with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
Based on the rough set theory which is a powerful tool in dealing with vagueness and uncertainty, an algorithm to mine association rules in incomplete information systems was presented and the support and confidence w...Based on the rough set theory which is a powerful tool in dealing with vagueness and uncertainty, an algorithm to mine association rules in incomplete information systems was presented and the support and confidence were redefined. The algorithm can mine the association rules with decision attributes directly without processing missing values. Using the incomplete dataset Mushroom from UCI machine learning repository, the new algorithm was compared with the classical association rules mining algorithm based on Apriori from the number of rules extracted, testing accuracy and execution time. The experiment results show that the new algorithm has advantages of short execution time and high accuracy.展开更多
In order to meet the strict requirements for information in engineering management, the positive interval (0, 1 ] in Shannon information entropy is extended to the real number interval [ - 1, 1 ]. The information the...In order to meet the strict requirements for information in engineering management, the positive interval (0, 1 ] in Shannon information entropy is extended to the real number interval [ - 1, 1 ]. The information theory and the decision theory are combined effectively, and the deficiencies that the traditional Bayes decision-making methods only consider a single factor are made up for. The multi-factors engineering decision-making methods are proposed, and some critical problems are solved in the practical engineering management decision-making process.展开更多
Lane line detection is a fundamental step in applications like autonomous driving and intelligent traffic monitoring. Emerging applications today have higher requirements for accurate lane detection. In this paper, we...Lane line detection is a fundamental step in applications like autonomous driving and intelligent traffic monitoring. Emerging applications today have higher requirements for accurate lane detection. In this paper, we present a precise information extraction algorithm for lane lines. Specifically, with Gaussian Mixture Model(GMM), we solved the issue of lane line occlusion in multi-lane scenes. Then, Progressive Probabilistic Hough Transform(PPHT) was used for line segments detection. After K-Means clustering for line segments classification, we solved the problem of extracting precise information that includes left and right edges as well as endpoints of each lane line based on geometric characteristics. Finally, we fitted these solid and dashed lane lines respectively. Experimental results indicate that the proposed method performs better than the other methods in both single-lane and multi-lane scenarios.展开更多
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm...To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process.展开更多
Focusing on the issue to deal with inadequate extraction of metallogenic information especially geological information,a new method of extracting metallogenic information based on field model,i.e.the field analysis me...Focusing on the issue to deal with inadequate extraction of metallogenic information especially geological information,a new method of extracting metallogenic information based on field model,i.e.the field analysis method of metallogenic information,was proposed.In addition,a case study by using the method of the extraction of metallogenic information from the west Guangxi and southeast Yunnan district as an example was performed.The representation method for the field models of metallogenic information,including the metallogenic influence field model and the metallogenic distance field model,was discussed by introducing the concept of the field theory,based on the characteristic analysis of the distance gradualness and the influence superposition of metallogenic information.According to the field theory superposition principle and the spatial distance analysis method,the mathematical models for the metallogenic influence field and the metallogenic distance field of point,line and area geological bodies were derived out by using parameter equation and calculus.Based on the metallogenic background analysis,the metallogenic information field models of synsedimentary faults and manganese sedimentary basins were built.The relationship between the metallogenic information fields and the manganese mineralization distribution was also investigated by using the method of metallogenic information field analysis.The instance study indicates that the proposed method of metallogenic information field analysis is valid and useful for extracting the ore-controlling information of synsedimentary faults and manganese sedimentary basins in the study area,with which the extraction results are significant both statistically and geologically.展开更多
Internet of Things (IoT) as an important and ubiquitous service paradigm is one of the most important issues in IoT applications to provide terminal users with effective and efficient services based on service communi...Internet of Things (IoT) as an important and ubiquitous service paradigm is one of the most important issues in IoT applications to provide terminal users with effective and efficient services based on service community. This paper presents a semantic-based similarity algorithm to build the IoT service community. Firstly, the algorithm reflects that the nodes of IoT contain a wealth of semantic information and makes them to build into the concept tree. Then tap the similarity of the semantic information based on the concept tree. Finally, we achieve the optimization of the service community through greedy algorithm and control the size of the service community by adjusting the threshold. Simulation results show the effectiveness and feasibility of this algorithm.展开更多
