With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online...With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online retrieval of electronic data is positioned as a new type of arbitrary investigative measure.However,study of its actual operation has found that the online retrieval of electronic data does not fully comply with the characteristics of arbitrary investigative measures.The root cause is its inaccurately defined nature due to analogy errors,an emphasis on the authenticity of electronic data at the cost of rights protection,insufficient effectiveness of normative documents to break through the boundaries of law,and superficial inconsistency found in the mechanical comparison with the nature of existing investigative measures causes.The nature of electronic data retrieved online should be defined according to different circumstances.The retrieval of electronic data disclosed on the Internet is an arbitrary investigative measure,and following procedural specifications should be sufficient.When investigators conceal their true identities and enter the cyberspace of the suspected crime through a registered account to extract dynamic electronic data for criminal activities,it is essentially a covert investigation in cyberspace,and they should follow the normative requirements for covert investigations.The retrieval of dynamic electronic data from private spaces is a technical investigative measure and should be implemented in accordance with the technical investigative procedures.Retrieval of remote“non-public electronic data involving privacy”is a mandatory investigative measure,and is essentially a search in the virtual space.Therefore,procedural specifications should be set in accordance with the standards of searching.展开更多
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e...To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.展开更多
To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itse...To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itself. It is a self-adaptive EOF decomposition without any prior information needed, and the error of reconstructed data can be estimated. The interval quartering algorithm and cross-validation algorithm are used to compute the optimal number of EOFs for reconstruction. The interval quartering algorithm can reduce the computation time. The application of the data interpolating empirical orthogonal functions (DINEOF) method to the real data have demonstrated that the method can reconstruct the TEC map with high accuracy, which can be employed on the real-time system in the future work.展开更多
Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data con...Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data contains all kinds off undamental rights.To clearly understand the fundamental rights contained in electronic data is an important precondition for respecting and protecting human rights in electronic data evidence obtainment.Property-type electronic data contain property rights.Traditional investigation measures such as seizure and freezing the property cannot be taken to obtain valid evidence.To directly turn the digital currency into cash and then seize the cash,will result in insufficient property rights protection,and may violate other fundamental rights of criminal suspects.The expansion of the object of the right to privacy and the change of the carrier on which the expansion depends in privacytype electronic data,determine that the obtainment of the privacytype electronic data evidence may result in intangible intervention and secondary intervention in the right to privacy.Communicationtype electronic data contains freedom of communication and the right to communication secrecy.Investigative organs can collect this kind of electronic data through search,acquisition,remote investigation and examination,and other means.However,according to the existing institution design,the above-mentioned means may result in insufficient protection of freedom of communication.Expressiontype electronic data contains freedom of expression.If investigative organs collect this kind of data,they may intervene in freedom of the press though they do not intervene in narrowly defined freedom of expression.The basic principles that should be followed in the electronic data evidence obtainment which intervenes in fundamental rights include the doctrine of legal reservation,the writ system,the principle ofp roportionality,and illegal evidence exclusion.展开更多
Building cyber-physical system(CPS) models of machine tools is a key technology for intelligent manufacturing. The massive electronic data from a computer numerical control(CNC) system during the work processes of a C...Building cyber-physical system(CPS) models of machine tools is a key technology for intelligent manufacturing. The massive electronic data from a computer numerical control(CNC) system during the work processes of a CNC machine tool is the main source of the big data on which a CPS model is established. In this work-process model, a method based on instruction domain is applied to analyze the electronic big data, and a quantitative description of the numerical control(NC) processes is built according to the G code of the processes. Utilizing the instruction domain, a work-process CPS model is established on the basis of the accurate, real-time mapping of the manufacturing tasks, resources, and status of the CNC machine tool. Using such models, case studies are conducted on intelligent-machining applications, such as the optimization of NC processing parameters and the health assurance of CNC machine tools.展开更多
Developing nations, like Nigeria, whose financial systems and infrastructural base are not yet fully developed face data rendition challenges which may hamper the representativeness of their interest rate statistics.A...Developing nations, like Nigeria, whose financial systems and infrastructural base are not yet fully developed face data rendition challenges which may hamper the representativeness of their interest rate statistics.A critical component of any credible interest rate data compilation framework relates to the sampling procedure.In Nigeria, no work has been done with regards to employing alternatives sampling techniques in the computation of interest rate statistics largely because of the small number of deposit money banks in the country. Leveraging on existing literature and established statistical methods, the study examines two sampling techniques for generating credible and reliable interest rates in Nigeria. The current interest rate compilation framework in the country is presented and alternative sampling procedures were explored with a view to investigating their appropriateness for Nigeria's interest rate computation. The interest rates generated based on the current population-based compilation method is compared with those of the alternative approaches. This paper recommends the use of purposive sampling method that covers Deposit Money Banks (DMBs) which account for about 70.0 per cent of the banking sector total assets as an appropriatealternative.展开更多
Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Inf...Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Information Technology (IT) can reduce bullwhip effect by sharing the information among the enterprises in the supply chain.展开更多
Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. ...Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. of Electron. Sci. & Tech. of China qli@uestc.edu.cnProf. Wei-Sheng Zhao Centre National de la Recherche Scientifique (National Center for Scientific Research) weisheng.zhao@u-psud, fr From energy generation to transportation, from energy distribution to storage, from semiconductor processing to communications, and from portable devices to data centers, energy consumption has grown to be a major limitation to usability and performance. Therefore, energy-efficient technologies become an active research area motivated by energy necessity and environmental concerns. With energy-efficient technologies, a number of epoch-making technical approaches can be expected. Energy efficiency technologies are affecting all forms of energy conversion and all aspects of life.展开更多
With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the...With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the main media for people to store information.In the field of criminal offenses,the network is likely to be used to perpetrate criminal schemes,implement crimes,or help hinder investigations afterward.These acts will leave an electronic data trail,such as WeChat information,emails,or blogs.After a crime occurs,an evidence investigator should accurately,timely,and comprehensively obtain all electronic data related to the case by collecting,extracting,and transferring this data according to the law,and examining the authenticity,legality,and relevance of the evidence.Through a comprehensive review,the investigator should clarify the relationship between the electronic data and the facts to be proved and make full use of the obtained electronic evidence in criminal proceedings.展开更多
In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can...In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can effectively guarantee the authenticity and security of electronic data.Blockchains are inherently traceable,de‑centralized,and difficult to tamper with,which can be enough served as the basic technology of electronic data certification.Preservation by blockchain mainly includes the following links:platform registration and identity authentication,generation and transmission of electronic data,and storage of electronic data.Preservation by blockchain has higher security than centralized online security because of distributed storage.However,it should be acknowledged that the preservation by blockchain is not without risk.The court should adhere to the principle of individual review of each case and review the electronic data from its generation,transmission,reception,storage,and collection.展开更多
We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fi...We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.展开更多
基金the phased research result of the Supreme People’s Procuratorate’s procuratorial theory research program“Research on the Governance Problems of the Crime of Aiding Information Network Criminal Activities”(Project Approval Number GJ2023D28)。
文摘With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online retrieval of electronic data is positioned as a new type of arbitrary investigative measure.However,study of its actual operation has found that the online retrieval of electronic data does not fully comply with the characteristics of arbitrary investigative measures.The root cause is its inaccurately defined nature due to analogy errors,an emphasis on the authenticity of electronic data at the cost of rights protection,insufficient effectiveness of normative documents to break through the boundaries of law,and superficial inconsistency found in the mechanical comparison with the nature of existing investigative measures causes.The nature of electronic data retrieved online should be defined according to different circumstances.The retrieval of electronic data disclosed on the Internet is an arbitrary investigative measure,and following procedural specifications should be sufficient.When investigators conceal their true identities and enter the cyberspace of the suspected crime through a registered account to extract dynamic electronic data for criminal activities,it is essentially a covert investigation in cyberspace,and they should follow the normative requirements for covert investigations.The retrieval of dynamic electronic data from private spaces is a technical investigative measure and should be implemented in accordance with the technical investigative procedures.Retrieval of remote“non-public electronic data involving privacy”is a mandatory investigative measure,and is essentially a search in the virtual space.Therefore,procedural specifications should be set in accordance with the standards of searching.
基金The National Key Research and Development Program of China(No.2019YFB1600200).
文摘To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety.
基金supported by the National Natural Science Foundation of China(Grant No.41105013,41375028,and 61271106)the National Natural Science Foundation of Jiangsu Province,China(Grant No.BK2011122)the Key Laboratory of Meteorological Observation and Information Processing Scientific Research Fund of Jiangsu Province,China(Grant No.KDXS1205)
文摘To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itself. It is a self-adaptive EOF decomposition without any prior information needed, and the error of reconstructed data can be estimated. The interval quartering algorithm and cross-validation algorithm are used to compute the optimal number of EOFs for reconstruction. The interval quartering algorithm can reduce the computation time. The application of the data interpolating empirical orthogonal functions (DINEOF) method to the real data have demonstrated that the method can reconstruct the TEC map with high accuracy, which can be employed on the real-time system in the future work.
基金the project of China Human Right Research Society“Research on Human Right Protection in Electronic Data Evidence Obtainment”(CSHRS2020-17YB)the key project of the National Social Science Fund of China“Research on the Criminal Evidence Theory System with Chinese Characteristics”(18ZDA139)
文摘Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data contains all kinds off undamental rights.To clearly understand the fundamental rights contained in electronic data is an important precondition for respecting and protecting human rights in electronic data evidence obtainment.Property-type electronic data contain property rights.Traditional investigation measures such as seizure and freezing the property cannot be taken to obtain valid evidence.To directly turn the digital currency into cash and then seize the cash,will result in insufficient property rights protection,and may violate other fundamental rights of criminal suspects.The expansion of the object of the right to privacy and the change of the carrier on which the expansion depends in privacytype electronic data,determine that the obtainment of the privacytype electronic data evidence may result in intangible intervention and secondary intervention in the right to privacy.Communicationtype electronic data contains freedom of communication and the right to communication secrecy.Investigative organs can collect this kind of electronic data through search,acquisition,remote investigation and examination,and other means.However,according to the existing institution design,the above-mentioned means may result in insufficient protection of freedom of communication.Expressiontype electronic data contains freedom of expression.If investigative organs collect this kind of data,they may intervene in freedom of the press though they do not intervene in narrowly defined freedom of expression.The basic principles that should be followed in the electronic data evidence obtainment which intervenes in fundamental rights include the doctrine of legal reservation,the writ system,the principle ofp roportionality,and illegal evidence exclusion.
基金support of the studies is from the National Major Scientific and Technological Special Project for "Development and comprehensive verification of complete products of open high-end CNC system, servo device and motor" (2012ZX04001012)
文摘Building cyber-physical system(CPS) models of machine tools is a key technology for intelligent manufacturing. The massive electronic data from a computer numerical control(CNC) system during the work processes of a CNC machine tool is the main source of the big data on which a CPS model is established. In this work-process model, a method based on instruction domain is applied to analyze the electronic big data, and a quantitative description of the numerical control(NC) processes is built according to the G code of the processes. Utilizing the instruction domain, a work-process CPS model is established on the basis of the accurate, real-time mapping of the manufacturing tasks, resources, and status of the CNC machine tool. Using such models, case studies are conducted on intelligent-machining applications, such as the optimization of NC processing parameters and the health assurance of CNC machine tools.
文摘Developing nations, like Nigeria, whose financial systems and infrastructural base are not yet fully developed face data rendition challenges which may hamper the representativeness of their interest rate statistics.A critical component of any credible interest rate data compilation framework relates to the sampling procedure.In Nigeria, no work has been done with regards to employing alternatives sampling techniques in the computation of interest rate statistics largely because of the small number of deposit money banks in the country. Leveraging on existing literature and established statistical methods, the study examines two sampling techniques for generating credible and reliable interest rates in Nigeria. The current interest rate compilation framework in the country is presented and alternative sampling procedures were explored with a view to investigating their appropriateness for Nigeria's interest rate computation. The interest rates generated based on the current population-based compilation method is compared with those of the alternative approaches. This paper recommends the use of purposive sampling method that covers Deposit Money Banks (DMBs) which account for about 70.0 per cent of the banking sector total assets as an appropriatealternative.
文摘Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Information Technology (IT) can reduce bullwhip effect by sharing the information among the enterprises in the supply chain.
文摘Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. of Electron. Sci. & Tech. of China qli@uestc.edu.cnProf. Wei-Sheng Zhao Centre National de la Recherche Scientifique (National Center for Scientific Research) weisheng.zhao@u-psud, fr From energy generation to transportation, from energy distribution to storage, from semiconductor processing to communications, and from portable devices to data centers, energy consumption has grown to be a major limitation to usability and performance. Therefore, energy-efficient technologies become an active research area motivated by energy necessity and environmental concerns. With energy-efficient technologies, a number of epoch-making technical approaches can be expected. Energy efficiency technologies are affecting all forms of energy conversion and all aspects of life.
文摘With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the main media for people to store information.In the field of criminal offenses,the network is likely to be used to perpetrate criminal schemes,implement crimes,or help hinder investigations afterward.These acts will leave an electronic data trail,such as WeChat information,emails,or blogs.After a crime occurs,an evidence investigator should accurately,timely,and comprehensively obtain all electronic data related to the case by collecting,extracting,and transferring this data according to the law,and examining the authenticity,legality,and relevance of the evidence.Through a comprehensive review,the investigator should clarify the relationship between the electronic data and the facts to be proved and make full use of the obtained electronic evidence in criminal proceedings.
文摘In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can effectively guarantee the authenticity and security of electronic data.Blockchains are inherently traceable,de‑centralized,and difficult to tamper with,which can be enough served as the basic technology of electronic data certification.Preservation by blockchain mainly includes the following links:platform registration and identity authentication,generation and transmission of electronic data,and storage of electronic data.Preservation by blockchain has higher security than centralized online security because of distributed storage.However,it should be acknowledged that the preservation by blockchain is not without risk.The court should adhere to the principle of individual review of each case and review the electronic data from its generation,transmission,reception,storage,and collection.
基金supported in part by the Basic Science Research Program through the National Research Foundation of Korea Funded by the Ministry of Science,ICT & Future Planning(No.2011-0030079)the Ministry of Education(No.NRF-2013R1A1A2057549)
文摘We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme.