Fuzzy cognitive maps (FCM) is a well-established artificial intelligence technique, which can be effectively applied in the domains of performance measurement, decision making and other management science. FCM can b...Fuzzy cognitive maps (FCM) is a well-established artificial intelligence technique, which can be effectively applied in the domains of performance measurement, decision making and other management science. FCM can be a useful tool in a group decision-making environment by using scientifically integrated expert knowledge. The theories of FCM and balance scorecard (BSC) both emphasize cause-and-effect relationships among indicators in a complex system, but few reports have been published addressing the combined application of these two techniques. In this paper we propose a FCM simulation model for the sample performance measurement system of Intemet-based supply chain, which is constructed by BSC theory. We gave examples to explain how FCM can be adapted to execute the causal mechanism of BSC, and also how FCM can support group decision-making and forecasting in performance measurement.展开更多
The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructu...The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.展开更多
During the last months of 1888 the populous quarter of Whitechapel, London, was stained with the blood of five women, all booked prostitutes and chronic alcoholics, worthy representatives of the diseases/vices of the ...During the last months of 1888 the populous quarter of Whitechapel, London, was stained with the blood of five women, all booked prostitutes and chronic alcoholics, worthy representatives of the diseases/vices of the Victorian East End. The shrewd and sanguinary Monster who realized these violent murders called himself "Jack the Ripper", signing with his "trade name" the letters he sent to the Central News Agency and through the press he soon became a myth, the most famous "serial killer" of all time. As a matter of fact, his legend survived, and his evil figure still haunts the pages of books and---of course--the frames of many films; among the most famous From Hell (2001) by Albert and Allen Hughes, taken from the graphic novel of the same name by Moore and Campbell; Jack the Ripper (1976) by Jess Franco, with a disturbing Klaus Kinski, but also the TV movie directed by David Wickes in 1998 entitled Jack The Ripper; more obliquely, Jack appears also in The Lodger (1913) and Frenzy (1972) by Alfred Hitchcock. But can these movies be defined as true biopics of Jack? Strangely enough, it seems, these biographies contribute to build the mythic "anonymity" of the Ripper, encouraging (and fascinating) fear and nightmares.展开更多
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of di...Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising.展开更多
Previous studies have shown that individuals responded preferentially to the mark of the top-scent donor relative to that of the bottom-scent donor of an over-mark. However, terrestrial mammals are likely to encounter...Previous studies have shown that individuals responded preferentially to the mark of the top-scent donor relative to that of the bottom-scent donor of an over-mark. However, terrestrial mammals are likely to encounter over-marks consisting of the scent marks of more than two same-sex conspecifics in the intersections of runways, near the nests of sexually receptive female conspecifics, and inside and along the borders of the territories of conspecifics. We determined how meadow voles, Microtus pennsylvanicus, respond to the marks of the top-, middle-, and bottom-scent donors of an over-mark. We tested the hypothesis that voles exposed to an over-mark will respond preferentially to the scent marks that were deposited more recently, the scent marks that were on top or near the top of the over-mark, compared to the scent marks that were deposited earlier or near the bot- tom of the over-mark. Voles spent more time investigating the mark of the top-scent donor than that of the either the middle- or bottom-scent donor. However, males but not female voles spent more time investigating the middle-scent mark than the bot- tom-scent mark. We also tested the hypothesis that voles evaluate and respond to over-marks differently from single scent marks. Voles spent more time investigating the marks of the top-, middle-, and bottom-scent donors compared to scent marks that were not part of the over-mark. Voles can distinguish among the overlapping scent marks of three scent donors and sex differences exist in the values they appear to attach to each of these scent marks [Current Zoology 57 (4): 441-448, 2011 ].展开更多
基金Funded by Chongqing Natural Science Foundation (No. CSTC2005BB2189) and Chongqing High Tech Projects Foundation (No. 8277)
文摘Fuzzy cognitive maps (FCM) is a well-established artificial intelligence technique, which can be effectively applied in the domains of performance measurement, decision making and other management science. FCM can be a useful tool in a group decision-making environment by using scientifically integrated expert knowledge. The theories of FCM and balance scorecard (BSC) both emphasize cause-and-effect relationships among indicators in a complex system, but few reports have been published addressing the combined application of these two techniques. In this paper we propose a FCM simulation model for the sample performance measurement system of Intemet-based supply chain, which is constructed by BSC theory. We gave examples to explain how FCM can be adapted to execute the causal mechanism of BSC, and also how FCM can support group decision-making and forecasting in performance measurement.
文摘The invocation of World Wide Web (www) first triggered mass adoption of the Internet for public access to digital information exchanges across the globe. To get a big market on the Web, a special security infrastructure would need to be put into place transforming the wild-and-woolly Internet into a network with end-to-end protections. XML (extensible Markup Language) is widely accepted as powerful data representation standard for electronic documents, so a security mechanism for XML documents must be provided in the first place to secure electronic commerce over Internet. In this paper the authors design and implement a secure framework that provides XML signature function, XML Element-wise Encryption function, smart card based crypto API library and Public Key Infrastructure (PKI) security functions to achieve confidentiality, integrity, message authentication, and/or signer authentication services for XML documents and existing non-XML documents that are exchanged by Internet for E-commerce application.
文摘During the last months of 1888 the populous quarter of Whitechapel, London, was stained with the blood of five women, all booked prostitutes and chronic alcoholics, worthy representatives of the diseases/vices of the Victorian East End. The shrewd and sanguinary Monster who realized these violent murders called himself "Jack the Ripper", signing with his "trade name" the letters he sent to the Central News Agency and through the press he soon became a myth, the most famous "serial killer" of all time. As a matter of fact, his legend survived, and his evil figure still haunts the pages of books and---of course--the frames of many films; among the most famous From Hell (2001) by Albert and Allen Hughes, taken from the graphic novel of the same name by Moore and Campbell; Jack the Ripper (1976) by Jess Franco, with a disturbing Klaus Kinski, but also the TV movie directed by David Wickes in 1998 entitled Jack The Ripper; more obliquely, Jack appears also in The Lodger (1913) and Frenzy (1972) by Alfred Hitchcock. But can these movies be defined as true biopics of Jack? Strangely enough, it seems, these biographies contribute to build the mythic "anonymity" of the Ripper, encouraging (and fascinating) fear and nightmares.
文摘Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising.
文摘Previous studies have shown that individuals responded preferentially to the mark of the top-scent donor relative to that of the bottom-scent donor of an over-mark. However, terrestrial mammals are likely to encounter over-marks consisting of the scent marks of more than two same-sex conspecifics in the intersections of runways, near the nests of sexually receptive female conspecifics, and inside and along the borders of the territories of conspecifics. We determined how meadow voles, Microtus pennsylvanicus, respond to the marks of the top-, middle-, and bottom-scent donors of an over-mark. We tested the hypothesis that voles exposed to an over-mark will respond preferentially to the scent marks that were deposited more recently, the scent marks that were on top or near the top of the over-mark, compared to the scent marks that were deposited earlier or near the bot- tom of the over-mark. Voles spent more time investigating the mark of the top-scent donor than that of the either the middle- or bottom-scent donor. However, males but not female voles spent more time investigating the middle-scent mark than the bot- tom-scent mark. We also tested the hypothesis that voles evaluate and respond to over-marks differently from single scent marks. Voles spent more time investigating the marks of the top-, middle-, and bottom-scent donors compared to scent marks that were not part of the over-mark. Voles can distinguish among the overlapping scent marks of three scent donors and sex differences exist in the values they appear to attach to each of these scent marks [Current Zoology 57 (4): 441-448, 2011 ].