This research aims to integrate Bekenstein’s bound and Landauer’s principle, providing a unified framework to understand the limits of information and energy in physical systems. By combining these principles, we ex...This research aims to integrate Bekenstein’s bound and Landauer’s principle, providing a unified framework to understand the limits of information and energy in physical systems. By combining these principles, we explore the implications for black hole thermodynamics, astrophysics, astronomy, information theory, and the search for new laws of nature. The result includes an estimation of the number of bits stored in a black hole (less than 1.4 × 10<sup>30</sup> bits/m<sup>3</sup>), enhancing our understanding of information storage in extreme gravitational environments. This integration offers valuable insights into the fundamental nature of information and energy, impacting scientific advancements in multiple disciplines.展开更多
Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However,...Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.展开更多
Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage ...Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are: (i) information leakage in imperative program, (ii) imperative multi- threaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.展开更多
As per Hawking and Bekenstein’s work on black holes, information resides on the surface and there is a limit on it amounting to a bit for every Planck area. It would seem therefore that extra dimensions would logical...As per Hawking and Bekenstein’s work on black holes, information resides on the surface and there is a limit on it amounting to a bit for every Planck area. It would seem therefore that extra dimensions would logically lead to a hyper-surface for a black hole and consequently a reduction of the corresponding information density due to the dilution effect of these additional dimensions. The present paper argues that the counterintuitive opposite of the above is what should be expected. This surprising result is a consequence of a well known theorem on measure concentration due to I. Dvoretzky.展开更多
How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form cou...How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form could be easily known in some certain way while the parameters are hard to determine. In this paper, based on the evidence theory, a new method is presented to fuse the information of multiple sources and determine the parameters of the prior distribution when the form is known. By taking the prior distributions which result from the information of multiple sources and converting them into corresponding mass functions which can be combined by Dempster-Shafer (D-S) method, we get the combined mass function and the representative points of the prior distribution. These points are used to fit with the given distribution form to determine the parameters of the prior distribution. And then the fused prior distribution is obtained and Bayesian analysis can be performed. How to convert the prior distributions into mass functions properly and get the representative points of the fused prior distribution is the central question we address in this paper. The simulation example shows that the proposed method is effective.展开更多
The 21th century is a "quality century". Facing the s evere challenge about quality, all the developed industry countries attach impor tance to the research and education about quality project. With the deep...The 21th century is a "quality century". Facing the s evere challenge about quality, all the developed industry countries attach impor tance to the research and education about quality project. With the deepening of the reform of China and it’s joining to WTO, many industries and enterprises wi ll be confronted with severe challenge while being offered the opportunity to wa lk up to the world. The arrival of knowledge economy and web time has provided t he space for the innovation on enterprise management. It has also provided new m ethod and model for enterprise management, that is online management based on th e internet. The online management use an enterprise model including the goal of the enterprise and the scheme to carry out it to represent the whole operational of all the work. The online management is constructed on the integration of exp ert system, database, software and other technical models. How to scientifically manage the entire system of product, precisely master the condition of quantity and quality and analyze the rules of the change of produc t quality in order to carry out the overall control of quality, guarantee the go od condition of product as well as improve product quality and prolong it’s se rvice life was discussed in this thesis. Based on the above research the thesis also discussed how to develop the study on product quality information and const ruct it’s decision making support system. The concrete measures to improve peopl e’s concept of quality are also raised. Based on the type analysis, scientific management of product quality information should start from dynamic information of quality, instruction information as we ll as the information about the use, maintain, management and conservation of pr oduct, and induce them and further propose a design scheme of feedback system on product quality information, and then set up the blueprint of the information s ystem of product quality. This thesis included 7 chapters:1.the type of quality information;2.the content of quality information;3.the construction of the se nsitive web for transfering information, and collecting and transfering quality information rapidly and effectively;4.the way and procedure to transfer informa tion;5.the construction of quality information library for all phases; 6.the d isposal of quality information;7.the decision making support system of the mana gement of quality information;8.attach importance to three key factors on impro ving quality concept.展开更多
‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new envir...‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.展开更多
The North-East China is nation commercial grain base of China.It provides important grain supply for other areas of the country every year.The nation and modern farmers are looking for advanced technological solutions...The North-East China is nation commercial grain base of China.It provides important grain supply for other areas of the country every year.The nation and modern farmers are looking for advanced technological solutions to increase production and preserve environment.Considering of this aim,this paper introduce a new planning that using 3S technology to develop precision farming,explaining its technology frame,operation steps and advantages.On the other hand,this paper also introduce the concept of precision farming and discusses the role of 3S technology as a data collection,management and analysis tool.展开更多
