A computerized parametric methodology was applied to monitor, map, and estimate vegetation change in combination with '3S' (RS-remote sensing, GIS-geographic information systems, and GPS-global positioning sys...A computerized parametric methodology was applied to monitor, map, and estimate vegetation change in combination with '3S' (RS-remote sensing, GIS-geographic information systems, and GPS-global positioning system) technology and change detection techniques at a 1:50000 mapping scale in the Letianxi Watershed of western Hubei Province, China. Satellite images (Landsat TM 1997 and Landsat ETM 2002) and thematic maps were used to provide comprehensive views of surface conditions such as vegetation cover and land use change. With ER Mapper and ERDAS software, the normalized difference vegetation index (NDVI) was computed and then classified into six vegetation density classes. ARC/INFO and ArcView software were used along with field observation data by GPS for analysis. Results obtained using spatial analysis methods showed that NDVI was a valuable first cut indicator for vegetation and land use systems. A regression analysis revealed that NDVI explained 94.5% of the variations for vegetation cover in the largest vegetation area, indicating that the relationship between vegetation and NDVI was not a simple linear process. Vegetation cover increased in four of areas. This meant 60.9% of land area had very slight to slight vegetation change, while 39.1% had moderate to severe vegetation change. Thus, the study area, in general, was exposed to a high risk of vegetation cover change.展开更多
Preceding works tend to explicate affordance through supposing what is happening here and now.They seldom relate it to actual social,diachronic activities,such as foreign language learning.To tackle this issue,this st...Preceding works tend to explicate affordance through supposing what is happening here and now.They seldom relate it to actual social,diachronic activities,such as foreign language learning.To tackle this issue,this study explores how students actualize affordances in technology-enriched language learning environment(TELLE)by examining their perezhivanija(lived and emotional experience),a term borrowed from sociocultural theory.Because an individual’s social life is a developing process or a perezhivanie2,it is necessary to base the research in a dynamic development of language learning to figure out how the affordances are actualized.Narrative interviews were adopted to collect data from three Chinese college students who learn English as a foreign language in a Northeastern university in China.The results showed that due to the students’different past perezhivanija in English learning,their present interpretations of the perceived affordances in TELLE varied.This influenced hugely in their actions taken during their English learning in college to actualize the affordances.The findings indicated that the actualization of affordances is historical,dynamic and developmental instead of static.It does not lie in the autonomy of the students or the teachers,but in the institutional and cultural legitimacy of technology use in student’s social life.The paper contributes to the application of affordance theory in foreign language learning and provides implications to language teaching practice in TELLE.展开更多
The environmental monitoring dataset of Rivne region territory (Ukraine) was analyzed using remote sensing technology and statistical analysis. The article reveals approaches to anthropogenic impact specificity asse...The environmental monitoring dataset of Rivne region territory (Ukraine) was analyzed using remote sensing technology and statistical analysis. The article reveals approaches to anthropogenic impact specificity assessment based on methods of correlation analysis. The information technology to assess soil quality based on satellite images decoding was created.展开更多
This paper expounds how the possibility of collaboration and construction of knowledge being put into practice in a group of ICT (information and communication technologies)-based teaching and learning programmes fo...This paper expounds how the possibility of collaboration and construction of knowledge being put into practice in a group of ICT (information and communication technologies)-based teaching and learning programmes for Mother Tongue languages, collectively known as 10'CMT. 10'CMT, which is initiated by the ETD (Educational Technology Division) of MOE (Ministry of Education) Singapore, embodies a focus on the development of relevant pedagogy by which web-based technologies are embedded in meaningful learning activities in the classroom. Through a case study of a primary school in Singapore, this paper exemplifies how 10'CMT has the ability to promote collective knowledge and, by doing so, essentially supporting the growth of the individual student's knowledge. It draws on the students' engagement in peer editing, peer evaluation, peer interaction, and feedback with self-reflective practices through the affordances of an array of online tools. This paper will also discuss how the 10'CMT approach promotes the ability to respond flexibly to complex problems, to communicate effectively, to manage information, to work in teams, to use technology, and to produce new knowledge which are deemed to be crucial competencies for 21 st century.展开更多
The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise eco...The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise economic business more convenient and efficient. Here came the computer controlled environment audit new risks, of course, the computer technology applied to the audit work to improve the audit efficiency by a lot, but also increased the complex information technology environment audit risk. Starting from the concept of computer audit risk, this paper analyzes and discusses the new risks and causes of audit under the computer condition, and puts forward some constructive risk control measures.展开更多
GIS (geographic information systems) is often used for planning purposes in forestry. This is mainly used to give directives for the operators to cut the trees. And nowadays, it is also used for marking of areas wit...GIS (geographic information systems) is often used for planning purposes in forestry. This is mainly used to give directives for the operators to cut the trees. And nowadays, it is also used for marking of areas with high environmental values where considerations should be made. The minor used techniques is to incorporate soil information maps as an overlay to give information to forest machine operators where less good trafficability is to be expected, especially after a heavy rain. By marking areas with bad bearing capacity, the operators may save both time and money, and do not bog down with the machine. When the soils bearing capacity is less than 0.7 MPa and the ground pressure of the machine is more than 80 kPa, either smaller machines must be used or bogey tracks should be used to decrease the risk for getting stuck or causing severe rutting. By choosing good types of bogey tracks both rutting and fuel consumption will be decreased for the health of forest land and the contractor.展开更多
Materials on the environmental impacts of natural cataclysm and their possible implications, as well as the types of natural disasters the most frequently encountered in recent years in Azerbaijan have been shown in t...Materials on the environmental impacts of natural cataclysm and their possible implications, as well as the types of natural disasters the most frequently encountered in recent years in Azerbaijan have been shown in the article. Some of them have been described in more details of solving the most common problems. In addressing these challenges, using advanced information technology plays a huge role. In this respect, the paper provides information about new technologies used in the country to protect the environment and about international projects involving a State Committee on land and cartography of Azerbaijan Republic.展开更多
With the advent of knowledge, knowledge has become a key resource of economic increase and growth. More and more enterprises begin to adopt knowledge management to enhance the competitiveness of enterprises, however, ...With the advent of knowledge, knowledge has become a key resource of economic increase and growth. More and more enterprises begin to adopt knowledge management to enhance the competitiveness of enterprises, however, knowledge management is not simply the use of information technology, but need to establish corresponding corporate culture environment. Therefore, building corporate culture adapting to knowledge management is an important concern.展开更多
In the construction sector, which is one of the major goals of the new economy, the company is aiming at a new constructive practice and upgrading of the built, using ICT (information and communications technology) ...In the construction sector, which is one of the major goals of the new economy, the company is aiming at a new constructive practice and upgrading of the built, using ICT (information and communications technology) technologies. So the focus is on new operating and organizational models of sustainable building processes in the architecture, engineering and construction sectors, which are based on three-dimensional models of digital technology BIM (building information modeling). It is intended as a human activity that improves building workflows and, through software and IFACs (industry foundation classes), manages flexibility, coordinates and optimizes operational choices on time, economic, and environmental sustainability parameters. The goal is a new interoperable building process that involves designers, contractors and businesses from programming to lifecycle building and maintenance through the integrated project delivery of the building. Dynamic architectures, interactive with efficient technological and constructive systems, are integrated with innovative products of complex nature and bi-directional performance, engineered, with energy storage and renewable resources. The methodologies are based, above all, on the adoption of BIM technologies with the digital project manager and the use of robotic technological tools. Digitization is applied for the design and construction of architectural and infrastructure artifacts, in interaction with intelligent, adaptive, nanotechnical and user-friendly materials and climate. The results are aimed at efficient buildings with user comfort and safety, accuracy, and risk monitoring with remote monitoring, highlighting VDC (visual design construction) in CID (computational intelligent design).展开更多
New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate thes...New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate these attacks. It requires creation of practical training environment with tools and technologies available for Information Security. The design of Information Security courses involves scenario based hands-on-labs with real time security incidents and problems with global reach which could be customized quickly as per the scenario and user's requirement. In order to understand the underlying concepts as well as to learn the practical aspects of network and system security environment, an initiative has been taken and a Virtual Test Bed has been developed to meet the above objectives. It is an essential component in Information Security training concept which could be used to perform actual security attacks and remedial measures as well as to test the effectiveness of protection mechanisms and help in handling the security incidents effectively. This paper discusses the development of this Test Bed for Information Security skill development with virtual training environment using which Information Security concepts, attacks on networks/systems and practical scenarios are simulated for imparting hands on training to participants.展开更多
