期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
On the Nature of Online Retrieval of Electronic Data
1
作者 WU Yingfei NI Weisi 《The Journal of Human Rights》 2024年第4期876-903,共28页
With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online... With the development of information technology,the online retrieval of remote electronic data has become an important method for investigative agencies to collect evidence.In the current normative documents,the online retrieval of electronic data is positioned as a new type of arbitrary investigative measure.However,study of its actual operation has found that the online retrieval of electronic data does not fully comply with the characteristics of arbitrary investigative measures.The root cause is its inaccurately defined nature due to analogy errors,an emphasis on the authenticity of electronic data at the cost of rights protection,insufficient effectiveness of normative documents to break through the boundaries of law,and superficial inconsistency found in the mechanical comparison with the nature of existing investigative measures causes.The nature of electronic data retrieved online should be defined according to different circumstances.The retrieval of electronic data disclosed on the Internet is an arbitrary investigative measure,and following procedural specifications should be sufficient.When investigators conceal their true identities and enter the cyberspace of the suspected crime through a registered account to extract dynamic electronic data for criminal activities,it is essentially a covert investigation in cyberspace,and they should follow the normative requirements for covert investigations.The retrieval of dynamic electronic data from private spaces is a technical investigative measure and should be implemented in accordance with the technical investigative procedures.Retrieval of remote“non-public electronic data involving privacy”is a mandatory investigative measure,and is essentially a search in the virtual space.Therefore,procedural specifications should be set in accordance with the standards of searching. 展开更多
关键词 electronic data online retrieval compulsory investigation SEARCH right to privacy
下载PDF
Investigating the factors affecting traffic violations based on electronic enforcement data:A case study in Shangyu,China 被引量:1
2
作者 Fan Haoxuan Ren Gang +1 位作者 Li Haojie Ma Jingfeng 《Journal of Southeast University(English Edition)》 EI CAS 2021年第2期227-236,共10页
To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the e... To study the influencing factors of traffic violations,this study investigated the effects of vehicle attribution,day of week,time of day,location of traffic violations,and weather on traffic violations based on the electronic enforcement data and historical weather data obtained in Shangyu,China.Ten categories of traffic violations were determined from the raw data.Then,chi-square tests were used to analyze the relationship between traffic violations and the potential risk factors.Multinomial logistic regression analyses were conducted to further estimate the effects of different risk factors on the likelihood of the occurrence of traffic violations.By analyzing the results of chi-square tests via SPSS,the five factors above were all determined as significant factors associated with traffic violations.The results of the multinomial logistic regression revealed the significant effects of the five factors on the likelihood of the occurrence of corresponding traffic violations.The conclusions are of great significance for the development of effective traffic intervention measures to reduce traffic violations and the improvement of road traffic safety. 展开更多
关键词 traffic violations road traffic safety electronic enforcement data multinomial logistic regression influencing factors
下载PDF
New reconstruction and forecasting algorithm for TEC data
3
作者 王俊 盛峥 +1 位作者 江宇 石汉青 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第9期602-608,共7页
To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itse... To reconstruct the missing data of the total electron content (TEC) observations, a new method is proposed, which is based on the empirical orthogonal functions (EOF) decomposition and the value of eigenvalue itself. It is a self-adaptive EOF decomposition without any prior information needed, and the error of reconstructed data can be estimated. The interval quartering algorithm and cross-validation algorithm are used to compute the optimal number of EOFs for reconstruction. The interval quartering algorithm can reduce the computation time. The application of the data interpolating empirical orthogonal functions (DINEOF) method to the real data have demonstrated that the method can reconstruct the TEC map with high accuracy, which can be employed on the real-time system in the future work. 展开更多
关键词 RECONSTRUCTION total electron content (TEC) data empirical orthogonal function (EOF) decompo-sition interval quartering algorithm
下载PDF
Basic Rights Intervention in the Obtainment of Digital Data as Evidence in Criminal Case——An Analysis Based on Six Typical Cases
4
作者 谢登科 LIU Zhao 《The Journal of Human Rights》 2021年第1期60-79,共20页
Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data con... Electronic data is the most frequently used evidence in the internet and information era.Electronic data has been applied extensively and can be classified into many categories,which determine that electronic data contains all kinds off undamental rights.To clearly understand the fundamental rights contained in electronic data is an important precondition for respecting and protecting human rights in electronic data evidence obtainment.Property-type electronic data contain property rights.Traditional investigation measures such as seizure and freezing the property cannot be taken to obtain valid evidence.To directly turn the digital currency into cash and then seize the cash,will result in insufficient property rights protection,and may violate other fundamental rights of criminal suspects.The expansion of the object of the right to privacy and the change of the carrier on which the expansion depends in privacytype electronic data,determine that the obtainment of the privacytype electronic data evidence may result in intangible intervention and secondary intervention in the right to privacy.Communicationtype electronic data contains freedom of communication and the right to communication secrecy.Investigative organs can collect this kind of electronic data through search,acquisition,remote investigation and examination,and other means.However,according to the existing institution design,the above-mentioned means may result in insufficient protection of freedom of communication.Expressiontype electronic data contains freedom of expression.If investigative organs collect this kind of data,they may intervene in freedom of the press though they do not intervene in narrowly defined freedom of expression.The basic principles that should be followed in the electronic data evidence obtainment which intervenes in fundamental rights include the doctrine of legal reservation,the writ system,the principle ofp roportionality,and illegal evidence exclusion. 展开更多
关键词 electronic data fundamental rights intervention in rights legal principles
下载PDF
上合组织国际物流园电子数据交换系统设计与实现
5
作者 朱博 《电脑编程技巧与维护》 2023年第3期87-89,共3页
基于公共信息平台的数据交换服务系统,对外主要与政府单位、物流企业、货主、公共服务设施、物流基础设施等业务系统对接,获取除口岸部门以外的单位数据;对内与数据库协同系统对接,实现数据资源的统一存储、管理与共享应用。
关键词 电子数据交换系统(Electronic data Interchange EDI) 物流 数据处理
下载PDF
CPS Modeling of CNC Machine Tool Work Processes Using an Instruction-Domain Based Approach 被引量:19
6
作者 Jihong Chen Jianzhong Yang +5 位作者 Huicheng Zhou Hua Xiang Zhihong Zhu Yesong Li Chen-Han Lee Guangda Xu 《Engineering》 SCIE EI 2015年第2期247-260,共14页
Building cyber-physical system(CPS) models of machine tools is a key technology for intelligent manufacturing. The massive electronic data from a computer numerical control(CNC) system during the work processes of a C... Building cyber-physical system(CPS) models of machine tools is a key technology for intelligent manufacturing. The massive electronic data from a computer numerical control(CNC) system during the work processes of a CNC machine tool is the main source of the big data on which a CPS model is established. In this work-process model, a method based on instruction domain is applied to analyze the electronic big data, and a quantitative description of the numerical control(NC) processes is built according to the G code of the processes. Utilizing the instruction domain, a work-process CPS model is established on the basis of the accurate, real-time mapping of the manufacturing tasks, resources, and status of the CNC machine tool. Using such models, case studies are conducted on intelligent-machining applications, such as the optimization of NC processing parameters and the health assurance of CNC machine tools. 展开更多
关键词 cyber-physical system (CPS) big data computer numerical control (CNC) machine tool electronic data of work processes instruction domain intelligent machining
下载PDF
Interest Rate Statistics in Nigeria: Its Sampling Techniques and Computational Procedures
7
作者 Abiola O. Adeleke 《Journal of Mathematics and System Science》 2013年第12期625-630,共6页
Developing nations, like Nigeria, whose financial systems and infrastructural base are not yet fully developed face data rendition challenges which may hamper the representativeness of their interest rate statistics.A... Developing nations, like Nigeria, whose financial systems and infrastructural base are not yet fully developed face data rendition challenges which may hamper the representativeness of their interest rate statistics.A critical component of any credible interest rate data compilation framework relates to the sampling procedure.In Nigeria, no work has been done with regards to employing alternatives sampling techniques in the computation of interest rate statistics largely because of the small number of deposit money banks in the country. Leveraging on existing literature and established statistical methods, the study examines two sampling techniques for generating credible and reliable interest rates in Nigeria. The current interest rate compilation framework in the country is presented and alternative sampling procedures were explored with a view to investigating their appropriateness for Nigeria's interest rate computation. The interest rates generated based on the current population-based compilation method is compared with those of the alternative approaches. This paper recommends the use of purposive sampling method that covers Deposit Money Banks (DMBs) which account for about 70.0 per cent of the banking sector total assets as an appropriatealternative. 展开更多
关键词 Banking sector deposit money bank electronic data submission
下载PDF
Applying IT to Avoid Bullwhip Effect of Supply Chain
8
作者 Zhiyuan Zhao 《Chinese Business Review》 2005年第4期66-67,73,共3页
Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Inf... Bullwhip effect is the most important factor considered in the supply chain management. It gets many scholars' attention that bullwhip effect has been restricting the development of the supply chain all the time. Information Technology (IT) can reduce bullwhip effect by sharing the information among the enterprises in the supply chain. 展开更多
关键词 bullwhip effect supply chain Electronic data Interchange(EDI) Information Technology (IT)
下载PDF
Call for Papers Journal of Electronic Science and Technology Special Section on Energy-Efficient Technologies
9
《Journal of Electronic Science and Technology》 CAS CSCD 2015年第4期384-384,共1页
Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. ... Guest Editors (Editorial Board of EET):Prof. Wei-Dong He Univ. of Electron. Sci. & Tech. of China weidong.he@uestc.edu.cnProf. Terrenee Mak The Chinese Univ. ofHong Kong, stmak@cse.cuhk.edu.hkProf. Qiang Li Univ. of Electron. Sci. & Tech. of China qli@uestc.edu.cnProf. Wei-Sheng Zhao Centre National de la Recherche Scientifique (National Center for Scientific Research) weisheng.zhao@u-psud, fr From energy generation to transportation, from energy distribution to storage, from semiconductor processing to communications, and from portable devices to data centers, energy consumption has grown to be a major limitation to usability and performance. Therefore, energy-efficient technologies become an active research area motivated by energy necessity and environmental concerns. With energy-efficient technologies, a number of epoch-making technical approaches can be expected. Energy efficiency technologies are affecting all forms of energy conversion and all aspects of life. 展开更多
关键词 Call for Papers Journal of Electronic Science and Technology Special Section on data Sciences and data Engineering
下载PDF
Collection and Judgment of Electronic Data Evidence in Criminal Cases:From the Perspective of Investigation and Evidence Collection by Public Security Organs
10
作者 Bo Wang Yuxian Liu 《Journal of Forensic Science and Medicine》 2019年第4期187-194,共8页
With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the... With the continuous progress ofscience and technology,the Internet has gradually entered every field of daily life.In addition to the information generated by the Internet in the form of digitization,it has become the main media for people to store information.In the field of criminal offenses,the network is likely to be used to perpetrate criminal schemes,implement crimes,or help hinder investigations afterward.These acts will leave an electronic data trail,such as WeChat information,emails,or blogs.After a crime occurs,an evidence investigator should accurately,timely,and comprehensively obtain all electronic data related to the case by collecting,extracting,and transferring this data according to the law,and examining the authenticity,legality,and relevance of the evidence.Through a comprehensive review,the investigator should clarify the relationship between the electronic data and the facts to be proved and make full use of the obtained electronic evidence in criminal proceedings. 展开更多
关键词 AUTHENTICITY COLLECTION electronic data EXTRACTION
原文传递
Electronic Data Preservation and Storage of Evidence by Blockchain
11
作者 Hua Shang Hui Qiang 《Journal of Forensic Science and Medicine》 2020年第1期27-36,共10页
In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can... In the face of the era of big data,how to ensure the authenticity of electronic data has become an important practical issue.Online preservation methods based on hash operation,time stamp,and blockchain technology can effectively guarantee the authenticity and security of electronic data.Blockchains are inherently traceable,de‑centralized,and difficult to tamper with,which can be enough served as the basic technology of electronic data certification.Preservation by blockchain mainly includes the following links:platform registration and identity authentication,generation and transmission of electronic data,and storage of electronic data.Preservation by blockchain has higher security than centralized online security because of distributed storage.However,it should be acknowledged that the preservation by blockchain is not without risk.The court should adhere to the principle of individual review of each case and review the electronic data from its generation,transmission,reception,storage,and collection. 展开更多
关键词 Electronic data online evidence preservation preservation by blockchain
原文传递
Security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data
12
作者 In-Ho Lee Myungjin Cho 《Chinese Optics Letters》 SCIE EI CAS CSCD 2015年第1期22-26,共5页
We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fi... We prot)ose a security-enhanced double-random phase encryption (DRPE) scheme using orthogonally encoded image and electronically synthesized key data to cope with the security problem of DRPE technique caused by fixed double-random phase masks for eneryption. In the proposed scheme, we adopt the electronically synthesized key to frequently update the phase mask using a spatial light modulator, and also employ the orthogonal encoding technique to encode the image and electronically synthesized key data, which can enhance the security of both data. We provide detailed procedures for eneryption and decryption of the proposed scheme, and provide the simulation results to show the eneryption effects of the proposed scheme. 展开更多
关键词 data Security enhancement for double-random phase encryption using orthogonally encoded image and electronically synthesized key data
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部