incorporates inverse distance weighting (IDW) technique. The method was applied to a high-resolution digital elevation model (DEM) to produce a grid map of multi-year mean δD values with lkm spatial resolution for Antarctica. The mean absolute deviation between observed and estimated data in the map is about 5.4‰, and the standard deviation is 9‰. The resulting δD pattern resembles well known characteristics such as the depletion of the heavy isotopes with increasing latitude and distance from coast line, but also reveals the complex topographic effects.
文摘Neurons with complex-valued weights have stronger capability because of their multi-valued threshold logic. Neurons with such features may be suitable for solution of different kinds of problems including associative memory,image recognition and digital logical mapping. In this paper,robustness or tolerance is introduced and newly defined for this kind of neuron ac-cording to both their mathematical model and the perceptron neuron's definition of robustness. Also,the most robust design for basic digital logics of multiple variables is proposed based on these robust neurons. Our proof procedure shows that,in robust design each weight only takes the value of i or -i,while the value of threshold is with respect to the number of variables. The results demonstrate the validity and simplicity of using robust neurons for realizing arbitrary digital logical functions.
基金Li is supported in part by the National Natural Science Foundation of China (Grant No. 19871023) Science Foundation of the Education Ministry of China "333" Foundation and NSF of Jiangsu Province. Zang is supported in part by an RGC earmarked researc
文摘Let G be a graph with degree sequence ( dv). If the maximum degree of any subgraph induced by a neighborhood of G is at most m, then the independence number of G is at least $\sum\limits_v {f_{m + 1} \left( {d_v } \right)} $ , where fm+1( x) is a function greater than $\frac{{log\left( {x/\left( {m + 1} \right)} \right) - 1}}{x}for x > 0$ for x> 0. For a weighted graph G = ( V, E, w), we prove that its weighted independence number (the maximum sum of the weights of an independent set in G) is at least $\sum\limits_v {\frac{{w_v }}{{1 + d_v }}} $ where wv is the weight of v.
基金supported by the Nature Science Foundation of China under Grand Nos. 70431002, 60874087, 60773120, and 10647001the Nature Science Foundation of Beijing under Grand No. 4092040
文摘Generalized Farey tree network (GFTN) and generalized Farey organized pyramid network (CFOPN) model are proposed, and their topological characteristics are studied by both theoretical analysis and numerical simulations, which are in good accordance with each other. Then weighted GFTN is studied using cumulative distributions of its Farey number value, edge weight, and node strength. These results maybe helpful for future theoretical development of hybrid models.
基金the National Natural Science Foundation of China(No.60703032)the National High Technology Research and Development Program(863)of China(No.2007AA01Z456)
文摘We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications.