期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
《左传》“权”、“武”、“达”新释 被引量:1
1
作者 王春淑 《四川师范大学学报(社会科学版)》 北大核心 2001年第6期80-83,共4页
综合史实及古代汉语的特点 ,《左传》“权不足也” ,“仁而不武 ,未能达也”一说应作新的解释 ,对“权”、“武”、“达”三字词尤应作新的训义。
关键词 《左传》 '权'字 '' '' 训沽 词义
下载PDF
An Approach to Unsupervised Character Classification Based on Similarity Measure in Fuzzy Model
2
作者 卢达 钱忆平 +1 位作者 谢铭培 浦炜 《Journal of Southeast University(English Edition)》 EI CAS 2002年第4期370-376,共7页
This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first ... This paper presents a fuzzy logic approach to efficiently perform unsupervised character classification for improvement in robustness, correctness and speed of a character recognition system. The characters are first split into eight typographical categories. The classification scheme uses pattern matching to classify the characters in each category into a set of fuzzy prototypes based on a nonlinear weighted similarity function. The fuzzy unsupervised character classification, which is natural in the repre... 展开更多
关键词 fuzzy model weighted fuzzy similarity measure unsupervised character classification matching algorithm classification hierarchy
下载PDF
A Master-Slave Blockchain Paradigm and Application in Digital Rights Management 被引量:5
3
作者 Zhaofeng Ma Weihua Huang +2 位作者 Wei Bi Hongmin Gao Zhen Wang 《China Communications》 SCIE CSCD 2018年第8期174-188,共15页
Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for ... Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme(MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5 G generation environment, and can apply in the DRM-related applications. 展开更多
关键词 master-slave blockchain proof ofequivalent work proof of contribution pervasive computing DRM application
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
4
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
Attribute Based DRM Scheme with Dynamic Usage Control in Cloud Computing 被引量:3
5
作者 HUANG Qinlong 《China Communications》 SCIE CSCD 2014年第4期50-63,共14页
In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from in... In order to achieve fine-grained access control in cloud computing,existing digital rights management(DRM) schemes adopt attribute-based encryption as the main encryption primitive.However,these schemes suffer from inefficiency and cannot support dynamic updating of usage rights stored in the cloud.In this paper,we propose a novel DRM scheme with secure key management and dynamic usage control in cloud computing.We present a secure key management mechanism based on attribute-based encryption and proxy re-encryption.Only the users whose attributes satisfy the access policy of the encrypted content and who have effective usage rights can be able to recover the content encryption key and further decrypt the content.The attribute based mechanism allows the content provider to selectively provide fine-grained access control of contents among a set of users,and also enables the license server to implement immediate attribute and user revocation.Moreover,our scheme supports privacy-preserving dynamic usage control based on additive homomorphic encryption,which allows the license server in the cloud to update the users' usage rights dynamically without disclosing the plaintext.Extensive analytical results indicate that our proposed scheme is secure and efficient. 展开更多
关键词 digital rights management cloud computing usage control attribute-based encryption homomorphic encryption
下载PDF
Digital Rights Management:Model,Technology and Application 被引量:7
6
作者 Zhaofeng Ma 《China Communications》 SCIE CSCD 2017年第6期156-167,共12页
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ... with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality. 展开更多
关键词 digital rights management drm security infrastructure ENCRYPTION WATERMARK usage control drm-free
下载PDF
APPLICATION OF NONLINEAR WATERMARK TECHNIQUES IN DIGITAL LIBRARIES 被引量:1
7
作者 Zhao Jian Zhou Mingquan 《Journal of Electronics(China)》 2005年第5期524-527,共4页
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p... A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library. 展开更多
关键词 Digital library Digital watermarking NONLINEAR Copyright protection
下载PDF
Empowering Women on the Chars: Increasing Resilience to Disasters and Building Sustainable Livelihoods
8
作者 Matthew Pritchard Arifur Rahman Mahbub Alam 《Journal of Agricultural Science and Technology(A)》 2015年第4期246-251,共6页
The Chars Livelihoods Programme (CLP)'s response has been to provide a comprehensive package of support, which aims to increase resilience to disasters and build women's empowerment. In 2012, CLP developed an inno... The Chars Livelihoods Programme (CLP)'s response has been to provide a comprehensive package of support, which aims to increase resilience to disasters and build women's empowerment. In 2012, CLP developed an innovative approach to monitor women's empowerment. Understanding that empowerment is context specific, therefore CLP used qualitative approaches to understand how char households define empowerment. From this research, CLP developed a set of 10 (community and household level) indicators, which made up the chars empowerment scorecard. Results show that CLP has a considerable impact on women's empowennent. They also show that CLP has impacts at both the household and community level, driven by two main factors: increased knowledge (through social development training) and increased wealth (through CLP's Asset Transfer Project). Further, impacts on empowerment are seen to occur relatively quickly and sustain over time. The effects of climate change are only likely to further compound problems for char-dwellers. By increasing women's empowerment, CLP is confident that they will be better able to build sustainable livelihoods and increase their resilience to future disasters. 展开更多
关键词 GENDER EMPOWERMENT livelihoods sustainability Bangladesh.
下载PDF
Onsite Testing of Ammonium Oxalate Treatment Applied to Historical Salt-Infested Limestone
9
作者 Tabitha Dreyfuss JoAnn Cassar 《Journal of Civil Engineering and Architecture》 2017年第2期175-183,共9页
Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. Th... Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. This paper presents the results obtained from onsite testing that aimed at evaluating the treatment in terms of its aesthetic performance, the depth of treatment, the mechanical properties of the consolidated stone and the influence on water transport. To this end, the testing program included colorimetry, DRMS (drilling resistance measurement system) and water absorption through the contact sponge method. This study is Part One of the final phase of a wider research program which included two previous phases progressing from treating this same very porous stone type in a laboratory-based controlled environment to uncontrolled site conditions, seeking to quantify this treatment's effectiveness in the field. Results showed that onsite consolidation was achieved and that although some changes in colour and water absorption were brought about by the treatment, these were within acceptable tolerance limits. Besides carrying out these treatments and evaluations directly on the coast, this study anticipates further studies which will look at rural and urban sites where the types and concentrations of salts are expected to be different. 展开更多
关键词 Historical stonework limestone consolidation ammonium oxalate treatment onsite treatment onsite testing.
下载PDF
Lao Satellite Concession Agreement Signed
10
作者 HUANG Haiyan 《Aerospace China》 2016年第3期64-64,共1页
Approved by Lao Prime Minister’s Office,the Government of Lao PDR Ministry of Planning and Investment and Lao Asia Pacific Satellite Co.,Ltd.held the signing ceremony for the Lao Satellite Concession Agreement on Sep... Approved by Lao Prime Minister’s Office,the Government of Lao PDR Ministry of Planning and Investment and Lao Asia Pacific Satellite Co.,Ltd.held the signing ceremony for the Lao Satellite Concession Agreement on September2.The Vice Minister of the Ministry of Planning and Investment,Bounthavy SISOUPHANTHONG,and the President of the Lao Asia Pacific Satellite Co.,Ltd.,DING Yongbing,signed the agreement on behalf of each party. 展开更多
关键词 Minister ceremony behalf signed party signing permission venture formal launch
下载PDF
Machines as readers: A solution to the copyright problem
11
作者 SHAMOS Michael I. 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第11期1179-1187,共9页
Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout ... Copyright and its international complications have presented a significant barrier to the Universal Digital Library (UDL)'s mission to digitize all the published works of mankind and make them available throughout the world. We discuss the effect of existing copyright treaties and various proposals, such as compulsory licensing and the public lending fight that would allow access to copyrighted works without requiring permission of their owners. We argue that these schemes are ineffective for purposes of the UDL. Instead, making use of the international consensus that copyright does not protect facts, information or processes, we propose to scan works digitally to extract their intellectual content, and then generate by machine synthetic works that capture this content, and then translate the generated works automatically into multiple languages and distribute them free of copyright restriction. 展开更多
关键词 Universal Digital Library (UDL) COPYRIGHT Digital rights management Compulsory license Berne convention Public lending right Synthetic documents Machine translation
下载PDF
Music Protection Based on Digital Watermarking and Encryption
12
作者 徐常凯 王耀才 《Journal of China University of Mining and Technology》 2003年第1期60-65,共6页
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em... Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires. 展开更多
关键词 digital watermarking ENCRYPTION copy protection usage control security key digital music
下载PDF
Development of Patient Rights and Analysis of Patient Complaints in Turkey
13
作者 Sedat Bostan Taskln Kilic 《Sociology Study》 2014年第9期818-827,共10页
The aim of this study is to identify the development of patient rights in Turkey and to analyze patient complaints in the country. An attempt was made to determine how the issues discussed in patient rights committees... The aim of this study is to identify the development of patient rights in Turkey and to analyze patient complaints in the country. An attempt was made to determine how the issues discussed in patient rights committees are differentiated from the applications made to the patient rights units of the hospitals within the body of Ministry of Health in 2009, depending on variables such as branch, province, region, hospital type, title, gender, and subject of application, 18,634 applications were content analysed after they were classified in terms of subject, unit, title, branch, province, and region, and were transformed into numerical codes to prepare the data for analysis. The results show on a regional basis that Marmara is in the first place with 34.9% and East Anatolia is in the last place with 4.6%. The unit receiving the most complaints is outpatient services with 43.1%. Regarding position title, specialists ranked first with 37.9% and managers ranked next with 11.3%. When reviewing the subjects of the applications, they are ranked as follows: (1) lack of benefiting from the services (44%); and (2) lack of receiving respect and comfort (26.8%). Patient rights violations were detected in 12.7% but not in 51.6% of the applications made. 展开更多
关键词 Patient rights patient complaints healthcare management
下载PDF
Rankings of Universities and Power in the Digital Age
14
作者 Mario Alberto Velazquez Garcia Lilian lvetthe Salado Rodriguez 《Sociology Study》 2015年第4期269-281,共13页
This paper will discuss one topic in the current debate on higher education: How power is exercised between universities? How do colleges determine what the best college is? What are the differences in the excersis... This paper will discuss one topic in the current debate on higher education: How power is exercised between universities? How do colleges determine what the best college is? What are the differences in the excersise of power in the digital age? The authors analyze one of the mechanisms of relationship and contact between different universities: the rankings. They will discuss the practices that allow certain values and organizations they are becoming central nodes between universities and the influences of the information and communication technologies in the measurement mechanisms. The authors seek to show the rankings serve as mechanisms to exercise power among universities. These measurements become a tool and justification in competition between universities for resources such as funding, prestige, and student demand. The analysis is based on the University of Mexico, the authors use the ranking of the best universities in Latin America and the best universities in Mexico. 展开更多
关键词 TECHNOLOGY POWER UNIVERSITY RANKING Mexico
下载PDF
Alliance of Civilizations for Human Rights and World Community
15
作者 Choi Woo-Won 《Journal of Philosophy Study》 2012年第2期124-131,共8页
The notions of human rights and World Community are inseparably related. It is on the basis of mutual trust that we can construct World Community, so it is quite natural that the respect of human rights is the basic c... The notions of human rights and World Community are inseparably related. It is on the basis of mutual trust that we can construct World Community, so it is quite natural that the respect of human rights is the basic condition of the participant countries. The World Community is aiming at making a peaceful global village where the lives of people are mutually encouraged and the diverse merits of different civilizations are shared together. True human welfare should imply in its concept harmony between all existences. In the history of the world, we can see the irresistible current moving towards the realization of human rights and World Community. Even if we accept this affirmative development of history in the long run, we should be always alert to the dangers and traps on the road. There have been many cases of frustration and reversion by strong counteractions or self-deceptions. In the actual situation of its age, humanity has been always at the crossroads. It is the duty of philosophy and history to shed light on the situation and present a direction. 展开更多
关键词 alliance of civilization COEXISTENCE human rights World Community Being
下载PDF
An Improved Method for Modeling Spatial Distribution of δD in Surface Snow over Antarctic Ice Sheet
16
作者 WANG Yetang HOU Shugui +1 位作者 Bjom GRIGHOLM SONG Linlin 《Chinese Geographical Science》 SCIE CSCD 2009年第2期120-125,共6页
Using the recent compilation of the isotopic composition data of surface snow of Antarctic ice sheet, we proposed an improved interpolation method of δD, which utilizes geographical factors (i.e., latitude and altit... Using the recent compilation of the isotopic composition data of surface snow of Antarctic ice sheet, we proposed an improved interpolation method of δD, which utilizes geographical factors (i.e., latitude and altitude) as the primary predictors and incorporates inverse distance weighting (IDW) technique. The method was applied to a high-resolution digital elevation model (DEM) to produce a grid map of multi-year mean δD values with lkm spatial resolution for Antarctica. The mean absolute deviation between observed and estimated data in the map is about 5.4‰, and the standard deviation is 9‰. The resulting δD pattern resembles well known characteristics such as the depletion of the heavy isotopes with increasing latitude and distance from coast line, but also reveals the complex topographic effects. 展开更多
