The research aims to improve the performance of image recognition methods based on a description in the form of a set of keypoint descriptors.The main focus is on increasing the speed of establishing the relevance of ...The research aims to improve the performance of image recognition methods based on a description in the form of a set of keypoint descriptors.The main focus is on increasing the speed of establishing the relevance of object and etalon descriptions while maintaining the required level of classification efficiency.The class to be recognized is represented by an infinite set of images obtained from the etalon by applying arbitrary geometric transformations.It is proposed to reduce the descriptions for the etalon database by selecting the most significant descriptor components according to the information content criterion.The informativeness of an etalon descriptor is estimated by the difference of the closest distances to its own and other descriptions.The developed method determines the relevance of the full description of the recognized object with the reduced description of the etalons.Several practical models of the classifier with different options for establishing the correspondence between object descriptors and etalons are considered.The results of the experimental modeling of the proposed methods for a database including images of museum jewelry are presented.The test sample is formed as a set of images from the etalon database and out of the database with the application of geometric transformations of scale and rotation in the field of view.The practical problems of determining the threshold for the number of votes,based on which a classification decision is made,have been researched.Modeling has revealed the practical possibility of tenfold reducing descriptions with full preservation of classification accuracy.Reducing the descriptions by twenty times in the experiment leads to slightly decreased accuracy.The speed of the analysis increases in proportion to the degree of reduction.The use of reduction by the informativeness criterion confirmed the possibility of obtaining the most significant subset of features for classification,which guarantees a decent level of accuracy.展开更多
Adansonia digitata L.(Malvaceae) is commonly known as baobab tree native to Africa.Baobab is a multi-purpose tree which offers protection and provides food,clothing and medicine as well as raw material for many useful...Adansonia digitata L.(Malvaceae) is commonly known as baobab tree native to Africa.Baobab is a multi-purpose tree which offers protection and provides food,clothing and medicine as well as raw material for many useful items.The fruit pulp,seeds,leaves,flowers.roots,and bark of baobab are edible and they have been studied by scientists for their useful properties.The fruit pulp have very high vitamin C.calcium,phosphorus,carbohydrates,fibers,potassium,proteins and lipids content,which can be used in seasoning as an appetizer and also make juices.Seeds contain appreciable quantities of phosphorus,magnesium,zinc,sodium,iron,manganese,whereas they have high levels of lysine,thiamine,calcium and iron.Baobab has numerous biological properties including antimicrobial,anti-malarial,diarrhoea,anaemia,asthma,antiviral,anti-oxidant and anti-inflammatory activities amongst others.Phytochemical investigation revealed the presence of flavonoids.phytosterols.amino acids,fatty acids,vitamins and minerals.The review summarizes the information on various aspects of traditional information,taxonomic description,medicinal properties and importantly nutritional value.展开更多
Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This...Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.展开更多
The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing ...The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.展开更多
To solve the problem of chaining distributed geographic information Web services (GI Web services), this paper provides an ontology-based method. With this method, semantic service description can be achieved by sem...To solve the problem of chaining distributed geographic information Web services (GI Web services), this paper provides an ontology-based method. With this method, semantic service description can be achieved by semantic annotation of the elements in a Web service description language(WSDL) document with concepts of geographic ontology, and then a common under-standing about service semantics between customers and providers of Web services is built. Based on the decomposition and formalization of customer requirements, the discovery, composition and execution of GI Web services are explained in detail, and then a chaining of GI Web services is built and used to achieve the customer's requirement. Finally, an example based on Web ontology language for service (OWL-S) is provided for testing the feasibility of this method.展开更多