Mosquitoes are an interesting topic due to their medical importance, as they play an active role in the transmission of many pathogens and parasites, acting as vectors for various pathologies that are deadly to humans...Mosquitoes are an interesting topic due to their medical importance, as they play an active role in the transmission of many pathogens and parasites, acting as vectors for various pathologies that are deadly to humans, such as dengue, yellow fever, chikungunya, West Nile virus, encephalitis and malaria, among many others that are less common. In terms of morbidity and mortality caused by vector-borne diseases, mosquitoes are the most dangerous animals for humanity and, although they also play a role in the ecosystem as a food source for other organisms, their importance for public health cannot be overlooked. As highly efficient vectors, they put more than three billion people at risk, mainly in tropical and subtropical regions as well as in Europe, since heat waves and flooding are becoming more frequent and severe, and summers are getting longer and warmer, accelerating mosquito development, biting rates, and the incubation of the pathogens within their bodies. Female mosquitoes bite to acquire proteins for the development of their ovaries and eggs and, in the process, acquire pathogens and/or parasites from one vertebrate host and transmit them to another, usually after a short period of replication. Three of their four life stages are lived in still freshwater, so it is crucial to understand their range of action when they reach adulthood and leave the water, in order to plan and implement local prevention measures. A set of georeferenced abundance data collected in mainland Portugal over seven years was linked to cartographed water bodies in a geographic information system to estimate the distances at which Culex pipiens s.l. had a significant presence, with criteria based on the size of the catches. The result allows for an estimate of the fly range of those mosquitoes, which can be used to focus countermeasures.展开更多
Under the condition of asymmetric information,the Spence 's Job Market Signaling Model is generally applied to inspect the design capability of a designer and his labor and efforts to be invested; however,since th...Under the condition of asymmetric information,the Spence 's Job Market Signaling Model is generally applied to inspect the design capability of a designer and his labor and efforts to be invested; however,since the"prior probability"and "posterior probability"have great uncertainties,the practical effect of this model is poor. On the basis of analyzing reverse selection questions,this paper provides a design capability screening model,which can make a designer automatically expose his hidden information so that necessary actions can be taken as required by the owner to realize risk sharing. A calculation example is finally given to demonstrate that the new model is helpful for an owner to select a designer with high professional level and to lead the designer to work hard,so it is of significant application value.展开更多
Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to ...Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to known data, one unit of chip output can drive up to ten units of output in the electronic information industry and 100 units of GDP (Gross Domestic Product). The Chip Information Industry is a strategic industry in most developed countries in Europe and North America. The development of the Chip Information Industry is related to national economies and personal livelihoods. Moore discovered a certain trend after analyzing data: in general, every newly produced chip has twice the capacity of the previous generation, and it takes 18 to 24 months for the next generation to be subsequently invented. This trend has come to be known as Moore’s Law. It applies not only to the development of memory chips but also to the evolutionary paths of processor capability and disk drive storage capacity. Moore’s Law has become the basis of performance prediction in several industries. However, since 2011, the size of silicon transistors has been approaching its physical limit at the atomic level. Due to the nature of silicon, additional breakthroughs in the running speed and performance of silicon transistors are severely limited. Elevated temperature and leakage are the two main sources that invalidate Moore’s Law. To counter these issues, This paper analyzes specific problems challenges in the Chip Information Industry, including the development of carbon nanotube chips and fierce competition in the international Chip Information Industry. In addition, this paper undertakes a critical analysis of the Chinese Chip Information Industry and countermeasures to Chinese Chip Information Industry development.展开更多
China’s opening,reform and economicdevelopment,as well as the worldinformation technology revolution,hasenhanced China’s information consultancyservice.Before 1978,China’s economy wasa product economy governed by a...China’s opening,reform and economicdevelopment,as well as the worldinformation technology revolution,hasenhanced China’s information consultancyservice.Before 1978,China’s economy wasa product economy governed by a highly-centralized planning system with economicinformation basically based on statisticscollected from lower levels and planningcommands to lower levels.The annual productexchange meetings sponsored by specialeconomic departments became the mainchannels for information exchange,soinformation services basically failed to meetneeds.In 1979,China’s economy began itstransfer from a planned to a market one。展开更多
文摘This research aims to integrate Bekenstein’s bound and Landauer’s principle, providing a unified framework to understand the limits of information and energy in physical systems. By combining these principles, we explore the implications for black hole thermodynamics, astrophysics, astronomy, information theory, and the search for new laws of nature. The result includes an estimation of the number of bits stored in a black hole (less than 1.4 × 10<sup>30</sup> bits/m<sup>3</sup>), enhancing our understanding of information storage in extreme gravitational environments. This integration offers valuable insights into the fundamental nature of information and energy, impacting scientific advancements in multiple disciplines.
