With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the...With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the main media for people to store information.In the field of criminal offenses,the network is likely to be used to perpetrate criminal schemes,implement crimes,or help hinder investigations afterward.These acts will leave an electronic data trail,such as WeChat information,emails,or blogs.After a crime occurs,an evidence investigator should accurately,timely,and comprehensively obtain all electronic data related to the case by collecting,extracting,and transferring this data according to the law,and examining the authenticity,legality,and relevance of the evidence.Through a comprehensive review,the investigator should clarify the relationship between the electronic data and the facts to be proved and make full use of the obtained electronic evidence in criminal proceedings.展开更多
In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can...In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can effectively guarantee the authenticity and security of electronic data.Blockchains are inherently traceable,de‑centralized,and difficult to tamper with,which can be enough served as the basic technology of electronic data certification.Preservation by blockchain mainly includes the following links:platform registration and identity authentication,generation and transmission of electronic data,and storage of electronic data.Preservation by blockchain has higher security than centralized online security because of distributed storage.However,it should be acknowledged that the preservation by blockchain is not without risk.The court should adhere to the principle of individual review of each case and review the electronic data from its generation,transmission,reception,storage,and collection.展开更多
Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data con...Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data contains all kinds off undamental rights.To clearly understand the fundamental rights contained in electronic data is an important precondition for respecting and protecting human rights in electronic data evidence obtainment.Property-type electronic data contain property rights.Traditional investigation measures such as seizure and freezing the property cannot be taken to obtain valid evidence.To directly turn the digital currency into cash and then seize the cash,will result in insufficient property rights protection,and may violate other fundamental rights of criminal suspects.The expansion of the object of the right to privacy and the change of the carrier on which the expansion depends in privacytype electronic data,determine that the obtainment of the privacytype electronic data evidence may result in intangible intervention and secondary intervention in the right to privacy.Communicationtype electronic data contains freedom of communication and the right to communication secrecy.Investigative organs can collect this kind of electronic data through search,acquisition,remote investigation and examination,and other means.However,according to the existing institution design,the above-mentioned means may result in insufficient protection of freedom of communication.Expressiontype electronic data contains freedom of expression.If investigative organs collect this kind of data,they may intervene in freedom of the press though they do not intervene in narrowly defined freedom of expression.The basic principles that should be followed in the electronic data evidence obtainment which intervenes in fundamental rights include the doctrine of legal reservation,the writ system,the principle ofp roportionality,and illegal evidence exclusion.展开更多
To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itse...To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itself. It is a self-adaptive EOF decomposition without any prior information needed, and the error of reconstructed data can be estimated. The interval quartering algorithm and cross-validation algorithm are used to compute the optimal number of EOFs for reconstruction. The interval quartering algorithm can reduce the computation time. The application of the data interpolating empirical orthogonal functions (DINEOF) method to the real data have demonstrated that the method can reconstruct the TEC map with high accuracy, which can be employed on the real-time system in the future work.展开更多
Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. ...Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. of Electron. Sci. & Tech. of China qli@uestc.edu.cnProf. Wei-Sheng Zhao Centre National de la Recherche Scientifique (National Center for Scientific Research) weisheng.zhao@u-psud, fr From energy generation to transportation, from energy distribution to storage, from semiconductor processing to communications, and from portable devices to data centers, energy consumption has grown to be a major limitation to usability and performance. Therefore, energy-efficient technologies become an active research area motivated by energy necessity and environmental concerns. With energy-efficient technologies, a number of epoch-making technical approaches can be expected. Energy efficiency technologies are affecting all forms of energy conversion and all aspects of life.展开更多
We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fi...We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.展开更多
文摘With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the main media for people to store information.In the field of criminal offenses,the network is likely to be used to perpetrate criminal schemes,implement crimes,or help hinder investigations afterward.These acts will leave an electronic data trail,such as WeChat information,emails,or blogs.After a crime occurs,an evidence investigator should accurately,timely,and comprehensively obtain all electronic data related to the case by collecting,extracting,and transferring this data according to the law,and examining the authenticity,legality,and relevance of the evidence.Through a comprehensive review,the investigator should clarify the relationship between the electronic data and the facts to be proved and make full use of the obtained electronic evidence in criminal proceedings.
