Aiming to identify policy topics and their evolutionary logic that enhance the digital and green development(dual development)of traditional manufacturing enterprises,address weaknesses in current policies,and provide...Aiming to identify policy topics and their evolutionary logic that enhance the digital and green development(dual development)of traditional manufacturing enterprises,address weaknesses in current policies,and provide resources for refining dual development policies,a total of 15954 dual development-related policies issued by national and various departmental authorities in China from January 2000 to August 2023 were analyzed.Based on topic modeling techniques and the policy modeling consistency(PMC)framework,the evolution of policy topics was visualized,and a dynamic assessment of the policies was conducted.The results show that the digital and green development policy framework is progressively refined,and the governance philosophy shifts from a“regulatory government”paradigm to a“service-oriented government”.The support pattern evolves from“dispersed matching”to“integrated symbiosis”.However,there are still significant deficiencies in departmental cooperation,balanced measures,coordinated links,and multi-stakeholder participation.Future policy improvements should,therefore,focus on guiding multi-stakeholder participation,enhancing public demand orientation,and addressing the entire value chain.These steps aim to create an open and shared digital industry ecosystem to promote the coordinated dual development of traditional manufacturing enterprises.展开更多
The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked ...The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data.The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product,so as to effectively protect the data producer's rights as well as to facilitate the secure sharing of geo-spatial graphics data.So far in the CIS field throughout the world,few researches have been made on digital watermarking.The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique.An application software employing the proposed technology has been developed.A number of experimental tests on the 1:500,000 digital bathymetric chart of the South China Sea and 1:10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology.展开更多
China is a great agricultural country with large population, limited soilresources and traditional farming mode, so the central government has been attaching greatimportance to the development of agriculture and put f...China is a great agricultural country with large population, limited soilresources and traditional farming mode, so the central government has been attaching greatimportance to the development of agriculture and put forward a new agricultural technologyrevolution ― the transformation from traditional agriculture to modern agriculture and fromextensive farming to intensive farming. Digital agriculture is the core of agriculturalinformatization. The enforcement of digital agriculture will greatly promote agricultural technologyrevolution, two agricultural transformations and its rapid development, and enhance China'scompetitive power after the entrance of WTO. To carry out digital agriculture, the frame system ofdigital agriculture is required to be studied in the first place. In accordance with the theory andtechnology of digital earth and in combination with the agricultural reality of China, this articleoutlines the frame system of digital agriculture and its main content arid technology support.展开更多
Based on the developing tendency of present China’s basic GIS,this paper discusses the designing idea for scales of 1∶10 000,1∶50 000, 1∶250 000 and 1∶1 000 000 pyramid_like multi_layer and multi_resolution of th...Based on the developing tendency of present China’s basic GIS,this paper discusses the designing idea for scales of 1∶10 000,1∶50 000, 1∶250 000 and 1∶1 000 000 pyramid_like multi_layer and multi_resolution of the basic GIS.A technical line for the construction of basic GIS of the whole country and various provinces for sustainable development is put forward.And some important theoretical GIS issues touched by the technical process are discussed.展开更多
Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.A...Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.As cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the cloud.To date,very little research has been done to develop efficient theory and practice for digital forensics in the cloud.In this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud computing.Cloud Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is confirmed.The key components of Cloud Foren address some challenges,which are unique to the cloud.The proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate naturally.We use two case studies to demonstrate the applicability of Cloud Foren.We believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment.展开更多
This paper reports an effort to develop an intelligent integration framework for digital progressive die design and manufacturing. Both data-and process-centric integration functions are provided by the framework as i...This paper reports an effort to develop an intelligent integration framework for digital progressive die design and manufacturing. Both data-and process-centric integration functions are provided by the framework as if a special ight-weight PDM/PLM (Product Data Management/Product Lifecycle Management) and WM (Workflow Management) system is embedded in the integrated engineering environment. A flexible integration approach based on the CAD (Computer-Aided Design) framework tenet is employed to rapidly build up the system while the intrinsic characteristics of the process are comprehensively taken into account. Introduction of this integration framework would greatly improve the dynamic performance of the overall progressive die design and manufacturing process.展开更多
Digital mine is the inevitable outcome of the information processing, and is also a complicated system engineering. Firstly, for the 3D visualization application of the digital mine, the ground and underground integra...Digital mine is the inevitable outcome of the information processing, and is also a complicated system engineering. Firstly, for the 3D visualization application of the digital mine, the ground and underground integrative visualization framework model was proposed based on the mine entity database. So, the visualization problem was availably resolved, as well as the professional analytical ability was improved. Secondly, aiming at the irregularities, non-uniformity, dynamics of mine entities, mix modeling method based on the entity character was put forward, in which 3D expression of mine entities was realized. Lastly, the 3D visualization project for a copper mine was experimentally studied. Satisfactory results were acquired, and the rationality of visualization model and feasibility of 3D modeling were validated.展开更多
