[Objective] The aim was to set up a plant digital information retrieval system.[Method] Plant digital information retrieval system was designed by combining with Microsoft Visual Basic 6.0 Enterprise Edition database ...[Objective] The aim was to set up a plant digital information retrieval system.[Method] Plant digital information retrieval system was designed by combining with Microsoft Visual Basic 6.0 Enterprise Edition database management system and Structure Query Language.[Result] The system realized electronic management and retrieval of local plant information.The key words of retrieval included family,genus,formal name,Chinese name,Latin,morphological characteristics,habitat,collection people,collection places,and protect class and so on.[Conclusion] It provided reference for these problems of species identification and digital management of herbarium.展开更多
For eliminating the zero-order image in digital holography, a new method using the differential of the hologram intensity instead of the hologram itself for numerical reconstruction is proposed. This method is based o...For eliminating the zero-order image in digital holography, a new method using the differential of the hologram intensity instead of the hologram itself for numerical reconstruction is proposed. This method is based on digital image processing. By analyzing the spatial spectrum of the off-axis digital hologram, it theoretically proves that the zero-order image can be effectively eliminated by differential before reconstruction. Then, the detected hologram is processed in the program with differential and reconstruction. Both the theoretical analysis and digital reconstruction results show that it can effectively eliminate the large bright spot in the center of the reconstructed image caused by the zero-order image, improve the image quality significantly, and render a better contrast of the reconstructed image. This method is very simple and convenient due to no superfluous optical elements and requiring only one time record.展开更多
Using informational digital diagrams, we analyzed the snow event that occurred on Feb 26, 2006 and the sandstorm on Apr 11, 2006 in Xi'an. Results indicate that, under similar weather circumstances, different events ...Using informational digital diagrams, we analyzed the snow event that occurred on Feb 26, 2006 and the sandstorm on Apr 11, 2006 in Xi'an. Results indicate that, under similar weather circumstances, different events evidently exhibit unique vertical structure features. Informational digital diagrams provide a method for transitional weather prediction, a problem for present extrapolative analysis system.展开更多
One crucial issue in particle filtering is the selection of proposal distribution. Good proposal can effectively alleviate particle degeneracy and thus improve filtering accuracy. In this paper, we propose a new type ...One crucial issue in particle filtering is the selection of proposal distribution. Good proposal can effectively alleviate particle degeneracy and thus improve filtering accuracy. In this paper, we propose a new type of proposal distribution for particle filter, called as R-IEKF proposal. By combining iterated extended kalman filter with Rauch-Tung-Striebel optimal smoother, the new proposal integrates the latest observation into system and approximates the true posterior distribution reasonably well, hence generating more precise and stable particles against measurement noise. The simulation results indicate that the improved particle filter with R-IEKF proposal prevails over PF-EKF and UPF both in tracking accuracy and filtering stability. Consequently, PF-RIEKF is a competitive choice in noisy measurement environment.展开更多
There are mainly four kinds of models to record and deal with historical information. By taking them as reference, the spatio-temporal model based on event semantics is proposed. In this model, according to the way fo...There are mainly four kinds of models to record and deal with historical information. By taking them as reference, the spatio-temporal model based on event semantics is proposed. In this model, according to the way for describing an event, all the information are divided into five domains. This paper describes the model by using the land parcel change in the cadastral information system, and expounds the model by using five tables corresponding to the five domains. With the aid of this model, seven examples are given on historical query, trace back and recurrence. This model can be implemented either in the extended relational database or in the object-oriented database.展开更多
In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, wh...In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, which usually contain some sensitive information of personal or analysis, will result in leakage of user privacy. Therefore, it is becoming increasingly important to protect privacy information in data publishing. In this paper, we focus on the multi-type self-identified format-preserving encryption. First, we introduce a multi-type self-identified format-preserving encryption system and discuss the encryption of various types of data in this system. Then, for the format preserving encryption(FPE) about Chinese name, we study from the encryption model construction and basic encryption scheme. The format-preserving encryption model about Chinese name is constructed and the concept of the name library is presented. Based on this, it is used to not only limit the message space to reduce complexity, but also ensure the cipher in accordance with the Chinese naming habits. In addition, according to the encryption and decryption model, format-preserving encryption process of Chinese name is designed. In order to add new names, the algorithm of name space expansion is proposed. Based on the Prefix, this paper put forward an algorithm named Cycle-Prefix, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption. Compared with the traditional Prefix algorithm, experiments show that Cycle-Prefix can not only complete the task of FPE for Chinese name, but also encrypt same plain text into different ciphers under the premise of similar efficiency with Prefix.展开更多
This paper attempts to analyze geothermy revealed by the sounding data at 8 h and 20 h every day from China Meteorological Administration and the data counted per minute such as the wellhead temperature,the electromag...This paper attempts to analyze geothermy revealed by the sounding data at 8 h and 20 h every day from China Meteorological Administration and the data counted per minute such as the wellhead temperature,the electromagnetic disturbance,the ground tilt and so of water level instrument in Sanxing of Chengdu with the method of information digitization.The result shows the recognizable differentiation of the change process before and after the earthquake,provides an analytic method for the improvement of earthquake prediction or prevention,and shows the feasible further research and the wide application prospect.展开更多
In this paper a review on current research on 3DCM is presented, and an alternative approach by integrating the concepts and techniques of object\|oriented method and Computer Aided Design (CAD) is suggested. Through ...In this paper a review on current research on 3DCM is presented, and an alternative approach by integrating the concepts and techniques of object\|oriented method and Computer Aided Design (CAD) is suggested. Through the approach urban spatial entities as objects are extracted, which are represented with primary 3D elements (node, edge, face and body) and their combinations. In the light of the concept of object, the method supports the multiple representation of Level of Details (LOD). More importantly, topological relationships between objects are described so that 3D topological operations can be implemented.展开更多
In Chinese, dependency analysis has been shown to be a powerful syntactic parser because the order of phrases in a sentence is relatively free compared with English. Conventional dependency parsers require a number of...In Chinese, dependency analysis has been shown to be a powerful syntactic parser because the order of phrases in a sentence is relatively free compared with English. Conventional dependency parsers require a number of sophisticated rules that have to be handcrafted by linguists, and are too cumbersome to maintain. To solve the problem, a parser using SVM (Support Vector Machine) is introduced. First, a new strategy of dependency analysis is proposed. Then some chosen feature types are used for learning and for creating the modification matrix using SVM. Finally, the dependency of phrases in the sentence is generated. Experiments conducted to analyze how each type of feature affects parsing accuracy, showed that the model can increase accuracy of the dependency parser by 9.2%.展开更多
In China, many scenic and tourism areas are suffering from the urbanization that results from physical development of tourism projects, leading to the removal of the vegetative cover, the creation of areas impermeable...In China, many scenic and tourism areas are suffering from the urbanization that results from physical development of tourism projects, leading to the removal of the vegetative cover, the creation of areas impermeable to water, in-stream modifications, and other problems. In this paper, the risk of soil erosion and its ecological risks in the West Lake Scenic Spots (WLSS) area were quantitatively evaluated by integrating the revised universal soil loss equation (RUSLE) with a digital elevation model (DEM) and geographical information system (GIS) software. The standard RUSLE factors were modified to account for local climatic and topographic characteristics reflected in the DEM maps, and for the soil types and vegetation cover types. An interface was created between the Areinfo software and RUSLE so that the level of soil erosion and its ecological risk in the WLSS area could be mapped immediately once the model factors were defined for the area. The results from an analysis using the Areinfo-RUSLE interface showed that the risk value in 93 % of the expanding western part of the WLSS area was moderate or more severe and the soil erosion risk in this area was thus large compared with that in the rest of the area. This paper mainly aimed to increase the awareness of the soil erosion risk in urbanizing areas and suggest that the local governments should consider the probable ecological risk resulting from soil erosion when enlarging and developing tourism areas.展开更多
The present study aimed to design, develop, operate and evaluate a sightseeing navigation system in order to support foreign tourists' efficient acquisition of sightseeing spot information in Japanese urban tourist a...The present study aimed to design, develop, operate and evaluate a sightseeing navigation system in order to support foreign tourists' efficient acquisition of sightseeing spot information in Japanese urban tourist areas, about which a variety of information is transmitted, by enabling information to be accumulated, shared and recommended. The system was developed by integrating Web-GIS (Geographic Information Systems), SNS (Social Networking Services) as well as the recommendation system into a single system. The system used the non-language information such as signs, marks and pictograms in addition to English information, and displayed sightseeing spot information and conduct navigation on 2D and 3D digital maps of the Web-GIS. Additionally, the system was operated for two weeks in the central part of Yokohama city in Kanagawa Prefecture, Japan, and the total number of users was 54. Based on the results of the web questionnaire survey, all of the specific functions are highly evaluated, and the usefulness of the system when sightseeing was excellent. From the results of the access analysis of users' log data, it is evident that it can be said that the system was mainly used before sightseeing and users confirm their favorite sightseeing spots and made their tour planning in advance, using 2D and 3D digital maps.展开更多
The digital communication in a system of two multi-mode solid state chaotic lasers is investigated theoretically. If the usual method working well in a single-mode laser system is applied to a multi-mode laser system,...The digital communication in a system of two multi-mode solid state chaotic lasers is investigated theoretically. If the usual method working well in a single-mode laser system is applied to a multi-mode laser system, the memory effect of the two nearest digits can cause high rate of mistakes when the digits are decoded through the subtraction of receiver output from the transmittal. By introducing the deviations of two nearest maximum and minimum fluctuationsof the signal to decode the digit, the message can be decoded correctly. Also, this communication method does not critically depend on the quality of the chaotic synchronization of the two multi-mode lasers.展开更多