文摘Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.
文摘Shannon observed the relation between information entropy and Maxwell demon experiment to come up with information entropy formula. After that, Shannon's entropy formula is widely used to measure information leakage in imperative programs. But in the present work, our aim is to go in a reverse direction and try to find possible Maxwell's demon experimental setup for contemporary practical imperative programs in which variations of Shannon's entropy formula has been applied to measure the information leakage. To establish the relation between the second principle of thermodynamics and quantitative analysis of information leakage, present work models contemporary variations of imperative programs in terms of Maxwell's demon experimental setup. In the present work five contemporary variations of imperative program related to information quantification are identified. They are: (i) information leakage in imperative program, (ii) imperative multi- threaded program, (iii) point to point leakage in the imperative program, (iv) imperative program with infinite observation, and (v) imperative program in the SOA-based environment. For these variations, minimal work required by an attacker to gain the secret is also calculated using historical Maxwell's demon experiment. To model the experimental setup of Maxwell's demon, non-interference security policy is used. In the present work, imperative programs with one-bit secret information have been considered to avoid the complexity. The findings of the present work from the history of physics can be utilized in many areas related to information flow of physical computing, nano-computing, quantum computing, biological computing, energy dissipation in computing, and computing power analysis.
文摘As per Hawking and Bekenstein’s work on black holes, information resides on the surface and there is a limit on it amounting to a bit for every Planck area. It would seem therefore that extra dimensions would logically lead to a hyper-surface for a black hole and consequently a reduction of the corresponding information density due to the dilution effect of these additional dimensions. The present paper argues that the counterintuitive opposite of the above is what should be expected. This surprising result is a consequence of a well known theorem on measure concentration due to I. Dvoretzky.
文摘How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form could be easily known in some certain way while the parameters are hard to determine. In this paper, based on the evidence theory, a new method is presented to fuse the information of multiple sources and determine the parameters of the prior distribution when the form is known. By taking the prior distributions which result from the information of multiple sources and converting them into corresponding mass functions which can be combined by Dempster-Shafer (D-S) method, we get the combined mass function and the representative points of the prior distribution. These points are used to fit with the given distribution form to determine the parameters of the prior distribution. And then the fused prior distribution is obtained and Bayesian analysis can be performed. How to convert the prior distributions into mass functions properly and get the representative points of the fused prior distribution is the central question we address in this paper. The simulation example shows that the proposed method is effective.
文摘The 21th century is a "quality century". Facing the s evere challenge about quality, all the developed industry countries attach impor tance to the research and education about quality project. With the deepening of the reform of China and it’s joining to WTO, many industries and enterprises wi ll be confronted with severe challenge while being offered the opportunity to wa lk up to the world. The arrival of knowledge economy and web time has provided t he space for the innovation on enterprise management. It has also provided new m ethod and model for enterprise management, that is online management based on th e internet. The online management use an enterprise model including the goal of the enterprise and the scheme to carry out it to represent the whole operational of all the work. The online management is constructed on the integration of exp ert system, database, software and other technical models. How to scientifically manage the entire system of product, precisely master the condition of quantity and quality and analyze the rules of the change of produc t quality in order to carry out the overall control of quality, guarantee the go od condition of product as well as improve product quality and prolong it’s se rvice life was discussed in this thesis. Based on the above research the thesis also discussed how to develop the study on product quality information and const ruct it’s decision making support system. The concrete measures to improve peopl e’s concept of quality are also raised. Based on the type analysis, scientific management of product quality information should start from dynamic information of quality, instruction information as we ll as the information about the use, maintain, management and conservation of pr oduct, and induce them and further propose a design scheme of feedback system on product quality information, and then set up the blueprint of the information s ystem of product quality. This thesis included 7 chapters:1.the type of quality information;2.the content of quality information;3.the construction of the se nsitive web for transfering information, and collecting and transfering quality information rapidly and effectively;4.the way and procedure to transfer informa tion;5.the construction of quality information library for all phases; 6.the d isposal of quality information;7.the decision making support system of the mana gement of quality information;8.attach importance to three key factors on impro ving quality concept.
基金Supported by the National Social Science Fund of China(No.16BTQ058)
文摘‘Empowerment’is the result of pursuing special capabilities under a specific value orientation.The changes in related object capabilities triggered by scientific and technical information activities in the new environment are important to the national scientific and technical(S&T)information governance.Based on the empowerment theories and evaluation practices,this study attempts to construct an empowerment evaluation framework for national S&T information governance and takes the participatory technology assessment and Altmetrics methods as examples to demonstrate its advantages:1)The capability changes and development potential are regarded as important basis for evaluation;2)The multi-person participation and multi-indicator comprehensive evaluation method is conducive to the democratic and objective nature of science and technology information governance policy formulation.