关键词 δD surface snow ice sheet ANTARCTICA
下载PDF
The most robust design for digital logics of multiple variables based on neurons with complex-valued weights 被引量:2
17
作者 Wei-feng LU Mi LIN Ling-ling SUN 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2009年第2期184-188,共5页
Neurons with complex-valued weights have stronger capability because of their multi-valued threshold logic. Neurons with such features may be suitable for solution of different kinds of problems including associative ... Neurons with complex-valued weights have stronger capability because of their multi-valued threshold logic. Neurons with such features may be suitable for solution of different kinds of problems including associative memory,image recognition and digital logical mapping. In this paper,robustness or tolerance is introduced and newly defined for this kind of neuron ac-cording to both their mathematical model and the perceptron neuron's definition of robustness. Also,the most robust design for basic digital logics of multiple variables is proposed based on these robust neurons. Our proof procedure shows that,in robust design each weight only takes the value of i or -i,while the value of threshold is with respect to the number of variables. The results demonstrate the validity and simplicity of using robust neurons for realizing arbitrary digital logical functions. 展开更多
关键词 Complex-valued weights Multi-valued neurons (MVNs) Digital logic Robust design
原文传递
The lower bound on independence number
18
作者 李雨生 CecilC.ROUSSEAU 臧文安 《Science China Mathematics》 SCIE 2002年第1期64-69,共6页
Let G be a graph with degree sequence ( dv). If the maximum degree of any subgraph induced by a neighborhood of G is at most m, then the independence number of G is at least $\sum\limits_v {f_{m + 1} \left( {d_v } \ri... Let G be a graph with degree sequence ( dv). If the maximum degree of any subgraph induced by a neighborhood of G is at most m, then the independence number of G is at least $\sum\limits_v {f_{m + 1} \left( {d_v } \right)} $ , where fm+1( x) is a function greater than $\frac{{log\left( {x/\left( {m + 1} \right)} \right) - 1}}{x}for x > 0$ for x> 0. For a weighted graph G = ( V, E, w), we prove that its weighted independence number (the maximum sum of the weights of an independent set in G) is at least $\sum\limits_v {\frac{{w_v }}{{1 + d_v }}} $ where wv is the weight of v. 展开更多
关键词 independence number discrete form weighted graph
原文传递
FROM UNWEIGHTED TO WEIGHTED GENERALIZED FAREY ORGANIZED TREE AND THE PYRAMID NETWORKS 被引量:1
19
作者 Yong LI·Jinqing FANG·Qiang LIU China Institute of Atomic Energy,Beijing 102413,China. 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2010年第4期681-700,共20页
Generalized Farey tree network (GFTN) and generalized Farey organized pyramid network (CFOPN) model are proposed, and their topological characteristics are studied by both theoretical analysis and numerical simula... Generalized Farey tree network (GFTN) and generalized Farey organized pyramid network (CFOPN) model are proposed, and their topological characteristics are studied by both theoretical analysis and numerical simulations, which are in good accordance with each other. Then weighted GFTN is studied using cumulative distributions of its Farey number value, edge weight, and node strength. These results maybe helpful for future theoretical development of hybrid models. 展开更多
关键词 Generalized Farey organized pyramid network topological properties weighted generalized Farey tree network.
原文传递
Watermarking Data Cubes
20
作者 郭捷 邱卫东 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期117-121,共5页
We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can u... We propose a robust watermarking scheme and several extensions for digital right management of data cubes.The ownership information is hidden into a data cube by modifying a set of selected cell values.Its owner can use his private key to control all the watermarking parameters freely.Neither original data cube nor the watermark is required in watermark detection.Detailed analysis and extensive experiments are conducted for the proposed schemes in terms of watermark detectability,robustness and efficiency.Our results show that the scheme performs well in actual applications. 展开更多
关键词 data cube WATERMARKING digital right management ROBUSTNESS
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部