Analyzed and compared with some digitizeed mine build state first.Secondly analyzed opportunity and challenge that the Chinese mine faces,and pointed out certainty and necessity of building digitization of mine,Summar...Analyzed and compared with some digitizeed mine build state first.Secondly analyzed opportunity and challenge that the Chinese mine faces,and pointed out certainty and necessity of building digitization of mine,Summarized the present task that charac- teristic,DM,MGIS of the digital mine develop and construct and employ finally,and carry on the summary to structure and function of the component mine integrated information system.展开更多
Pattern Time Delay Shift Coding (PDS) scheme is robust for underwater acoustic communication. The digital information are encoded in the time delay shift values of the Pattern, so the PDS scheme belongs to the Pulse P...Pattern Time Delay Shift Coding (PDS) scheme is robust for underwater acoustic communication. The digital information are encoded in the time delay shift values of the Pattern, so the PDS scheme belongs to the Pulse Position Modulation (PPM). Several Patterns are selected for code division that the communication system could have a high ability to mitigate the inter-symbol interference (ISI) caused by multipath channel. Four communication channels work on the same time divided by different frequency, which lead to 1000bits/s of the data rate of communication. The simulation experiments show that the PDS system could adapt to many underwater acoustic channels for high data rate and high reliability.展开更多
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat...Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.展开更多
Global Memory Net (GMNet) is intended to be an effective gateway to the world cultural, historical, and heritage image collections from selected academic educational and research partners in the world. Much of these u...Global Memory Net (GMNet) is intended to be an effective gateway to the world cultural, historical, and heritage image collections from selected academic educational and research partners in the world. Much of these unique collections of great value to education and research are not currently accessible due to distance, form, and technical barriers. This project is to find new ways to enable users to access and exploit these significant research collections via global network. As GMNet is ending its first 5-year phase in October 2005, it has contributed substantially to the community building in digital library development by ac- commodating numerous collaborators and technical staff from various parts of the world to spend 3 to 5 months as a full-member of the GMNet team in Boston. They have come from different parts of China—such as Sichuan, Hainan, Shanghai and Xi’an; Croatia; and Hanoi, Vietnam. In addition to contribute to the overall system development and enhancement of system function- alities, they have brought valuable sample image collections of their own institutions/countries, and actually developed prototype collections as a part of GMNet. This paper describes the exciting and productive experience of the first of this visiting research group in developing the GMNet’s Version 2.0 PHP-based system under Prof. Chen’s overall supervision. It also describes both the system’s technical level structure—user/Web-based application/data, and complex functionalities with multi-collection, multi-lingual, multi-modal searching capabilities; system management capabilities; as well as provisions for user uploads and retrieval for our own projects. This Version 2.0 system is built on the Linux/Apache/PHP/MySQL platform. What is described in this paper is an actual case which has formed a base for further new development by others in the research group. It demonstrates fully the value of the synergistic collaboration among global partners for universal digital library development. More information can be found in http://www.memorynet.org/.展开更多
Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS infor...Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS informatiou in contexts, they do not utilize lexieal information which is crucial for resoMng certain morphologieal ambiguity. This paper proposes a method which incorporates lexieal information and wider context information into HMM. Model induction anti related smoothing technique are presented in detail. Experiments indicate that this technique improves the segmentation and tagging accuracy by nearly 1%.展开更多
Digital Chinese medicine(DCM)is an emerging interdisciplinary field developed from traditional Chinese medicine(TCM)and information science.In this article,we consider the significance and propose an architecture for ...Digital Chinese medicine(DCM)is an emerging interdisciplinary field developed from traditional Chinese medicine(TCM)and information science.In this article,we consider the significance and propose an architecture for DCM research,and highlight the key tasks that need to be performed to provide references for the integration of information science into Chinese medicine research.展开更多
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
基金Supported by Inner Mongolia Natural Science Fund(20080404MS0507)National Natural Science Fund(30660150)+1 种基金Education Ministry Higher Education School Science Innovation Project Major Program Cultivation Fund Program(707014)Inner Mongolia Natural Scientific Fund Major Program(200607010501)~~
文摘[Objective] The aim was to set up a plant digital information retrieval system.[Method] Plant digital information retrieval system was designed by combining with Microsoft Visual Basic 6.0 Enterprise Edition database management system and Structure Query Language.[Result] The system realized electronic management and retrieval of local plant information.The key words of retrieval included family,genus,formal name,Chinese name,Latin,morphological characteristics,habitat,collection people,collection places,and protect class and so on.[Conclusion] It provided reference for these problems of species identification and digital management of herbarium.