Land suitability assessment is a prerequisite phase in land use planning; it guides toward optimal land use by providing information on the opportunities and constraints involved in the use of a given land area. A geo...Land suitability assessment is a prerequisite phase in land use planning; it guides toward optimal land use by providing information on the opportunities and constraints involved in the use of a given land area. A geographic information system-based procedure, known as rural settlement suitability evaluation(RSSE) using an improved technique for order preference by similarity to ideal solution(TOPSIS), was adopted to determine the most suitable area for constructing rural settlements in different geographical locations. Given the distribution and independence of rural settlements, a distinctive evaluation criteria system that differed from that of urban suitability was established by considering the level of rural infrastructure services as well as living and working conditions. The unpredictable mutual interference among evaluation factors has been found in practical works. An improved TOPSIS using Mahalanobis distance was applied to solve the unpredictable correlation among the criteria in a suitability evaluation. Uncertainty and sensitivity analyses obtained via Monte Carlo simulation were performed to examine the robustness of the model. Daye, a resource-based city with rapid economic development, unsatisfied rural development, and geological environmental problems caused by mining, was used as a case study. Results indicate the following findings: 1) The RSSE model using the improved TOPSIS can assess the suitability of rural settlements, and the suitability maps generated using the improved TOPSIS have higher information density than those generated using traditional TOPSIS. The robustness of the model is improved, and the uncertainty is reduced in the suitability results. 2) Highly suitable land is mainly distributed in the northeast of the study area, and the majority of which is cultivated land, thereby leading to tremendous pressure on the loss of cultivated land. 3) Lastly, 12.54% of the constructive expansion permitted zone and 8.36% of the constructive expansion conditionally permitted zone are situated in an unsuitable area, which indicates that the general planning of Daye lacks the necessary verification of suitability evaluation. Guidance is provided on the development strategy of rural settlement patches to support decision making in general land use planning.展开更多
Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,espe...Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,especially when there is an nonnegligible start-up energy cost.To this end,by observing the variety of user number,we focus on the design of a switch policy which minimize the cumulative energy consumption.A given user transmission rate is guaranteed and the capability of SBSs are limited as well.According to the knowledge on user number variety,we classify the energy consumption problem into two cases.In complete information case,to minimize the cumulative energy consumption,an offline solution is proposed according to critical segments.A heuristic algorithm for incomplete information case(HAIIC) is proposed by tracking the difference of cumulative energy consumption.The upper bound of the Energy Consumption Ratio(ECR) for HAIIC is derived as well.In addition,a practical Q-learning based probabilistic policy is proposed.Simulation results show that the proposed HAIIC algorithm is able to save energy efficiently.展开更多
An optimization model of underground mining method selection was established on the basis of the unascertained measurement theory.Considering the geologic conditions,technology,economy and safety production,ten main f...An optimization model of underground mining method selection was established on the basis of the unascertained measurement theory.Considering the geologic conditions,technology,economy and safety production,ten main factors influencing the selection of mining method were taken into account,and the comprehensive evaluation index system of mining method selection was constructed.The unascertained evaluation indices corresponding to the selected factors for the actual situation were solved both qualitatively and quantitatively.New measurement standards were constructed.Then,the unascertained measurement function of each evaluation index was established.The index weights of the factors were calculated by entropy theory,and credible degree recognition criteria were established according to the unascertained measurement theory.The results of mining method evaluation were obtained using the credible degree criteria,thus the best underground mining method was determined.Furthermore,this model was employed for the comprehensive evaluation and selection of the chosen standard mining methods in Xinli Gold Mine in Sanshandao of China.The results show that the relative superiority degrees of mining methods can be calculated using the unascertained measurement optimization model,so the optimal method can be easily determined.Meanwhile,the proposed method can take into account large amount of uncertain information in mining method selection,which can provide an effective way for selecting the optimal underground mining method.展开更多
The main idea of pervasive computing is to make computing exist everywhere in the physical world.The smart home system is an important realisation of pervasive computing whose aim is to provide system users with an in...The main idea of pervasive computing is to make computing exist everywhere in the physical world.The smart home system is an important realisation of pervasive computing whose aim is to provide system users with an intelligent life experience.The key technique used to realise this is context awareness.Contexts in the living space can provide large amounts of information regarding users’behaviours and habits.Together with an information system,it can automatically execute many common operations of applications,instead of users,and can make the applications"smart".However,since contexts in the environment are diverse and sensitive,it is difficult to choose the ones that are most useful to the users’current activity.A proper scheduling strategy should first consider the users’demand.This paper proposes a context-aware scheduling algorithm that is based on correlation,with the purpose of improving the utilization rate of context collections.Experiments show that with the priority based on correlation in low-level contexts,the scheduling of reasoning tasks can reduce the cost of transmission.展开更多
Many problems in applied mathematics lead to ordinary differential equation. In this paper, a considerable refinement and improvement of the Euler's method obtained using PSO (particle swarm optimization) was prese...Many problems in applied mathematics lead to ordinary differential equation. In this paper, a considerable refinement and improvement of the Euler's method obtained using PSO (particle swarm optimization) was presented. PSO is a technique based on the cooperation between particles. The exchange of information between these particles allows to resolve difficult problems. This approach is carefully handled and tested with an illustrated example.展开更多
This paper describes in detail the web data mining technology, analyzes the relationship between the data on the web site to the tourism electronic commerce (including the server log, tourism commodity database, user...This paper describes in detail the web data mining technology, analyzes the relationship between the data on the web site to the tourism electronic commerce (including the server log, tourism commodity database, user database, the shopping cart), access to relevant user preference information for tourism commodity. Based on these models, the paper presents recommended strategies for the site registered users, and has had the corresponding formulas for calculating the current user of certain items recommended values and the corresponding recommendation algorithm, and the system can get a recommendation for user.展开更多
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
基金Projects(10871031, 60474070) supported by the National Natural Science Foundation of ChinaProject(07A001) supported by the Scientific Research Fund of Hunan Provincial Education Department, China
文摘Based on the rough set theory which is a powerful tool in dealing with vagueness and uncertainty, an algorithm to mine association rules in incomplete information systems was presented and the support and confidence were redefined. The algorithm can mine the association rules with decision attributes directly without processing missing values. Using the incomplete dataset Mushroom from UCI machine learning repository, the new algorithm was compared with the classical association rules mining algorithm based on Apriori from the number of rules extracted, testing accuracy and execution time. The experiment results show that the new algorithm has advantages of short execution time and high accuracy.
文摘In order to meet the strict requirements for information in engineering management, the positive interval (0, 1 ] in Shannon information entropy is extended to the real number interval [ - 1, 1 ]. The information theory and the decision theory are combined effectively, and the deficiencies that the traditional Bayes decision-making methods only consider a single factor are made up for. The multi-factors engineering decision-making methods are proposed, and some critical problems are solved in the practical engineering management decision-making process.
基金supported by the National Nature Science Foundation of China under Grant No.61502226the Jiangsu Provincial Transportation Science and Technology Project No.2017X04the Fundamental Research Funds for the Central Universities
文摘Lane line detection is a fundamental step in applications like autonomous driving and intelligent traffic monitoring. Emerging applications today have higher requirements for accurate lane detection. In this paper, we present a precise information extraction algorithm for lane lines. Specifically, with Gaussian Mixture Model(GMM), we solved the issue of lane line occlusion in multi-lane scenes. Then, Progressive Probabilistic Hough Transform(PPHT) was used for line segments detection. After K-Means clustering for line segments classification, we solved the problem of extracting precise information that includes left and right edges as well as endpoints of each lane line based on geometric characteristics. Finally, we fitted these solid and dashed lane lines respectively. Experimental results indicate that the proposed method performs better than the other methods in both single-lane and multi-lane scenarios.