The constrained Viterbi algorithm (C-VA) makes use of some prior reliable information to reduce complexity and improve performance of Viterbi algorithm (VA). However it can only be used in the concatenate code sch...The constrained Viterbi algorithm (C-VA) makes use of some prior reliable information to reduce complexity and improve performance of Viterbi algorithm (VA). However it can only be used in the concatenate code scheme because the detection result of cyclic redundancy check code (CRC) is exploited to provide reliable information. In this paper, a different way is proposed to provide reliable information for C-VA, which is possible to be used in simple codec. Known bits were added to the set partitioning in hierarchical trees (SPIHT) coded image sequence periodically and directly. They were thought to be reliable information for C-VA in the decoder. Experimental results show that the proposed scheme can obtain much better error resilient ability compared with conventional VA under the extremely inferior channel condition if the best desired quality of reconstructed images can be sacrificed.展开更多
With the continuous development of information technology, information technology has penetrated into all walks of society, which has a growing influence on the socio-economic management including the impact of human ...With the continuous development of information technology, information technology has penetrated into all walks of society, which has a growing influence on the socio-economic management including the impact of human resource management. From the nature of information processing and analysis of information technology, this thesis probes into the impact of information technology on human resource management model and builds a closed-loop model of modem human resources management with the support of information technology. This paper also analyzes the effect of the closed-loop model of modem human resources management supported by the information technology, as well as the requests of IT application in the future, which is designed to help people understand the human resource management from the perspective of IT applications.展开更多
The construction of virtual community in foreign language learning is a comprehensive foreign language learning environment integrated with foreign language vocabulary database construction and vocabulary retrieval, c...The construction of virtual community in foreign language learning is a comprehensive foreign language learning environment integrated with foreign language vocabulary database construction and vocabulary retrieval, combining the virtual reality technology to construct the language environment of foreign language learning. The virtual community of foreign language leaming can improve the sense of language authenticity in foreign language learning and improve the quality of foreign language teaching. A method of building a virtual community for foreign language learning is proposed based on data mining technology, data acquisition and feature preprocessing model for building semantic vocabulary of foreign language learning is constructed, the linguistic environment characteristics of the semantic vocabulary data of foreign language learning is analyzed, and the semantic noumenon structure model is obtained. Fuzzy clustering method is used for vocabulary clustering and comprehensive retrieval in the virtual community of foreign language learning, the performance of vocabulary classification in foreign language learning is improved, the adaptive semantic information fusion method is used to realize the vocabulary data mining in the virtual community of foreign language learning, information retrieval and access scheduling for virtual communities in foreign language learning are realized based on data mining results. The simulation results show that the accuracy of foreign language vocabulary retrieval is good, improve the efficiency of foreign language learning.展开更多
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the...We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability.展开更多
Cloud-based quantum computing is anticipated to be the most useful and reachable form for public users to experience with the power of quantum. As initial attempts, IBM Q has launched influential cloud services on a s...Cloud-based quantum computing is anticipated to be the most useful and reachable form for public users to experience with the power of quantum. As initial attempts, IBM Q has launched influential cloud services on a superconducting quantum processor in 2016, but no other platforms has followed up yet. Here,we report our new cloud quantum computing service – NMRCloud Q(http://nmrcloudq.com/zh-hans/),where nuclear magnetic resonance, one of the pioneer platforms with mature techniques in experimental quantum computing, plays as the role of implementing computing tasks. Our service provides a comprehensive software environment preconfigured with a list of quantum information processing packages,and aims to be freely accessible to either amateurs that look forward to keeping pace with this quantum era or professionals that are interested in carrying out real quantum computing experiments in person. In our current version, four qubits are already usable with in average 99.10% single-qubit gate fidelity and 97.15% two-qubit fidelity via randomized benchmaking tests. Improved control precisions as well as a new seven-qubit processor are also in preparation and will be available later.展开更多
基金Project Supported by the National Natural Science Foundation of China (No. 40271073).