With the advent of digital therapeutics(DTx),the development of software as a medical device(SaMD)for mobile and wearable devices has gained significant attention in recent years.Existing DTx evaluations,such as rando...With the advent of digital therapeutics(DTx),the development of software as a medical device(SaMD)for mobile and wearable devices has gained significant attention in recent years.Existing DTx evaluations,such as randomized clinical trials,mostly focus on verifying the effectiveness of DTx products.To acquire a deeper understanding of DTx engagement and behavioral adherence,beyond efficacy,a large amount of contextual and interaction data from mobile and wearable devices during field deployment would be required for analysis.In this work,the overall flow of the data-driven DTx analytics is reviewed to help researchers and practitioners to explore DTx datasets,to investigate contextual patterns associated with DTx usage,and to establish the(causal)relationship between DTx engagement and behavioral adherence.This review of the key components of datadriven analytics provides novel research directions in the analysis of mobile sensor and interaction datasets,which helps to iteratively improve the receptivity of existing DTx.展开更多
In this research,we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application,Instagram.This plugin extracts pers...In this research,we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application,Instagram.This plugin extracts personal details from Instagram users,e.g.,name,user name,mobile number,ID,direct text or audio,video,and picture messages exchanged between different Instagram users.While developing the plugin,we identified resources available in both Android and IOS-based devices holding key forensics artifacts.We highlighted the poor privacy scheme employed by Instagram.This work,has shown how the sensitive data posted in the Instagram mobile application can easily be reconstructed,and how the traces,as well as the URL links of visual messages,can be used to access the privacy of any Instagram user without any critical credential verification.We also employed the anti-forensics method on the Instagram Android’s application and were able to restore the application from the altered or corrupted database file,which any criminal mind can use to set up or trap someone else.The outcome of this research is a plugin for our digital forensics ready framework software which could be used by law enforcement and regulatory agencies to reconstruct the digital evidence available in the Instagram mobile application directories on both Android and IOS-based mobile phones.展开更多
Despite the extensive empirical literature relating to the Internet of Things (IoT), surprisingly few attempts have sought to establish the ways in which digital forensics can be applied to undertake detailed examinat...Despite the extensive empirical literature relating to the Internet of Things (IoT), surprisingly few attempts have sought to establish the ways in which digital forensics can be applied to undertake detailed examinations regarding IoT frameworks. The existing digital forensic applications have effectively held back efforts to align the IoT with digital forensic strategies. This is because the forensic applications are ill-suited to the highly complex IoT frameworks and would, therefore, struggle to amass, analyze and test the necessary evidence that would be required by a court. As such, there is a need to develop a suitable forensic framework to facilitate forensic investigations in IoT settings. Nor has considerable progress been made in terms of collecting and saving network and server logs from IoT settings to enable examinations. Consequently, this study sets out to develop and test the FB system which is a lightweight forensic framework capable of improving the scope of investigations in IoT environments. The FB system can organize the management of various IoT devices found in a smart apartment, all of which is controlled by the owner’s smart watch. This will help to perform useful functions, automate the decision-making process, and ensure that the system remains secure. A Java app is utilized to simulate the FB system, learning the user’s requirements and security expectations when installed and employing the MySQL server as a means of logging the communications of the various IoT devices.展开更多
Purpose This study investigates middle school students’learning experiences through digital storytelling,applying a multimodal analytical framework to uncover patterns in digital stories.This study explores how parti...Purpose This study investigates middle school students’learning experiences through digital storytelling,applying a multimodal analytical framework to uncover patterns in digital stories.This study explores how participants engage in pedagogical activities,reflect on their learning experiences,and articulate their voices through digital stories.Design/Approach/Methods Employing qualitative case study methods,we purposefully selected three 12-year-old female students at an urban school in the northern US.Analyses of digital stories and other data sources(interviews,classroom observations,and reflective journals)show that the students were engaged in both teaching and reflection.Findings The findings describe(1)participants and their learning experiences,(2)students’representational and interpersonal constructs as used in their digital stories,and(3)their participation as teachers as well as learners.Originality/Value Our multimodal analytical framework illuminates how students express themselves through digital stories.Our discussion focuses on students’learning,their identity development,the effectiveness of the analytical framework,and pedagogical implications.展开更多
Digital educational content is gaining importance as an incubator of pedagogical methodologies in formal and informal online educational settings. Its educational efficiency is directly dependent on its quality, howev...Digital educational content is gaining importance as an incubator of pedagogical methodologies in formal and informal online educational settings. Its educational efficiency is directly dependent on its quality, however educational content is more than information and data. This paper presents a new data quality framework for assessing digital educational content used for teaching in distance learning environments. The model relies on the ISO2500 series quality standard and beside providing the mechanisms for multi-facet quality assessment it also supports organizations that design, create, manage and use educational content with the quality tools (expressed as quality metrics and measurement methods) to provide a more efficient distance education experience. The model describes the quality characteristics of the educational material content using data and software quality characteristics.展开更多
基金The National Natural Science Foundation of China(No.71973023,42277493).