文摘To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process.
基金Project(2006BAB01B07) supported by the National Science and Technology Pillar Program during the 11th Five-Year Plan Period of China
文摘Focusing on the issue to deal with inadequate extraction of metallogenic information especially geological information,a new method of extracting metallogenic information based on field model,i.e.the field analysis method of metallogenic information,was proposed.In addition,a case study by using the method of the extraction of metallogenic information from the west Guangxi and southeast Yunnan district as an example was performed.The representation method for the field models of metallogenic information,including the metallogenic influence field model and the metallogenic distance field model,was discussed by introducing the concept of the field theory,based on the characteristic analysis of the distance gradualness and the influence superposition of metallogenic information.According to the field theory superposition principle and the spatial distance analysis method,the mathematical models for the metallogenic influence field and the metallogenic distance field of point,line and area geological bodies were derived out by using parameter equation and calculus.Based on the metallogenic background analysis,the metallogenic information field models of synsedimentary faults and manganese sedimentary basins were built.The relationship between the metallogenic information fields and the manganese mineralization distribution was also investigated by using the method of metallogenic information field analysis.The instance study indicates that the proposed method of metallogenic information field analysis is valid and useful for extracting the ore-controlling information of synsedimentary faults and manganese sedimentary basins in the study area,with which the extraction results are significant both statistically and geologically.
基金Supported by the China Postdoctoral Science Foundation(No. 20100480701)the Ministry of Education of Humanities and Social Sciences Youth Fund Project(11YJC880119)
文摘Internet of Things (IoT) as an important and ubiquitous service paradigm is one of the most important issues in IoT applications to provide terminal users with effective and efficient services based on service community. This paper presents a semantic-based similarity algorithm to build the IoT service community. Firstly, the algorithm reflects that the nodes of IoT contain a wealth of semantic information and makes them to build into the concept tree. Then tap the similarity of the semantic information based on the concept tree. Finally, we achieve the optimization of the service community through greedy algorithm and control the size of the service community by adjusting the threshold. Simulation results show the effectiveness and feasibility of this algorithm.
基金Under the auspices of National Natural Science Foundation of China(No.41371429,41401196)
文摘Land suitability assessment is a prerequisite phase in land use planning; it guides toward optimal land use by providing information on the opportunities and constraints involved in the use of a given land area. A geographic information system-based procedure, known as rural settlement suitability evaluation(RSSE) using an improved technique for order preference by similarity to ideal solution(TOPSIS), was adopted to determine the most suitable area for constructing rural settlements in different geographical locations. Given the distribution and independence of rural settlements, a distinctive evaluation criteria system that differed from that of urban suitability was established by considering the level of rural infrastructure services as well as living and working conditions. The unpredictable mutual interference among evaluation factors has been found in practical works. An improved TOPSIS using Mahalanobis distance was applied to solve the unpredictable correlation among the criteria in a suitability evaluation. Uncertainty and sensitivity analyses obtained via Monte Carlo simulation were performed to examine the robustness of the model. Daye, a resource-based city with rapid economic development, unsatisfied rural development, and geological environmental problems caused by mining, was used as a case study. Results indicate the following findings: 1) The RSSE model using the improved TOPSIS can assess the suitability of rural settlements, and the suitability maps generated using the improved TOPSIS have higher information density than those generated using traditional TOPSIS. The robustness of the model is improved, and the uncertainty is reduced in the suitability results. 2) Highly suitable land is mainly distributed in the northeast of the study area, and the majority of which is cultivated land, thereby leading to tremendous pressure on the loss of cultivated land. 3) Lastly, 12.54% of the constructive expansion permitted zone and 8.36% of the constructive expansion conditionally permitted zone are situated in an unsuitable area, which indicates that the general planning of Daye lacks the necessary verification of suitability evaluation. Guidance is provided on the development strategy of rural settlement patches to support decision making in general land use planning.