文摘A computerized parametric methodology was applied to monitor, map, and estimate vegetation change in combination with '3S' (RS-remote sensing, GIS-geographic information systems, and GPS-global positioning system) technology and change detection techniques at a 1:50000 mapping scale in the Letianxi Watershed of western Hubei Province, China. Satellite images (Landsat TM 1997 and Landsat ETM 2002) and thematic maps were used to provide comprehensive views of surface conditions such as vegetation cover and land use change. With ER Mapper and ERDAS software, the normalized difference vegetation index (NDVI) was computed and then classified into six vegetation density classes. ARC/INFO and ArcView software were used along with field observation data by GPS for analysis. Results obtained using spatial analysis methods showed that NDVI was a valuable first cut indicator for vegetation and land use systems. A regression analysis revealed that NDVI explained 94.5% of the variations for vegetation cover in the largest vegetation area, indicating that the relationship between vegetation and NDVI was not a simple linear process. Vegetation cover increased in four of areas. This meant 60.9% of land area had very slight to slight vegetation change, while 39.1% had moderate to severe vegetation change. Thus, the study area, in general, was exposed to a high risk of vegetation cover change.
基金part of the work for the National Project on Social Sciences“Efficacy of Ecological Affordances Actualization in Language Learning Environment in China in the Technology Era”(16BYY093)
文摘Preceding works tend to explicate affordance through supposing what is happening here and now.They seldom relate it to actual social,diachronic activities,such as foreign language learning.To tackle this issue,this study explores how students actualize affordances in technology-enriched language learning environment(TELLE)by examining their perezhivanija(lived and emotional experience),a term borrowed from sociocultural theory.Because an individual’s social life is a developing process or a perezhivanie2,it is necessary to base the research in a dynamic development of language learning to figure out how the affordances are actualized.Narrative interviews were adopted to collect data from three Chinese college students who learn English as a foreign language in a Northeastern university in China.The results showed that due to the students’different past perezhivanija in English learning,their present interpretations of the perceived affordances in TELLE varied.This influenced hugely in their actions taken during their English learning in college to actualize the affordances.The findings indicated that the actualization of affordances is historical,dynamic and developmental instead of static.It does not lie in the autonomy of the students or the teachers,but in the institutional and cultural legitimacy of technology use in student’s social life.The paper contributes to the application of affordance theory in foreign language learning and provides implications to language teaching practice in TELLE.
文摘The environmental monitoring dataset of Rivne region territory (Ukraine) was analyzed using remote sensing technology and statistical analysis. The article reveals approaches to anthropogenic impact specificity assessment based on methods of correlation analysis. The information technology to assess soil quality based on satellite images decoding was created.
文摘This paper expounds how the possibility of collaboration and construction of knowledge being put into practice in a group of ICT (information and communication technologies)-based teaching and learning programmes for Mother Tongue languages, collectively known as 10'CMT. 10'CMT, which is initiated by the ETD (Educational Technology Division) of MOE (Ministry of Education) Singapore, embodies a focus on the development of relevant pedagogy by which web-based technologies are embedded in meaningful learning activities in the classroom. Through a case study of a primary school in Singapore, this paper exemplifies how 10'CMT has the ability to promote collective knowledge and, by doing so, essentially supporting the growth of the individual student's knowledge. It draws on the students' engagement in peer editing, peer evaluation, peer interaction, and feedback with self-reflective practices through the affordances of an array of online tools. This paper will also discuss how the 10'CMT approach promotes the ability to respond flexibly to complex problems, to communicate effectively, to manage information, to work in teams, to use technology, and to produce new knowledge which are deemed to be crucial competencies for 21 st century.
文摘The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise economic business more convenient and efficient. Here came the computer controlled environment audit new risks, of course, the computer technology applied to the audit work to improve the audit efficiency by a lot, but also increased the complex information technology environment audit risk. Starting from the concept of computer audit risk, this paper analyzes and discusses the new risks and causes of audit under the computer condition, and puts forward some constructive risk control measures.
文摘GIS (geographic information systems) is often used for planning purposes in forestry. This is mainly used to give directives for the operators to cut the trees. And nowadays, it is also used for marking of areas with high environmental values where considerations should be made. The minor used techniques is to incorporate soil information maps as an overlay to give information to forest machine operators where less good trafficability is to be expected, especially after a heavy rain. By marking areas with bad bearing capacity, the operators may save both time and money, and do not bog down with the machine. When the soils bearing capacity is less than 0.7 MPa and the ground pressure of the machine is more than 80 kPa, either smaller machines must be used or bogey tracks should be used to decrease the risk for getting stuck or causing severe rutting. By choosing good types of bogey tracks both rutting and fuel consumption will be decreased for the health of forest land and the contractor.
文摘Materials on the environmental impacts of natural cataclysm and their possible implications, as well as the types of natural disasters the most frequently encountered in recent years in Azerbaijan have been shown in the article. Some of them have been described in more details of solving the most common problems. In addressing these challenges, using advanced information technology plays a huge role. In this respect, the paper provides information about new technologies used in the country to protect the environment and about international projects involving a State Committee on land and cartography of Azerbaijan Republic.
文摘With the advent of knowledge, knowledge has become a key resource of economic increase and growth. More and more enterprises begin to adopt knowledge management to enhance the competitiveness of enterprises, however, knowledge management is not simply the use of information technology, but need to establish corresponding corporate culture environment. Therefore, building corporate culture adapting to knowledge management is an important concern.
文摘In the construction sector, which is one of the major goals of the new economy, the company is aiming at a new constructive practice and upgrading of the built, using ICT (information and communications technology) technologies. So the focus is on new operating and organizational models of sustainable building processes in the architecture, engineering and construction sectors, which are based on three-dimensional models of digital technology BIM (building information modeling). It is intended as a human activity that improves building workflows and, through software and IFACs (industry foundation classes), manages flexibility, coordinates and optimizes operational choices on time, economic, and environmental sustainability parameters. The goal is a new interoperable building process that involves designers, contractors and businesses from programming to lifecycle building and maintenance through the integrated project delivery of the building. Dynamic architectures, interactive with efficient technological and constructive systems, are integrated with innovative products of complex nature and bi-directional performance, engineered, with energy storage and renewable resources. The methodologies are based, above all, on the adoption of BIM technologies with the digital project manager and the use of robotic technological tools. Digitization is applied for the design and construction of architectural and infrastructure artifacts, in interaction with intelligent, adaptive, nanotechnical and user-friendly materials and climate. The results are aimed at efficient buildings with user comfort and safety, accuracy, and risk monitoring with remote monitoring, highlighting VDC (visual design construction) in CID (computational intelligent design).
文摘New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate these attacks. It requires creation of practical training environment with tools and technologies available for Information Security. The design of Information Security courses involves scenario based hands-on-labs with real time security incidents and problems with global reach which could be customized quickly as per the scenario and user's requirement. In order to understand the underlying concepts as well as to learn the practical aspects of network and system security environment, an initiative has been taken and a Virtual Test Bed has been developed to meet the above objectives. It is an essential component in Information Security training concept which could be used to perform actual security attacks and remedial measures as well as to test the effectiveness of protection mechanisms and help in handling the security incidents effectively. This paper discusses the development of this Test Bed for Information Security skill development with virtual training environment using which Information Security concepts, attacks on networks/systems and practical scenarios are simulated for imparting hands on training to participants.