Image keypoint detection and description is a popular method to find pixel-level connections between images,which is a basic and critical step in many computer vision tasks.The existing methods are far from optimal in...Image keypoint detection and description is a popular method to find pixel-level connections between images,which is a basic and critical step in many computer vision tasks.The existing methods are far from optimal in terms of keypoint positioning accuracy and generation of robust and discriminative descriptors.This paper proposes a new end-to-end selfsupervised training deep learning network.The network uses a backbone feature encoder to extract multi-level feature maps,then performs joint image keypoint detection and description in a forward pass.On the one hand,in order to enhance the localization accuracy of keypoints and restore the local shape structure,the detector detects keypoints on feature maps of the same resolution as the original image.On the other hand,in order to enhance the ability to percept local shape details,the network utilizes multi-level features to generate robust feature descriptors with rich local shape information.A detailed comparison with traditional feature-based methods Scale Invariant Feature Transform(SIFT),Speeded Up Robust Features(SURF)and deep learning methods on HPatches proves the effectiveness and robustness of the method proposed in this paper.展开更多
From the perspective of carbon disclosure goal,the paper defined the detail types of contents about carbon information disclosure,then constructed the carbon information disclosure index,by using the indices to 2011 a...From the perspective of carbon disclosure goal,the paper defined the detail types of contents about carbon information disclosure,then constructed the carbon information disclosure index,by using the indices to 2011 annual report of A-share listed companies in Shanghai and Shenzhen Security Exchange,we found that Chinese enterprises' carbon disclosure scattered,industry structure quite different characteristics,quantity information and quality information asymmetry.展开更多
目前,煤矿使用的工程专题地图基本都是CAD制图,高效提取CAD图件中的数据并快速组织成地理信息系统(GIS)服务,进而支持矿井空间对象创建和业务属性扩展,集成安全生产实时数据,是构建煤矿GIS一张图的关键。基于ArcGIS平台将CAD图件转为GI...目前,煤矿使用的工程专题地图基本都是CAD制图,高效提取CAD图件中的数据并快速组织成地理信息系统(GIS)服务,进而支持矿井空间对象创建和业务属性扩展,集成安全生产实时数据,是构建煤矿GIS一张图的关键。基于ArcGIS平台将CAD图件转为GIS服务的方法实现过程较为繁琐,且ArcGIS平台成本较高,无法较好地跨平台运行。针对该问题,设计了一种煤矿GIS一张图快速构建平台。该平台包括CAD图件管理、地图服务发布、专题地图管理3大功能模块:CAD图件管理模块用于图件基础信息管理和状态跟踪,地图服务发布模块用于地图打包发布和在线预览,专题地图管理模块用于地图服务管理、矿井对象创建及属性扩展。基于开放设计联盟(ODA)的Teigha for Java SDK实现CAD图件全要素精确识别与快速准确提取;通过构建基于GIS数据特征的煤矿CAD图件数据分层描述模型,实现了CAD图件全要素数据快速存储;按照面向对象设计思路,开发了Spring Cloud框架下的Web端煤矿CAD图件数据集存储接口及专题地图服务发布平台,实现了煤矿GIS一张图快速构建。以某煤矿采掘工程平面图为例,分别采用传统方法和快速构建平台进行煤矿GIS一张图的构建,对比结果表明,快速构建平台可大幅提高煤矿GIS一张图的构建效率,为煤矿智能化建设提供时空数字底座。展开更多
In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be comp...In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be computed. Combining the imaging wave function set {ψi(x)} and distorted wave function set {b_i(p)} and two integral equations they satisfy derives the expression of the amount of information. The design method of matched filter connected with its amount of information is studied, and their amounts of information belonging to different pattern recognition systems are illustrated. It can be seen that the difference of the amounts of information for various systems is obvious.展开更多
Purpose–The purpose of this paper is to show how description logics(DLs)can be applied to formalizing the information bearing capability(IBC)of paths in entity-relationship(ER)schemata.Design/methodology/approach–Th...Purpose–The purpose of this paper is to show how description logics(DLs)can be applied to formalizing the information bearing capability(IBC)of paths in entity-relationship(ER)schemata.Design/methodology/approach–The approach follows and extends the idea presented in Xu and Feng(2004),which applies DLs to classifying paths in an ER schema.To verify whether the information content of a data construct(e.g.a path)covers a semantic relation(which formulates a piece of information requirement),the principle of IBC under the source-bearer-receiver framework is presented.It is observed that the IBC principle can be formalized by constructing DL expressions and examining constructors(e.g.quantifiers).Findings–Description logic can be used as a tool to describe the meanings represented by paths in an ER schema and formalize their IBC.The criteria for identifying data construct distinguishability are also discovered by examining quantifiers in DL expressions of paths of an ER schema.Originality/value–This paper focuses on classifying paths in data schemas and verifying their formalized IBC by using DLs and the IBC principle.It is a new point of view for evaluation of data representation,which looks at the information borne by data but not data dependencies.展开更多
基金This research was funded by Prince Sattam bin Abdulaziz University(Project Number PSAU/2023/01/25387).