基金partially supported by National Key Project of China under Grants No. 2013ZX03001007-004National Natural Science Foundation of China under Grants No. 61102052,61325012,61271219,91438115 and 61221001
文摘Switch policy is essential for small cells to properly serve variable number of users in an energy efficient way.However,frequently switching small cell base stations(SBSs) may increase the network operating cost,especially when there is an nonnegligible start-up energy cost.To this end,by observing the variety of user number,we focus on the design of a switch policy which minimize the cumulative energy consumption.A given user transmission rate is guaranteed and the capability of SBSs are limited as well.According to the knowledge on user number variety,we classify the energy consumption problem into two cases.In complete information case,to minimize the cumulative energy consumption,an offline solution is proposed according to critical segments.A heuristic algorithm for incomplete information case(HAIIC) is proposed by tracking the difference of cumulative energy consumption.The upper bound of the Energy Consumption Ratio(ECR) for HAIIC is derived as well.In addition,a practical Q-learning based probabilistic policy is proposed.Simulation results show that the proposed HAIIC algorithm is able to save energy efficiently.
基金Project(2007CB209402) supported by the National Basic Research Program of China Project(SKLGDUEK0906) supported by the Research Fund of State Key Laboratory for Geomechanics and Deep Underground Engineering of China
文摘An optimization model of underground mining method selection was established on the basis of the unascertained measurement theory.Considering the geologic conditions,technology,economy and safety production,ten main factors influencing the selection of mining method were taken into account,and the comprehensive evaluation index system of mining method selection was constructed.The unascertained evaluation indices corresponding to the selected factors for the actual situation were solved both qualitatively and quantitatively.New measurement standards were constructed.Then,the unascertained measurement function of each evaluation index was established.The index weights of the factors were calculated by entropy theory,and credible degree recognition criteria were established according to the unascertained measurement theory.The results of mining method evaluation were obtained using the credible degree criteria,thus the best underground mining method was determined.Furthermore,this model was employed for the comprehensive evaluation and selection of the chosen standard mining methods in Xinli Gold Mine in Sanshandao of China.The results show that the relative superiority degrees of mining methods can be calculated using the unascertained measurement optimization model,so the optimal method can be easily determined.Meanwhile,the proposed method can take into account large amount of uncertain information in mining method selection,which can provide an effective way for selecting the optimal underground mining method.
基金partially supported by the National Natural Science Foundation of China under Grant No.61103115the Hunan Provincial Natural Science Foundation of China under Grant No.11JJ4058the Scientific Research Fund of Hunan Provincial Education Department under Grant No.11A041
文摘The main idea of pervasive computing is to make computing exist everywhere in the physical world.The smart home system is an important realisation of pervasive computing whose aim is to provide system users with an intelligent life experience.The key technique used to realise this is context awareness.Contexts in the living space can provide large amounts of information regarding users’behaviours and habits.Together with an information system,it can automatically execute many common operations of applications,instead of users,and can make the applications"smart".However,since contexts in the environment are diverse and sensitive,it is difficult to choose the ones that are most useful to the users’current activity.A proper scheduling strategy should first consider the users’demand.This paper proposes a context-aware scheduling algorithm that is based on correlation,with the purpose of improving the utilization rate of context collections.Experiments show that with the priority based on correlation in low-level contexts,the scheduling of reasoning tasks can reduce the cost of transmission.
文摘Many problems in applied mathematics lead to ordinary differential equation. In this paper, a considerable refinement and improvement of the Euler's method obtained using PSO (particle swarm optimization) was presented. PSO is a technique based on the cooperation between particles. The exchange of information between these particles allows to resolve difficult problems. This approach is carefully handled and tested with an illustrated example.
文摘This paper describes in detail the web data mining technology, analyzes the relationship between the data on the web site to the tourism electronic commerce (including the server log, tourism commodity database, user database, the shopping cart), access to relevant user preference information for tourism commodity. Based on these models, the paper presents recommended strategies for the site registered users, and has had the corresponding formulas for calculating the current user of certain items recommended values and the corresponding recommendation algorithm, and the system can get a recommendation for user.