期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Collection and Judgment of Electronic Data Evidence in Criminal Cases:From the Perspective of Investigation and Evidence Collection by Public Security Organs
1
作者 Bo Wang Yuxian Liu 《Journal of Forensic Science and Medicine》 2019年第4期187-194,共8页
With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the... With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the main media for people to store information.In the field of criminal offenses,the network is likely to be used to perpetrate criminal schemes,implement crimes,or help hinder investigations afterward.These acts will leave an electronic data trail,such as WeChat information,emails,or blogs.After a crime occurs,an evidence investigator should accurately,timely,and comprehensively obtain all electronic data related to the case by collecting,extracting,and transferring this data according to the law,and examining the authenticity,legality,and relevance of the evidence.Through a comprehensive review,the investigator should clarify the relationship between the electronic data and the facts to be proved and make full use of the obtained electronic evidence in criminal proceedings. 展开更多
关键词 AUTHENTICITY COLLECTION electronic data EXTRACTION
原文传递
Electronic Data Preservation and Storage of Evidence by Blockchain
2
作者 Hua Shang Hui Qiang 《Journal of Forensic Science and Medicine》 2020年第1期27-36,共10页
In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can... In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can effectively guarantee the authenticity and security of electronic data.Blockchains are inherently traceable,de‑centralized,and difficult to tamper with,which can be enough served as the basic technology of electronic data certification.Preservation by blockchain mainly includes the following links:platform registration and identity authentication,generation and transmission of electronic data,and storage of electronic data.Preservation by blockchain has higher security than centralized online security because of distributed storage.However,it should be acknowledged that the preservation by blockchain is not without risk.The court should adhere to the principle of individual review of each case and review the electronic data from its generation,transmission,reception,storage,and collection. 展开更多
关键词 electronic data online evidence preservation preservation by blockchain
原文传递
Basic Rights Intervention in the Obtainment of Digital Data as Evidence in Criminal Case——An Analysis Based on Six Typical Cases
3
作者 谢登科 LIU Zhao 《The Journal of Human Rights》 2021年第1期60-79,共20页
Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data con... Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data contains all kinds off undamental rights.To clearly understand the fundamental rights contained in electronic data is an important precondition for respecting and protecting human rights in electronic data evidence obtainment.Property-type electronic data contain property rights.Traditional investigation measures such as seizure and freezing the property cannot be taken to obtain valid evidence.To directly turn the digital currency into cash and then seize the cash,will result in insufficient property rights protection,and may violate other fundamental rights of criminal suspects.The expansion of the object of the right to privacy and the change of the carrier on which the expansion depends in privacytype electronic data,determine that the obtainment of the privacytype electronic data evidence may result in intangible intervention and secondary intervention in the right to privacy.Communicationtype electronic data contains freedom of communication and the right to communication secrecy.Investigative organs can collect this kind of electronic data through search,acquisition,remote investigation and examination,and other means.However,according to the existing institution design,the above-mentioned means may result in insufficient protection of freedom of communication.Expressiontype electronic data contains freedom of expression.If investigative organs collect this kind of data,they may intervene in freedom of the press though they do not intervene in narrowly defined freedom of expression.The basic principles that should be followed in the electronic data evidence obtainment which intervenes in fundamental rights include the doctrine of legal reservation,the writ system,the principle ofp roportionality,and illegal evidence exclusion. 展开更多
关键词 electronic data fundamental rights intervention in rights legal principles
下载PDF
New reconstruction and forecasting algorithm for TEC data
4
作者 王俊 盛峥 +1 位作者 江宇 石汉青 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第9期602-608,共7页
To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itse... To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itself. It is a self-adaptive EOF decomposition without any prior information needed, and the error of reconstructed data can be estimated. The interval quartering algorithm and cross-validation algorithm are used to compute the optimal number of EOFs for reconstruction. The interval quartering algorithm can reduce the computation time. The application of the data interpolating empirical orthogonal functions (DINEOF) method to the real data have demonstrated that the method can reconstruct the TEC map with high accuracy, which can be employed on the real-time system in the future work. 展开更多
关键词 RECONSTRUCTION total electron content (TEC) data empirical orthogonal function (EOF) decompo-sition interval quartering algorithm
下载PDF
Call for Papers Journal of Electronic Science and Technology Special Section on Energy-Efficient Technologies
5
《Journal of Electronic Science and Technology》 CAS CSCD 2015年第4期384-384,共1页
Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. ... Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. of Electron. Sci. & Tech. of China qli@uestc.edu.cnProf. Wei-Sheng Zhao Centre National de la Recherche Scientifique (National Center for Scientific Research) weisheng.zhao@u-psud, fr From energy generation to transportation, from energy distribution to storage, from semiconductor processing to communications, and from portable devices to data centers, energy consumption has grown to be a major limitation to usability and performance. Therefore, energy-efficient technologies become an active research area motivated by energy necessity and environmental concerns. With energy-efficient technologies, a number of epoch-making technical approaches can be expected. Energy efficiency technologies are affecting all forms of energy conversion and all aspects of life. 展开更多
关键词 Call for Papers Journal of electronic Science and Technology Special Section on data Sciences and data Engineering
下载PDF
上合组织国际物流园电子数据交换系统设计与实现
6
作者 朱博 《电脑编程技巧与维护》 2023年第3期87-89,共3页
基于公共信息平台的数据交换服务系统,对外主要与政府单位、物流企业、货主、公共服务设施、物流基础设施等业务系统对接,获取除口岸部门以外的单位数据;对内与数据库协同系统对接,实现数据资源的统一存储、管理与共享应用。
关键词 电子数据交换系统(electronic data Interchange EDI) 物流 数据处理
下载PDF
面向电子商务的Web使用挖掘数据仓库设计与实现
7
作者 张榛楠 钱旭 江涛 《制造业自动化》 北大核心 2008年第9期63-65,79,共4页
文章将数据仓库技术应用于Web使用日志文件、用户概貌文件和商业数据库的挖掘,提出了面向电子商务的Web使用挖掘数据仓库系统模型,包括数据抽取、数据转换、数据集成、数据装载和模式发现及分析5个组件,实践证明该模型是有效的。
关键词 电子商务 WEB使用挖掘 数据仓库
下载PDF
Security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data
8
作者 In-Ho Lee Myungjin Cho 《Chinese Optics Letters》 SCIE EI CAS CSCD 2015年第1期22-26,共5页
We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fi... We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme. 展开更多
关键词 data Security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部