文摘Aiming to identify policy topics and their evolutionary logic that enhance the digital and green development(dual development)of traditional manufacturing enterprises,address weaknesses in current policies,and provide resources for refining dual development policies,a total of 15954 dual development-related policies issued by national and various departmental authorities in China from January 2000 to August 2023 were analyzed.Based on topic modeling techniques and the policy modeling consistency(PMC)framework,the evolution of policy topics was visualized,and a dynamic assessment of the policies was conducted.The results show that the digital and green development policy framework is progressively refined,and the governance philosophy shifts from a“regulatory government”paradigm to a“service-oriented government”.The support pattern evolves from“dispersed matching”to“integrated symbiosis”.However,there are still significant deficiencies in departmental cooperation,balanced measures,coordinated links,and multi-stakeholder participation.Future policy improvements should,therefore,focus on guiding multi-stakeholder participation,enhancing public demand orientation,and addressing the entire value chain.These steps aim to create an open and shared digital industry ecosystem to promote the coordinated dual development of traditional manufacturing enterprises.
基金Under the auspices of Jiangsu Provincial Science and Technology Fundation of Surveying and Mapping (No. 200416 )
文摘The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data.The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product,so as to effectively protect the data producer's rights as well as to facilitate the secure sharing of geo-spatial graphics data.So far in the CIS field throughout the world,few researches have been made on digital watermarking.The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique.An application software employing the proposed technology has been developed.A number of experimental tests on the 1:500,000 digital bathymetric chart of the South China Sea and 1:10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology.
文摘China is a great agricultural country with large population, limited soilresources and traditional farming mode, so the central government has been attaching greatimportance to the development of agriculture and put forward a new agricultural technologyrevolution ― the transformation from traditional agriculture to modern agriculture and fromextensive farming to intensive farming. Digital agriculture is the core of agriculturalinformatization. The enforcement of digital agriculture will greatly promote agricultural technologyrevolution, two agricultural transformations and its rapid development, and enhance China'scompetitive power after the entrance of WTO. To carry out digital agriculture, the frame system ofdigital agriculture is required to be studied in the first place. In accordance with the theory andtechnology of digital earth and in combination with the agricultural reality of China, this articleoutlines the frame system of digital agriculture and its main content arid technology support.
文摘Based on the developing tendency of present China’s basic GIS,this paper discusses the designing idea for scales of 1∶10 000,1∶50 000, 1∶250 000 and 1∶1 000 000 pyramid_like multi_layer and multi_resolution of the basic GIS.A technical line for the construction of basic GIS of the whole country and various provinces for sustainable development is put forward.And some important theoretical GIS issues touched by the technical process are discussed.
文摘Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or organizations.As cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the cloud.To date,very little research has been done to develop efficient theory and practice for digital forensics in the cloud.In this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud computing.Cloud Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is confirmed.The key components of Cloud Foren address some challenges,which are unique to the cloud.The proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate naturally.We use two case studies to demonstrate the applicability of Cloud Foren.We believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment.
文摘This paper reports an effort to develop an intelligent integration framework for digital progressive die design and manufacturing. Both data-and process-centric integration functions are provided by the framework as if a special ight-weight PDM/PLM (Product Data Management/Product Lifecycle Management) and WM (Workflow Management) system is embedded in the integrated engineering environment. A flexible integration approach based on the CAD (Computer-Aided Design) framework tenet is employed to rapidly build up the system while the intrinsic characteristics of the process are comprehensively taken into account. Introduction of this integration framework would greatly improve the dynamic performance of the overall progressive die design and manufacturing process.
基金Project(41061043)supported by the National Natural Science Foundation of China
文摘Digital mine is the inevitable outcome of the information processing, and is also a complicated system engineering. Firstly, for the 3D visualization application of the digital mine, the ground and underground integrative visualization framework model was proposed based on the mine entity database. So, the visualization problem was availably resolved, as well as the professional analytical ability was improved. Secondly, aiming at the irregularities, non-uniformity, dynamics of mine entities, mix modeling method based on the entity character was put forward, in which 3D expression of mine entities was realized. Lastly, the 3D visualization project for a copper mine was experimentally studied. Satisfactory results were acquired, and the rationality of visualization model and feasibility of 3D modeling were validated.