基金Project supported by the National Natural Science Foundation of China (Grant No.60372070)
文摘The constrained Viterbi algorithm (C-VA) makes use of some prior reliable information to reduce complexity and improve performance of Viterbi algorithm (VA). However it can only be used in the concatenate code scheme because the detection result of cyclic redundancy check code (CRC) is exploited to provide reliable information. In this paper, a different way is proposed to provide reliable information for C-VA, which is possible to be used in simple codec. Known bits were added to the set partitioning in hierarchical trees (SPIHT) coded image sequence periodically and directly. They were thought to be reliable information for C-VA in the decoder. Experimental results show that the proposed scheme can obtain much better error resilient ability compared with conventional VA under the extremely inferior channel condition if the best desired quality of reconstructed images can be sacrificed.
文摘With the continuous development of information technology, information technology has penetrated into all walks of society, which has a growing influence on the socio-economic management including the impact of human resource management. From the nature of information processing and analysis of information technology, this thesis probes into the impact of information technology on human resource management model and builds a closed-loop model of modem human resources management with the support of information technology. This paper also analyzes the effect of the closed-loop model of modem human resources management supported by the information technology, as well as the requests of IT application in the future, which is designed to help people understand the human resource management from the perspective of IT applications.
文摘The construction of virtual community in foreign language learning is a comprehensive foreign language learning environment integrated with foreign language vocabulary database construction and vocabulary retrieval, combining the virtual reality technology to construct the language environment of foreign language learning. The virtual community of foreign language leaming can improve the sense of language authenticity in foreign language learning and improve the quality of foreign language teaching. A method of building a virtual community for foreign language learning is proposed based on data mining technology, data acquisition and feature preprocessing model for building semantic vocabulary of foreign language learning is constructed, the linguistic environment characteristics of the semantic vocabulary data of foreign language learning is analyzed, and the semantic noumenon structure model is obtained. Fuzzy clustering method is used for vocabulary clustering and comprehensive retrieval in the virtual community of foreign language learning, the performance of vocabulary classification in foreign language learning is improved, the adaptive semantic information fusion method is used to realize the vocabulary data mining in the virtual community of foreign language learning, information retrieval and access scheduling for virtual communities in foreign language learning are realized based on data mining results. The simulation results show that the accuracy of foreign language vocabulary retrieval is good, improve the efficiency of foreign language learning.
基金the National Natural Science Foundation of China (No. 60673075)the National High Technology Research and Development Program (863) of China (No. 2006AA01Z428)the State Key Laboratoryof Information Security,and the Youth Science and Technology Foundation of UESTC
文摘We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability.
基金the National Natural Science Foundation of China(11175094)National Basic Research Program of China(2015CB921002)+7 种基金supported by the National Natural Science Foundation of China(61771278)supported by the National Basic Research Program of China(2014CB921403,2016YFA0301201,2014CB848700 and 2013CB921800)National Natural Science Foundation of China(11421063,11534002,11375167 and 11605005)the National Science Fund for Distinguished Young Scholars(11425523)NSAF(U1530401)Natural Sciences and Engineering Research Council of Canada(NSERC)Canadian Institute for Advanced Research(CIFAR)Chinese Ministry of Education(20173080024)
文摘Cloud-based quantum computing is anticipated to be the most useful and reachable form for public users to experience with the power of quantum. As initial attempts, IBM Q has launched influential cloud services on a superconducting quantum processor in 2016, but no other platforms has followed up yet. Here,we report our new cloud quantum computing service – NMRCloud Q(http://nmrcloudq.com/zh-hans/),where nuclear magnetic resonance, one of the pioneer platforms with mature techniques in experimental quantum computing, plays as the role of implementing computing tasks. Our service provides a comprehensive software environment preconfigured with a list of quantum information processing packages,and aims to be freely accessible to either amateurs that look forward to keeping pace with this quantum era or professionals that are interested in carrying out real quantum computing experiments in person. In our current version, four qubits are already usable with in average 99.10% single-qubit gate fidelity and 97.15% two-qubit fidelity via randomized benchmaking tests. Improved control precisions as well as a new seven-qubit processor are also in preparation and will be available later.