期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
新信息观论纲 被引量:1
1
作者 贾星客 李极光 李和宽 《云南师范大学学报(哲学社会科学版)》 2003年第2期13-18,共6页
时代正在提供对信息进行哲学综合的丰富条件 :科学各领域的并行发展在提供大量新的相关结论 ,“信息进化”和“信息凸现”提供了量的积累 ,并产生大量社会转型性矛盾 ,使物质世界的信息本性直观凸显出来。在此基础上 ,本文提出了新信息... 时代正在提供对信息进行哲学综合的丰富条件 :科学各领域的并行发展在提供大量新的相关结论 ,“信息进化”和“信息凸现”提供了量的积累 ,并产生大量社会转型性矛盾 ,使物质世界的信息本性直观凸显出来。在此基础上 ,本文提出了新信息观研究纲领 ,认为 :“物质和信息”这一对范畴将比“物质和意识”这一对范畴更对称、完善地揭示世界的物质统一性 ;信息的本质在物质世界的进化过程中展开 ;信息进化遵循“递归”的规律 ;信息可以理解为物质世界的整体相关性 ,以及这种相关性的记录方式和递归性质 ;信息进化在目前“信息社会的初级阶段”中表现为“信息化”和“物化”的尖锐对立 ;在人类社会的“文化阶段” ,信息的本质将克服异化而真正“实现”等等。以哲学为主导的新信息观研究将成为新世纪的重大课题。 展开更多
关键词 信息 信息哲学 信息进代 信息凸现 生产方式转型 信息 控制论 系统科学 理论物理学 宇宙学
下载PDF
Steganography Algorithm to Hide Secret Message inside an Image 被引量:1
2
作者 Rosziati Ibrahim Teoh Suk Kuan 《Computer Technology and Application》 2011年第2期102-108,共7页
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is con... In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganography Imaging System (gig) is developed. The system is then tested to see the viability of the proposed algorithm. Various sizes of data are stored inside the images and the Peak signal-to-noise ratio (PSNR) is also captured for each of the images tested. Based on the PSNR value of each images, the stego image has a higher PSNR value. Hence this new steganography algorithm is very efficient to hide the data inside the image. 展开更多
关键词 Steganography algorithm secret key image processing data retrieval.
下载PDF
Enhance Information Flow Tracking with Function Recognition
3
作者 Zhou Kan Huang Shiqiu +3 位作者 Huang Shan Qi Zhengwei Gu Jian Guan Haibing 《China Communications》 SCIE CSCD 2010年第6期24-29,共6页
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput... With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective. 展开更多
关键词 function recognition information flow tracking program behavior e-evidence.
下载PDF
Importance of strengthening the control of bank risk under information background
4
作者 Qian LIU Xue FENG 《International Journal of Technology Management》 2015年第3期47-49,共3页
In the context of the information age, with the causes of the financial deregulation of the bank in the financial industry competition intensifies, the communication of science and technology advancement, there are in... In the context of the information age, with the causes of the financial deregulation of the bank in the financial industry competition intensifies, the communication of science and technology advancement, there are innovative financial instruments to achieve orgasm. With that, comes the increased risk of commercial banks. China' s banking innovation started late, but rapidly develops. More seriously, in the development of the innovation process, there is not enough emphasis on the legal risk, which causes great risks. 展开更多
关键词 commercial banks INFORMATION legal risk Risk Control
下载PDF
网际风雷
5
作者 沈致远 《语文学习》 2003年第5期37-38,共2页
关键词 电脑网络 应用 信息进代 网络技术 应用
原文传递
THE OPTIMAL LINEAR SECRET SHARING SCHEME FOR ANY GIVEN ACCESS STRUCTURE 被引量:1
6
作者 TANG Chunming GAO Shuhong ZHANG Chengli 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2013年第4期634-649,共16页
Any linear code can be used to construct a linear secret sharing scheme.In this paper,it is shown how to decide optimal linear codes(i.e.,with the biggest information rate)realizing a given access structure over finit... Any linear code can be used to construct a linear secret sharing scheme.In this paper,it is shown how to decide optimal linear codes(i.e.,with the biggest information rate)realizing a given access structure over finite fields.It amounts to solving a system of quadratic equations constructed from the given access structure and the corresponding adversary structure.The system becomes a linear system for binary codes.An algorithm is also given for finding the adversary structure for any given access structure. 展开更多
关键词 Access structure adversary structure CRYPTOGRAPHY linear code secret sharing.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部