文摘The North-East China is nation commercial grain base of China.It provides important grain supply for other areas of the country every year.The nation and modern farmers are looking for advanced technological solutions to increase production and preserve environment.Considering of this aim,this paper introduce a new planning that using 3S technology to develop precision farming,explaining its technology frame,operation steps and advantages.On the other hand,this paper also introduce the concept of precision farming and discusses the role of 3S technology as a data collection,management and analysis tool.
文摘Mosquitoes are an interesting topic due to their medical importance, as they play an active role in the transmission of many pathogens and parasites, acting as vectors for various pathologies that are deadly to humans, such as dengue, yellow fever, chikungunya, West Nile virus, encephalitis and malaria, among many others that are less common. In terms of morbidity and mortality caused by vector-borne diseases, mosquitoes are the most dangerous animals for humanity and, although they also play a role in the ecosystem as a food source for other organisms, their importance for public health cannot be overlooked. As highly efficient vectors, they put more than three billion people at risk, mainly in tropical and subtropical regions as well as in Europe, since heat waves and flooding are becoming more frequent and severe, and summers are getting longer and warmer, accelerating mosquito development, biting rates, and the incubation of the pathogens within their bodies. Female mosquitoes bite to acquire proteins for the development of their ovaries and eggs and, in the process, acquire pathogens and/or parasites from one vertebrate host and transmit them to another, usually after a short period of replication. Three of their four life stages are lived in still freshwater, so it is crucial to understand their range of action when they reach adulthood and leave the water, in order to plan and implement local prevention measures. A set of georeferenced abundance data collected in mainland Portugal over seven years was linked to cartographed water bodies in a geographic information system to estimate the distances at which Culex pipiens s.l. had a significant presence, with criteria based on the size of the catches. The result allows for an estimate of the fly range of those mosquitoes, which can be used to focus countermeasures.
基金Sponsored by State Key Laboratory of Subtropical Building Science,Autonomous Research Topics(Grant No.x2tjc7100870)
文摘Under the condition of asymmetric information,the Spence 's Job Market Signaling Model is generally applied to inspect the design capability of a designer and his labor and efforts to be invested; however,since the"prior probability"and "posterior probability"have great uncertainties,the practical effect of this model is poor. On the basis of analyzing reverse selection questions,this paper provides a design capability screening model,which can make a designer automatically expose his hidden information so that necessary actions can be taken as required by the owner to realize risk sharing. A calculation example is finally given to demonstrate that the new model is helpful for an owner to select a designer with high professional level and to lead the designer to work hard,so it is of significant application value.
文摘Chips are the carriers of ICs (integrated circuits). As a result of design, manufacturing, and packaging and testing processes, chips are typically wholly independent entities intended for immediate use. According to known data, one unit of chip output can drive up to ten units of output in the electronic information industry and 100 units of GDP (Gross Domestic Product). The Chip Information Industry is a strategic industry in most developed countries in Europe and North America. The development of the Chip Information Industry is related to national economies and personal livelihoods. Moore discovered a certain trend after analyzing data: in general, every newly produced chip has twice the capacity of the previous generation, and it takes 18 to 24 months for the next generation to be subsequently invented. This trend has come to be known as Moore’s Law. It applies not only to the development of memory chips but also to the evolutionary paths of processor capability and disk drive storage capacity. Moore’s Law has become the basis of performance prediction in several industries. However, since 2011, the size of silicon transistors has been approaching its physical limit at the atomic level. Due to the nature of silicon, additional breakthroughs in the running speed and performance of silicon transistors are severely limited. Elevated temperature and leakage are the two main sources that invalidate Moore’s Law. To counter these issues, This paper analyzes specific problems challenges in the Chip Information Industry, including the development of carbon nanotube chips and fierce competition in the international Chip Information Industry. In addition, this paper undertakes a critical analysis of the Chinese Chip Information Industry and countermeasures to Chinese Chip Information Industry development.
文摘China’s opening,reform and economicdevelopment,as well as the worldinformation technology revolution,hasenhanced China’s information consultancyservice.Before 1978,China’s economy wasa product economy governed by a highly-centralized planning system with economicinformation basically based on statisticscollected from lower levels and planningcommands to lower levels.The annual productexchange meetings sponsored by specialeconomic departments became the mainchannels for information exchange,soinformation services basically failed to meetneeds.In 1979,China’s economy began itstransfer from a planned to a market one。