Based on convenience and safety of historical data application, B/S mode is used instead of database management structure of C/S mode, and it can not only combine database and network, but also realize the safe use of...Based on convenience and safety of historical data application, B/S mode is used instead of database management structure of C/S mode, and it can not only combine database and network, but also realize the safe use of historical data online. High-level programming language is used to develop a online management and application system of historical meteorological data based on B/S mode. System data import function can import ground report file sequence of Xuzhou ( including five county-level stations) into the database, construct Oracle database of Xuzhou and the five stations since 1953, and establish data tables of time, day, ten-day, monthly, quarterly and annual historical data, weather information and so forth. Management software of database server is established to realize instruction-level management and scheduling of database and a balanced distribution of resources among users. At the same time, a Web-based management application interface is set up to meet users' needs to retrieve a variety of repositories, and it provides statistical query of time, day, ten-day, monthly, quarterly and annual historical data and climate data for each meteorological element, thereby meeting the needs of meteorological research and all sectors of society for statistical query of meteorological data.展开更多
Platform data has already become an important asset for web-based companies,but this sort of data frequently includes large amounts of personal information.Platform data can be seen as belonging to an individual,belon...Platform data has already become an important asset for web-based companies,but this sort of data frequently includes large amounts of personal information.Platform data can be seen as belonging to an individual,belonging to a platform,belonging to some combinations of the two,or can be seen as a form of Internet-based public data.Analysis of legal clauses and doctrines as well as analysis based in legitimacy and consequentialism both fail to completely delineate data ownership.One potential reason for this is that there are many types of platform data,and that each type is highly dependent on circumstances.The determination of rights in regard to platform data should be done in a way which revolves around a contextual regulatory framework,one in which the rules of reason is applied on a case-by-case basis and in which gradual changes are done in a bottom-up manner,and not one which seeks to establish a universal set of data regulations.In actual judgments,factors such as the nature of the platform and the nature of the data crawling behavior should be comprehensively considered while ensuring a balance of data circulation and data protection.展开更多
In the era of big data,the ways people work,live and think have changed dramatically,and the social governance system is also being restructured.Achieving intelligent social governance has now become a national strate...In the era of big data,the ways people work,live and think have changed dramatically,and the social governance system is also being restructured.Achieving intelligent social governance has now become a national strategy.The application of big data technology to counterterrorism efforts has become a powerful weapon for all countries.However,due to the uncertainty,difficulty of interpretation and potential risk of discrimination in big data technology and algorithm models,basic human rights,freedom and even ethics are likely to be impacted and challenged.As a result,there is an urgent need to prioritize basic human rights and regulate the application of big data for counter terrorism purposes.The legislation and law enforcement regarding the use of big data to counter terrorism must be subject to constitutional and other legal reviews,so as to strike a balance between safeguarding national security and protecting basic human rights.展开更多
China is aggressively pursuing digital transformation,and data,alike labor,technology,capital,and knowledge,has become as a crucial factor of production.Digital transformation is accelerating the emergence of a data-i...China is aggressively pursuing digital transformation,and data,alike labor,technology,capital,and knowledge,has become as a crucial factor of production.Digital transformation is accelerating the emergence of a data-intensive society,and the ensuing difficulties of balancing freedom and responsibility,openness and security,as well as free sharing and legal regulation are posing new challenges to national and social governance.Among these challenges,defining data ownership,the social disorder and anomie brought about by the unclear definition of data ownership,and data ownership regulatory path are new propositions that need to be urgently addressed in this data-intensive society.This paper systematically explains the theoretical meaning and practical value of data ownership through a literature review on the analysis of domestic and foreign scholars as well as research think tanks,compares the differences and inherent conflicts between the definition of data ownership by the government,enterprises,and society in China,thoroughly compares the definition standards of the European Union,the United States,and Japan,and on this basis,discusses the formation of a definition of data ownership that meets the requirements of China’s digital transformation.展开更多
Dempster-Shafer (DS) theory of evidence has been widely used in many data fusion ap- plication systems. However, how to determine basic probability assignment, which is the main and the first step in evidence theory, ...Dempster-Shafer (DS) theory of evidence has been widely used in many data fusion ap- plication systems. However, how to determine basic probability assignment, which is the main and the first step in evidence theory, is still an open issue. In this paper, a new method to obtain Basic Probability Assignment (BPA) is proposed based on the similarity measure between generalized fuzzy numbers. In the proposed method, species model can be constructed by determination of the min, average and max value to construct a fuzzy number. Then, a new Radius Of Gravity (ROG) method to determine the similarity measure between generalized fuzzy numbers is used to calculate the BPA functions of each instance. Finally, the efficiency of the proposed method is illustrated by the classi- fication of Iris data.展开更多