文摘The research aims to improve the performance of image recognition methods based on a description in the form of a set of keypoint descriptors.The main focus is on increasing the speed of establishing the relevance of object and etalon descriptions while maintaining the required level of classification efficiency.The class to be recognized is represented by an infinite set of images obtained from the etalon by applying arbitrary geometric transformations.It is proposed to reduce the descriptions for the etalon database by selecting the most significant descriptor components according to the information content criterion.The informativeness of an etalon descriptor is estimated by the difference of the closest distances to its own and other descriptions.The developed method determines the relevance of the full description of the recognized object with the reduced description of the etalons.Several practical models of the classifier with different options for establishing the correspondence between object descriptors and etalons are considered.The results of the experimental modeling of the proposed methods for a database including images of museum jewelry are presented.The test sample is formed as a set of images from the etalon database and out of the database with the application of geometric transformations of scale and rotation in the field of view.The practical problems of determining the threshold for the number of votes,based on which a classification decision is made,have been researched.Modeling has revealed the practical possibility of tenfold reducing descriptions with full preservation of classification accuracy.Reducing the descriptions by twenty times in the experiment leads to slightly decreased accuracy.The speed of the analysis increases in proportion to the degree of reduction.The use of reduction by the informativeness criterion confirmed the possibility of obtaining the most significant subset of features for classification,which guarantees a decent level of accuracy.
基金Supported by University Grant Commission,New Delhi,India[Grant No.F.14-2(SC)/2010(SA-Ⅲ)]
文摘Adansonia digitata L.(Malvaceae) is commonly known as baobab tree native to Africa.Baobab is a multi-purpose tree which offers protection and provides food,clothing and medicine as well as raw material for many useful items.The fruit pulp,seeds,leaves,flowers.roots,and bark of baobab are edible and they have been studied by scientists for their useful properties.The fruit pulp have very high vitamin C.calcium,phosphorus,carbohydrates,fibers,potassium,proteins and lipids content,which can be used in seasoning as an appetizer and also make juices.Seeds contain appreciable quantities of phosphorus,magnesium,zinc,sodium,iron,manganese,whereas they have high levels of lysine,thiamine,calcium and iron.Baobab has numerous biological properties including antimicrobial,anti-malarial,diarrhoea,anaemia,asthma,antiviral,anti-oxidant and anti-inflammatory activities amongst others.Phytochemical investigation revealed the presence of flavonoids.phytosterols.amino acids,fatty acids,vitamins and minerals.The review summarizes the information on various aspects of traditional information,taxonomic description,medicinal properties and importantly nutritional value.
文摘Data breaches have massive consequences for companies, affecting them financially and undermining their reputation, which poses significant challenges to online security and the long-term viability of businesses. This study analyzes trends in data breaches in the United States, examining the frequency, causes, and magnitude of breaches across various industries. We document that data breaches are increasing, with hacking emerging as the leading cause. Our descriptive analyses explore factors influencing breaches, including security vulnerabilities, human error, and malicious attacks. The findings provide policymakers and businesses with actionable insights to bolster data security through proactive audits, patching, encryption, and response planning. By better understanding breach patterns and risk factors, organizations can take targeted steps to enhance protections and mitigate the potential damage of future incidents.
文摘The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.
基金the National Natural Science Fundation ofChina (60774041)
文摘To solve the problem of chaining distributed geographic information Web services (GI Web services), this paper provides an ontology-based method. With this method, semantic service description can be achieved by semantic annotation of the elements in a Web service description language(WSDL) document with concepts of geographic ontology, and then a common under-standing about service semantics between customers and providers of Web services is built. Based on the decomposition and formalization of customer requirements, the discovery, composition and execution of GI Web services are explained in detail, and then a chaining of GI Web services is built and used to achieve the customer's requirement. Finally, an example based on Web ontology language for service (OWL-S) is provided for testing the feasibility of this method.
基金This work was supported by the National Natural Science Foundation of China(61871046,SM,http://www.nsfc.gov.cn/).
