with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ...with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.展开更多
Firstly data standardization technology and combined classification method have been applied to carry out classification of kinematic behaviors and mechanisms in the mapping field between the kinematic behavior level ...Firstly data standardization technology and combined classification method have been applied to carry out classification of kinematic behaviors and mechanisms in the mapping field between the kinematic behavior level and the mechanism level of conceptual design.The principle of computer coding and storing have been built to give a fast and broad selection of mechanisms that meets the requirements of basic motion characters.Then on the basis of mentioned above,the heuristic matching propagation principle (HMPP) of kinematic behaviors and its true table serves as a guide to perform mechanism types selection.Finally an application is given to indicate its practicability and effectiveness.展开更多
With the rapid development of the information technology (IT) and the more competitive environment of the corporations, IT is not only important for the enterprises tactically but also strategically, We extend the c...With the rapid development of the information technology (IT) and the more competitive environment of the corporations, IT is not only important for the enterprises tactically but also strategically, We extend the concept of the critical success factors (CSF) and Nolan's stages theory to identify the IT issues and measure their CSF of the manufacturers in China. We put forward the IT selection matrix based on Nolan's stages theory to analyze the IT application in manufacturers in Beijing based on our survey. We analyze the development of IT, IT selection strategy and the CSF influencing the IT growth of manufacturers in China.展开更多
文摘with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality.
基金Sponsored by the Chinese National Foundation of Science Na 59875058.
文摘Firstly data standardization technology and combined classification method have been applied to carry out classification of kinematic behaviors and mechanisms in the mapping field between the kinematic behavior level and the mechanism level of conceptual design.The principle of computer coding and storing have been built to give a fast and broad selection of mechanisms that meets the requirements of basic motion characters.Then on the basis of mentioned above,the heuristic matching propagation principle (HMPP) of kinematic behaviors and its true table serves as a guide to perform mechanism types selection.Finally an application is given to indicate its practicability and effectiveness.
文摘With the rapid development of the information technology (IT) and the more competitive environment of the corporations, IT is not only important for the enterprises tactically but also strategically, We extend the concept of the critical success factors (CSF) and Nolan's stages theory to identify the IT issues and measure their CSF of the manufacturers in China. We put forward the IT selection matrix based on Nolan's stages theory to analyze the IT application in manufacturers in Beijing based on our survey. We analyze the development of IT, IT selection strategy and the CSF influencing the IT growth of manufacturers in China.