This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-...This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-combat behavior data.The technique of air-combat behavior data mining based on the truncation method is proposed to discover the air-combat rules or patterns.The simulation platform of the air-combat behavior data mining that supports two fighters is implemented.The simulation experimental results show that the proposed air-combat behavior data mining technique based on the truncation method is feasible whether in efficiency or in effectiveness.展开更多
This paper gives a definition of permanent optimal data point of Least Absolute Deviation(LAD)problem.Some theoretical results on non-degenerate LAD problem are obtained.For computing LAD problem,an efficient,algorith...This paper gives a definition of permanent optimal data point of Least Absolute Deviation(LAD)problem.Some theoretical results on non-degenerate LAD problem are obtained.For computing LAD problem,an efficient,algorithm is given according to the idea of permanent optimal data point.Numerical experience shows that our algorithm is better than many of others,including the famous B R algorithm.展开更多
In order to extract the boundary of rural habitation, based on geographic name data and basic geographic information data, an extraction method that use polygon aggregation is raised, it can extract the boundary of th...In order to extract the boundary of rural habitation, based on geographic name data and basic geographic information data, an extraction method that use polygon aggregation is raised, it can extract the boundary of three levels of rural habitation consists of town, administrative village and nature village. The method first extracts the boundary of nature village by aggregating the resident polygon, then extracts the boundary of administrative village by aggregating the boundary of nature village, and last extracts the boundary of town by aggregating the boundary of administrative village. The related methods of extracting the boundary of those three levels rural habitation has been given in detail during the experiment with basic geographic information data and geographic name data. Experimental results show the method can be a reference for boundary extraction of rural habitation.展开更多
In the scenario of large-scale data ownership transactions,existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communi...In the scenario of large-scale data ownership transactions,existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communication,which greatly affects their practicability.This paper proposes a data integrity audit scheme based on blockchain where data ownership can be traded in batches.A data tag structure which supports data ownership batch transaction is adopted in our scheme.The update process of data tag does not involve the unique information of each data,so that any user can complete ownership transactions of multiple data in a single transaction through a single transaction auxiliary information.At the same time,smart contract is introduced into our scheme to perform data integrity audit belongs to third-party auditors,therefore our scheme can free from potential security risks of malicious third-party auditors.Safety analysis shows that our scheme is proved to be safe under the stochastic prediction model and k-CEIDH hypothesis.Compared with similar schemes,the experiment shows that communication overhead and computing time of data ownership transaction in our scheme is lower.Meanwhile,the communication overhead and computing time of our scheme is similar to that of similar schemes in data integrity audit.展开更多
文摘Based on convenience and safety of historical data application, B/S mode is used instead of database management structure of C/S mode, and it can not only combine database and network, but also realize the safe use of historical data online. High-level programming language is used to develop a online management and application system of historical meteorological data based on B/S mode. System data import function can import ground report file sequence of Xuzhou ( including five county-level stations) into the database, construct Oracle database of Xuzhou and the five stations since 1953, and establish data tables of time, day, ten-day, monthly, quarterly and annual historical data, weather information and so forth. Management software of database server is established to realize instruction-level management and scheduling of database and a balanced distribution of resources among users. At the same time, a Web-based management application interface is set up to meet users' needs to retrieve a variety of repositories, and it provides statistical query of time, day, ten-day, monthly, quarterly and annual historical data and climate data for each meteorological element, thereby meeting the needs of meteorological research and all sectors of society for statistical query of meteorological data.
基金This paper is a periodic achievement of two projects of the National Social Science Fund of China,those being the major project:“Personal Data Protection and Data Rights Systems in the Age of Big Data”(Project No.18ZDA146)the general project:“Research on Personal Information Protection and Corporate Data Ownership in the Context of Big Data”(Project No.18BFX198)。
文摘Platform data has already become an important asset for web-based companies,but this sort of data frequently includes large amounts of personal information.Platform data can be seen as belonging to an individual,belonging to a platform,belonging to some combinations of the two,or can be seen as a form of Internet-based public data.Analysis of legal clauses and doctrines as well as analysis based in legitimacy and consequentialism both fail to completely delineate data ownership.One potential reason for this is that there are many types of platform data,and that each type is highly dependent on circumstances.The determination of rights in regard to platform data should be done in a way which revolves around a contextual regulatory framework,one in which the rules of reason is applied on a case-by-case basis and in which gradual changes are done in a bottom-up manner,and not one which seeks to establish a universal set of data regulations.In actual judgments,factors such as the nature of the platform and the nature of the data crawling behavior should be comprehensively considered while ensuring a balance of data circulation and data protection.
文摘In the era of big data,the ways people work,live and think have changed dramatically,and the social governance system is also being restructured.Achieving intelligent social governance has now become a national strategy.The application of big data technology to counterterrorism efforts has become a powerful weapon for all countries.However,due to the uncertainty,difficulty of interpretation and potential risk of discrimination in big data technology and algorithm models,basic human rights,freedom and even ethics are likely to be impacted and challenged.As a result,there is an urgent need to prioritize basic human rights and regulate the application of big data for counter terrorism purposes.The legislation and law enforcement regarding the use of big data to counter terrorism must be subject to constitutional and other legal reviews,so as to strike a balance between safeguarding national security and protecting basic human rights.
文摘China is aggressively pursuing digital transformation,and data,alike labor,technology,capital,and knowledge,has become as a crucial factor of production.Digital transformation is accelerating the emergence of a data-intensive society,and the ensuing difficulties of balancing freedom and responsibility,openness and security,as well as free sharing and legal regulation are posing new challenges to national and social governance.Among these challenges,defining data ownership,the social disorder and anomie brought about by the unclear definition of data ownership,and data ownership regulatory path are new propositions that need to be urgently addressed in this data-intensive society.This paper systematically explains the theoretical meaning and practical value of data ownership through a literature review on the analysis of domestic and foreign scholars as well as research think tanks,compares the differences and inherent conflicts between the definition of data ownership by the government,enterprises,and society in China,thoroughly compares the definition standards of the European Union,the United States,and Japan,and on this basis,discusses the formation of a definition of data ownership that meets the requirements of China’s digital transformation.
基金Supported by National High Technology Project (863)(No. 2006AA02Z320)the National Natural Science Founda-tion of China (No.30700154, No.60874105)+1 种基金Zhejiang Natural Science Foundation (No.Y107458, RY1080422)the School Youth Found of Shanghai Jiaotong University
文摘Dempster-Shafer (DS) theory of evidence has been widely used in many data fusion ap- plication systems. However, how to determine basic probability assignment, which is the main and the first step in evidence theory, is still an open issue. In this paper, a new method to obtain Basic Probability Assignment (BPA) is proposed based on the similarity measure between generalized fuzzy numbers. In the proposed method, species model can be constructed by determination of the min, average and max value to construct a fuzzy number. Then, a new Radius Of Gravity (ROG) method to determine the similarity measure between generalized fuzzy numbers is used to calculate the BPA functions of each instance. Finally, the efficiency of the proposed method is illustrated by the classi- fication of Iris data.
文摘This paper considers the problem of applying data mining techniques to aeronautical field.The truncation method,which is one of the techniques in the aeronautical data mining,can be used to efficiently handle the air-combat behavior data.The technique of air-combat behavior data mining based on the truncation method is proposed to discover the air-combat rules or patterns.The simulation platform of the air-combat behavior data mining that supports two fighters is implemented.The simulation experimental results show that the proposed air-combat behavior data mining technique based on the truncation method is feasible whether in efficiency or in effectiveness.
基金The Project was supported by Natural Science Foundation of Jiangsu Province.
文摘This paper gives a definition of permanent optimal data point of Least Absolute Deviation(LAD)problem.Some theoretical results on non-degenerate LAD problem are obtained.For computing LAD problem,an efficient,algorithm is given according to the idea of permanent optimal data point.Numerical experience shows that our algorithm is better than many of others,including the famous B R algorithm.
文摘In order to extract the boundary of rural habitation, based on geographic name data and basic geographic information data, an extraction method that use polygon aggregation is raised, it can extract the boundary of three levels of rural habitation consists of town, administrative village and nature village. The method first extracts the boundary of nature village by aggregating the resident polygon, then extracts the boundary of administrative village by aggregating the boundary of nature village, and last extracts the boundary of town by aggregating the boundary of administrative village. The related methods of extracting the boundary of those three levels rural habitation has been given in detail during the experiment with basic geographic information data and geographic name data. Experimental results show the method can be a reference for boundary extraction of rural habitation.
基金supported by National Key R&D Program of China(2020YFB1005900)the National Natural Science Foundation of China(62072051).
文摘In the scenario of large-scale data ownership transactions,existing data integrity auditing schemes are faced with security risks from malicious third-party auditors and are inefficient in both calculation and communication,which greatly affects their practicability.This paper proposes a data integrity audit scheme based on blockchain where data ownership can be traded in batches.A data tag structure which supports data ownership batch transaction is adopted in our scheme.The update process of data tag does not involve the unique information of each data,so that any user can complete ownership transactions of multiple data in a single transaction through a single transaction auxiliary information.At the same time,smart contract is introduced into our scheme to perform data integrity audit belongs to third-party auditors,therefore our scheme can free from potential security risks of malicious third-party auditors.Safety analysis shows that our scheme is proved to be safe under the stochastic prediction model and k-CEIDH hypothesis.Compared with similar schemes,the experiment shows that communication overhead and computing time of data ownership transaction in our scheme is lower.Meanwhile,the communication overhead and computing time of our scheme is similar to that of similar schemes in data integrity audit.