文摘Image keypoint detection and description is a popular method to find pixel-level connections between images,which is a basic and critical step in many computer vision tasks.The existing methods are far from optimal in terms of keypoint positioning accuracy and generation of robust and discriminative descriptors.This paper proposes a new end-to-end selfsupervised training deep learning network.The network uses a backbone feature encoder to extract multi-level feature maps,then performs joint image keypoint detection and description in a forward pass.On the one hand,in order to enhance the localization accuracy of keypoints and restore the local shape structure,the detector detects keypoints on feature maps of the same resolution as the original image.On the other hand,in order to enhance the ability to percept local shape details,the network utilizes multi-level features to generate robust feature descriptors with rich local shape information.A detailed comparison with traditional feature-based methods Scale Invariant Feature Transform(SIFT),Speeded Up Robust Features(SURF)and deep learning methods on HPatches proves the effectiveness and robustness of the method proposed in this paper.
文摘From the perspective of carbon disclosure goal,the paper defined the detail types of contents about carbon information disclosure,then constructed the carbon information disclosure index,by using the indices to 2011 annual report of A-share listed companies in Shanghai and Shenzhen Security Exchange,we found that Chinese enterprises' carbon disclosure scattered,industry structure quite different characteristics,quantity information and quality information asymmetry.
文摘目前,煤矿使用的工程专题地图基本都是CAD制图,高效提取CAD图件中的数据并快速组织成地理信息系统(GIS)服务,进而支持矿井空间对象创建和业务属性扩展,集成安全生产实时数据,是构建煤矿GIS一张图的关键。基于ArcGIS平台将CAD图件转为GIS服务的方法实现过程较为繁琐,且ArcGIS平台成本较高,无法较好地跨平台运行。针对该问题,设计了一种煤矿GIS一张图快速构建平台。该平台包括CAD图件管理、地图服务发布、专题地图管理3大功能模块:CAD图件管理模块用于图件基础信息管理和状态跟踪,地图服务发布模块用于地图打包发布和在线预览,专题地图管理模块用于地图服务管理、矿井对象创建及属性扩展。基于开放设计联盟(ODA)的Teigha for Java SDK实现CAD图件全要素精确识别与快速准确提取;通过构建基于GIS数据特征的煤矿CAD图件数据分层描述模型,实现了CAD图件全要素数据快速存储;按照面向对象设计思路,开发了Spring Cloud框架下的Web端煤矿CAD图件数据集存储接口及专题地图服务发布平台,实现了煤矿GIS一张图快速构建。以某煤矿采掘工程平面图为例,分别采用传统方法和快速构建平台进行煤矿GIS一张图的构建,对比结果表明,快速构建平台可大幅提高煤矿GIS一张图的构建效率,为煤矿智能化建设提供时空数字底座。
基金Project supported by the National Natural Science Foundation of China.
文摘In order to relate the design and analysis of an optical pattern recognition system with the structural parameters, only by introducing the prolate spheroidal wave function (PSWF) can the amount of information be computed. Combining the imaging wave function set {ψi(x)} and distorted wave function set {b_i(p)} and two integral equations they satisfy derives the expression of the amount of information. The design method of matched filter connected with its amount of information is studied, and their amounts of information belonging to different pattern recognition systems are illustrated. It can be seen that the difference of the amounts of information for various systems is obvious.
基金This work has been funded by Scientific Research Common Program of Beijing Municipal Commission of Education(No.KM201311417011)the Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions(No.CIT&TCD201404089)Funding project of Beijing Philosophy and Social Science Research Program(No.11JGB039).
文摘Purpose–The purpose of this paper is to show how description logics(DLs)can be applied to formalizing the information bearing capability(IBC)of paths in entity-relationship(ER)schemata.Design/methodology/approach–The approach follows and extends the idea presented in Xu and Feng(2004),which applies DLs to classifying paths in an ER schema.To verify whether the information content of a data construct(e.g.a path)covers a semantic relation(which formulates a piece of information requirement),the principle of IBC under the source-bearer-receiver framework is presented.It is observed that the IBC principle can be formalized by constructing DL expressions and examining constructors(e.g.quantifiers).Findings–Description logic can be used as a tool to describe the meanings represented by paths in an ER schema and formalize their IBC.The criteria for identifying data construct distinguishability are also discovered by examining quantifiers in DL expressions of paths of an ER schema.Originality/value–This paper focuses on classifying paths in data schemas and verifying their formalized IBC by using DLs and the IBC principle.It is a new point of view for evaluation of data representation,which looks at the information borne by data but not data dependencies.