基金The Natural Science Foundation of Jiangsu Province (No.BK2006102)the National Natural Science Foundation of China(No.10772086)
文摘For eliminating the zero-order image in digital holography, a new method using the differential of the hologram intensity instead of the hologram itself for numerical reconstruction is proposed. This method is based on digital image processing. By analyzing the spatial spectrum of the off-axis digital hologram, it theoretically proves that the zero-order image can be effectively eliminated by differential before reconstruction. Then, the detected hologram is processed in the program with differential and reconstruction. Both the theoretical analysis and digital reconstruction results show that it can effectively eliminate the large bright spot in the center of the reconstructed image caused by the zero-order image, improve the image quality significantly, and render a better contrast of the reconstructed image. This method is very simple and convenient due to no superfluous optical elements and requiring only one time record.
文摘Using informational digital diagrams, we analyzed the snow event that occurred on Feb 26, 2006 and the sandstorm on Apr 11, 2006 in Xi'an. Results indicate that, under similar weather circumstances, different events evidently exhibit unique vertical structure features. Informational digital diagrams provide a method for transitional weather prediction, a problem for present extrapolative analysis system.
基金Sponsored by the National Natural Science Foundation of China (Grant No. 61136002 )Key Project of Chinese Ministry of Education (Grant No.211180)Shannxi Provincial Industrial and Technological Project(Grant No. 2011K06-47)
文摘One crucial issue in particle filtering is the selection of proposal distribution. Good proposal can effectively alleviate particle degeneracy and thus improve filtering accuracy. In this paper, we propose a new type of proposal distribution for particle filter, called as R-IEKF proposal. By combining iterated extended kalman filter with Rauch-Tung-Striebel optimal smoother, the new proposal integrates the latest observation into system and approximates the true posterior distribution reasonably well, hence generating more precise and stable particles against measurement noise. The simulation results indicate that the improved particle filter with R-IEKF proposal prevails over PF-EKF and UPF both in tracking accuracy and filtering stability. Consequently, PF-RIEKF is a competitive choice in noisy measurement environment.
文摘There are mainly four kinds of models to record and deal with historical information. By taking them as reference, the spatio-temporal model based on event semantics is proposed. In this model, according to the way for describing an event, all the information are divided into five domains. This paper describes the model by using the land parcel change in the cadastral information system, and expounds the model by using five tables corresponding to the five domains. With the aid of this model, seven examples are given on historical query, trace back and recurrence. This model can be implemented either in the extended relational database or in the object-oriented database.