基金supported by Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Korea government(MSIT)(2020R1A4A1018774)。
文摘With the advent of digital therapeutics(DTx),the development of software as a medical device(SaMD)for mobile and wearable devices has gained significant attention in recent years.Existing DTx evaluations,such as randomized clinical trials,mostly focus on verifying the effectiveness of DTx products.To acquire a deeper understanding of DTx engagement and behavioral adherence,beyond efficacy,a large amount of contextual and interaction data from mobile and wearable devices during field deployment would be required for analysis.In this work,the overall flow of the data-driven DTx analytics is reviewed to help researchers and practitioners to explore DTx datasets,to investigate contextual patterns associated with DTx usage,and to establish the(causal)relationship between DTx engagement and behavioral adherence.This review of the key components of datadriven analytics provides novel research directions in the analysis of mobile sensor and interaction datasets,which helps to iteratively improve the receptivity of existing DTx.
基金This research was supported by the Korea Institute for Advancement of Technology(KIAT)Grant Funded by the Korea Government(MOTIE)(P0012724,The Competency Development Program for Industry Specialist)and the Soonchunhyang University Research Fund.
文摘In this research,we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application,Instagram.This plugin extracts personal details from Instagram users,e.g.,name,user name,mobile number,ID,direct text or audio,video,and picture messages exchanged between different Instagram users.While developing the plugin,we identified resources available in both Android and IOS-based devices holding key forensics artifacts.We highlighted the poor privacy scheme employed by Instagram.This work,has shown how the sensitive data posted in the Instagram mobile application can easily be reconstructed,and how the traces,as well as the URL links of visual messages,can be used to access the privacy of any Instagram user without any critical credential verification.We also employed the anti-forensics method on the Instagram Android’s application and were able to restore the application from the altered or corrupted database file,which any criminal mind can use to set up or trap someone else.The outcome of this research is a plugin for our digital forensics ready framework software which could be used by law enforcement and regulatory agencies to reconstruct the digital evidence available in the Instagram mobile application directories on both Android and IOS-based mobile phones.
文摘Despite the extensive empirical literature relating to the Internet of Things (IoT), surprisingly few attempts have sought to establish the ways in which digital forensics can be applied to undertake detailed examinations regarding IoT frameworks. The existing digital forensic applications have effectively held back efforts to align the IoT with digital forensic strategies. This is because the forensic applications are ill-suited to the highly complex IoT frameworks and would, therefore, struggle to amass, analyze and test the necessary evidence that would be required by a court. As such, there is a need to develop a suitable forensic framework to facilitate forensic investigations in IoT settings. Nor has considerable progress been made in terms of collecting and saving network and server logs from IoT settings to enable examinations. Consequently, this study sets out to develop and test the FB system which is a lightweight forensic framework capable of improving the scope of investigations in IoT environments. The FB system can organize the management of various IoT devices found in a smart apartment, all of which is controlled by the owner’s smart watch. This will help to perform useful functions, automate the decision-making process, and ensure that the system remains secure. A Java app is utilized to simulate the FB system, learning the user’s requirements and security expectations when installed and employing the MySQL server as a means of logging the communications of the various IoT devices.
文摘Purpose This study investigates middle school students’learning experiences through digital storytelling,applying a multimodal analytical framework to uncover patterns in digital stories.This study explores how participants engage in pedagogical activities,reflect on their learning experiences,and articulate their voices through digital stories.Design/Approach/Methods Employing qualitative case study methods,we purposefully selected three 12-year-old female students at an urban school in the northern US.Analyses of digital stories and other data sources(interviews,classroom observations,and reflective journals)show that the students were engaged in both teaching and reflection.Findings The findings describe(1)participants and their learning experiences,(2)students’representational and interpersonal constructs as used in their digital stories,and(3)their participation as teachers as well as learners.Originality/Value Our multimodal analytical framework illuminates how students express themselves through digital stories.Our discussion focuses on students’learning,their identity development,the effectiveness of the analytical framework,and pedagogical implications.
文摘Digital educational content is gaining importance as an incubator of pedagogical methodologies in formal and informal online educational settings. Its educational efficiency is directly dependent on its quality, however educational content is more than information and data. This paper presents a new data quality framework for assessing digital educational content used for teaching in distance learning environments. The model relies on the ISO2500 series quality standard and beside providing the mechanisms for multi-facet quality assessment it also supports organizations that design, create, manage and use educational content with the quality tools (expressed as quality metrics and measurement methods) to provide a more efficient distance education experience. The model describes the quality characteristics of the educational material content using data and software quality characteristics.