文摘In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can effectively guarantee the authenticity and security of electronic data.Blockchains are inherently traceable,de‑centralized,and difficult to tamper with,which can be enough served as the basic technology of electronic data certification.Preservation by blockchain mainly includes the following links:platform registration and identity authentication,generation and transmission of electronic data,and storage of electronic data.Preservation by blockchain has higher security than centralized online security because of distributed storage.However,it should be acknowledged that the preservation by blockchain is not without risk.The court should adhere to the principle of individual review of each case and review the electronic data from its generation,transmission,reception,storage,and collection.
基金the project of China Human Right Research Society“Research on Human Right Protection in Electronic Data Evidence Obtainment”(CSHRS2020-17YB)the key project of the National Social Science Fund of China“Research on the Criminal Evidence Theory System with Chinese Characteristics”(18ZDA139)
文摘Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data contains all kinds off undamental rights.To clearly understand the fundamental rights contained in electronic data is an important precondition for respecting and protecting human rights in electronic data evidence obtainment.Property-type electronic data contain property rights.Traditional investigation measures such as seizure and freezing the property cannot be taken to obtain valid evidence.To directly turn the digital currency into cash and then seize the cash,will result in insufficient property rights protection,and may violate other fundamental rights of criminal suspects.The expansion of the object of the right to privacy and the change of the carrier on which the expansion depends in privacytype electronic data,determine that the obtainment of the privacytype electronic data evidence may result in intangible intervention and secondary intervention in the right to privacy.Communicationtype electronic data contains freedom of communication and the right to communication secrecy.Investigative organs can collect this kind of electronic data through search,acquisition,remote investigation and examination,and other means.However,according to the existing institution design,the above-mentioned means may result in insufficient protection of freedom of communication.Expressiontype electronic data contains freedom of expression.If investigative organs collect this kind of data,they may intervene in freedom of the press though they do not intervene in narrowly defined freedom of expression.The basic principles that should be followed in the electronic data evidence obtainment which intervenes in fundamental rights include the doctrine of legal reservation,the writ system,the principle ofp roportionality,and illegal evidence exclusion.
基金supported by the National Natural Science Foundation of China(Grant No.41105013,41375028,and 61271106)the National Natural Science Foundation of Jiangsu Province,China(Grant No.BK2011122)the Key Laboratory of Meteorological Observation and Information Processing Scientific Research Fund of Jiangsu Province,China(Grant No.KDXS1205)
文摘To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itself. It is a self-adaptive EOF decomposition without any prior information needed, and the error of reconstructed data can be estimated. The interval quartering algorithm and cross-validation algorithm are used to compute the optimal number of EOFs for reconstruction. The interval quartering algorithm can reduce the computation time. The application of the data interpolating empirical orthogonal functions (DINEOF) method to the real data have demonstrated that the method can reconstruct the TEC map with high accuracy, which can be employed on the real-time system in the future work.
文摘Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. of Electron. Sci. & Tech. of China qli@uestc.edu.cnProf. Wei-Sheng Zhao Centre National de la Recherche Scientifique (National Center for Scientific Research) weisheng.zhao@u-psud, fr From energy generation to transportation, from energy distribution to storage, from semiconductor processing to communications, and from portable devices to data centers, energy consumption has grown to be a major limitation to usability and performance. Therefore, energy-efficient technologies become an active research area motivated by energy necessity and environmental concerns. With energy-efficient technologies, a number of epoch-making technical approaches can be expected. Energy efficiency technologies are affecting all forms of energy conversion and all aspects of life.
基金supported in part by the Basic Science Research Program through the National Research Foundation of Korea Funded by the Ministry of Science,ICT & Future Planning(No.2011-0030079)the Ministry of Education(No.NRF-2013R1A1A2057549)
文摘We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.