基金supported by the National Natural Science Foundation of China under Grant(No.61772085),(No.61672109),(No.1472024)and.(No.61532012)
文摘In the era of big data, government, business and personal digital information will be possible for data mining. Data mining requires massive data as a support. However, the direct release of the original mass data, which usually contain some sensitive information of personal or analysis, will result in leakage of user privacy. Therefore, it is becoming increasingly important to protect privacy information in data publishing. In this paper, we focus on the multi-type self-identified format-preserving encryption. First, we introduce a multi-type self-identified format-preserving encryption system and discuss the encryption of various types of data in this system. Then, for the format preserving encryption(FPE) about Chinese name, we study from the encryption model construction and basic encryption scheme. The format-preserving encryption model about Chinese name is constructed and the concept of the name library is presented. Based on this, it is used to not only limit the message space to reduce complexity, but also ensure the cipher in accordance with the Chinese naming habits. In addition, according to the encryption and decryption model, format-preserving encryption process of Chinese name is designed. In order to add new names, the algorithm of name space expansion is proposed. Based on the Prefix, this paper put forward an algorithm named Cycle-Prefix, which enhances the security and dynamics of FPE by using two adjustment factors and the circular encryption. Compared with the traditional Prefix algorithm, experiments show that Cycle-Prefix can not only complete the task of FPE for Chinese name, but also encrypt same plain text into different ciphers under the premise of similar efficiency with Prefix.
文摘This paper attempts to analyze geothermy revealed by the sounding data at 8 h and 20 h every day from China Meteorological Administration and the data counted per minute such as the wellhead temperature,the electromagnetic disturbance,the ground tilt and so of water level instrument in Sanxing of Chengdu with the method of information digitization.The result shows the recognizable differentiation of the change process before and after the earthquake,provides an analytic method for the improvement of earthquake prediction or prevention,and shows the feasible further research and the wide application prospect.
文摘In this paper a review on current research on 3DCM is presented, and an alternative approach by integrating the concepts and techniques of object\|oriented method and Computer Aided Design (CAD) is suggested. Through the approach urban spatial entities as objects are extracted, which are represented with primary 3D elements (node, edge, face and body) and their combinations. In the light of the concept of object, the method supports the multiple representation of Level of Details (LOD). More importantly, topological relationships between objects are described so that 3D topological operations can be implemented.
文摘In Chinese, dependency analysis has been shown to be a powerful syntactic parser because the order of phrases in a sentence is relatively free compared with English. Conventional dependency parsers require a number of sophisticated rules that have to be handcrafted by linguists, and are too cumbersome to maintain. To solve the problem, a parser using SVM (Support Vector Machine) is introduced. First, a new strategy of dependency analysis is proposed. Then some chosen feature types are used for learning and for creating the modification matrix using SVM. Finally, the dependency of phrases in the sentence is generated. Experiments conducted to analyze how each type of feature affects parsing accuracy, showed that the model can increase accuracy of the dependency parser by 9.2%.
基金financial support from the National Natural Science Foundation of China(No.40201021)the Zhejiang Natural Science Foundation of China(M403040).
文摘In China, many scenic and tourism areas are suffering from the urbanization that results from physical development of tourism projects, leading to the removal of the vegetative cover, the creation of areas impermeable to water, in-stream modifications, and other problems. In this paper, the risk of soil erosion and its ecological risks in the West Lake Scenic Spots (WLSS) area were quantitatively evaluated by integrating the revised universal soil loss equation (RUSLE) with a digital elevation model (DEM) and geographical information system (GIS) software. The standard RUSLE factors were modified to account for local climatic and topographic characteristics reflected in the DEM maps, and for the soil types and vegetation cover types. An interface was created between the Areinfo software and RUSLE so that the level of soil erosion and its ecological risk in the WLSS area could be mapped immediately once the model factors were defined for the area. The results from an analysis using the Areinfo-RUSLE interface showed that the risk value in 93 % of the expanding western part of the WLSS area was moderate or more severe and the soil erosion risk in this area was thus large compared with that in the rest of the area. This paper mainly aimed to increase the awareness of the soil erosion risk in urbanizing areas and suggest that the local governments should consider the probable ecological risk resulting from soil erosion when enlarging and developing tourism areas.
文摘The present study aimed to design, develop, operate and evaluate a sightseeing navigation system in order to support foreign tourists' efficient acquisition of sightseeing spot information in Japanese urban tourist areas, about which a variety of information is transmitted, by enabling information to be accumulated, shared and recommended. The system was developed by integrating Web-GIS (Geographic Information Systems), SNS (Social Networking Services) as well as the recommendation system into a single system. The system used the non-language information such as signs, marks and pictograms in addition to English information, and displayed sightseeing spot information and conduct navigation on 2D and 3D digital maps of the Web-GIS. Additionally, the system was operated for two weeks in the central part of Yokohama city in Kanagawa Prefecture, Japan, and the total number of users was 54. Based on the results of the web questionnaire survey, all of the specific functions are highly evaluated, and the usefulness of the system when sightseeing was excellent. From the results of the access analysis of users' log data, it is evident that it can be said that the system was mainly used before sightseeing and users confirm their favorite sightseeing spots and made their tour planning in advance, using 2D and 3D digital maps.
基金The project supported by Natural Science Foundation of Jiangsu Province of China under Grant No.BK2001138
文摘The digital communication in a system of two multi-mode solid state chaotic lasers is investigated theoretically. If the usual method working well in a single-mode laser system is applied to a multi-mode laser system, the memory effect of the two nearest digits can cause high rate of mistakes when the digits are decoded through the subtraction of receiver output from the transmittal. By introducing the deviations of two nearest maximum and minimum fluctuationsof the signal to decode the digit, the message can be decoded correctly. Also, this communication method does not critically depend on the quality of the chaotic synchronization of the two multi-mode lasers.
基金the Fund of Center for Doctors of Ministry of Education of China(20050147002)Key Laboratory Project of Institution of Higher Education of Liaoning Province(20060370)
文摘Analyzed and compared with some digitizeed mine build state first.Secondly analyzed opportunity and challenge that the Chinese mine faces,and pointed out certainty and necessity of building digitization of mine,Summarized the present task that charac- teristic,DM,MGIS of the digital mine develop and construct and employ finally,and carry on the summary to structure and function of the component mine integrated information system.
文摘Pattern Time Delay Shift Coding (PDS) scheme is robust for underwater acoustic communication. The digital information are encoded in the time delay shift values of the Pattern, so the PDS scheme belongs to the Pulse Position Modulation (PPM). Several Patterns are selected for code division that the communication system could have a high ability to mitigate the inter-symbol interference (ISI) caused by multipath channel. Four communication channels work on the same time divided by different frequency, which lead to 1000bits/s of the data rate of communication. The simulation experiments show that the PDS system could adapt to many underwater acoustic channels for high data rate and high reliability.
文摘Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.
基金supported by the US National Science Foundation/International Digital Library Program(Grant No.NSF/CISE/IIS-9905833).
文摘Global Memory Net (GMNet) is intended to be an effective gateway to the world cultural, historical, and heritage image collections from selected academic educational and research partners in the world. Much of these unique collections of great value to education and research are not currently accessible due to distance, form, and technical barriers. This project is to find new ways to enable users to access and exploit these significant research collections via global network. As GMNet is ending its first 5-year phase in October 2005, it has contributed substantially to the community building in digital library development by ac- commodating numerous collaborators and technical staff from various parts of the world to spend 3 to 5 months as a full-member of the GMNet team in Boston. They have come from different parts of China—such as Sichuan, Hainan, Shanghai and Xi’an; Croatia; and Hanoi, Vietnam. In addition to contribute to the overall system development and enhancement of system function- alities, they have brought valuable sample image collections of their own institutions/countries, and actually developed prototype collections as a part of GMNet. This paper describes the exciting and productive experience of the first of this visiting research group in developing the GMNet’s Version 2.0 PHP-based system under Prof. Chen’s overall supervision. It also describes both the system’s technical level structure—user/Web-based application/data, and complex functionalities with multi-collection, multi-lingual, multi-modal searching capabilities; system management capabilities; as well as provisions for user uploads and retrieval for our own projects. This Version 2.0 system is built on the Linux/Apache/PHP/MySQL platform. What is described in this paper is an actual case which has formed a base for further new development by others in the research group. It demonstrates fully the value of the synergistic collaboration among global partners for universal digital library development. More information can be found in http://www.memorynet.org/.
基金国家高技术研究发展计划(863计划),the National Natural Science Foundation of China
文摘Hidden Markov Model(HMM) is a main solution to ambiguities in Chinese segmentation anti POS (part-of-speech) tagging. While most previous works tot HMM-based Chinese segmentation anti POS tagging eonsult POS informatiou in contexts, they do not utilize lexieal information which is crucial for resoMng certain morphologieal ambiguity. This paper proposes a method which incorporates lexieal information and wider context information into HMM. Model induction anti related smoothing technique are presented in detail. Experiments indicate that this technique improves the segmentation and tagging accuracy by nearly 1%.
文摘Digital Chinese medicine(DCM)is an emerging interdisciplinary field developed from traditional Chinese medicine(TCM)and information science.In this article,we consider the significance and propose an architecture for DCM research,and highlight the key tasks that need to be performed to provide references for the integration of information science into Chinese medicine research.
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.