This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation,...We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation, and functionality, and robustness refers to the ability to handle incomplete and/or corrupt adversarial information, on one side, and image and or device variability, on the other side. The proposed methodology is model-free and non-parametric. It draws support from discriminative methods using likelihood ratios to link at the conceptual level biometrics and forensics. It further links, at the modeling and implementation level, the Bayesian framework, statistical learning theory (SLT) using transduction and semi-supervised lea- rning, and Information Theory (IY) using mutual information. The key concepts supporting the proposed methodology are a) local estimation to facilitate learning and prediction using both labeled and unlabeled data;b) similarity metrics using regularity of patterns, randomness deficiency, and Kolmogorov complexity (similar to MDL) using strangeness/typicality and ranking p-values;and c) the Cover – Hart theorem on the asymptotical performance of k-nearest neighbors approaching the optimal Bayes error. Several topics on biometric inference and prediction related to 1) multi-level and multi-layer data fusion including quality and multi-modal biometrics;2) score normalization and revision theory;3) face selection and tracking;and 4) identity management, are described here using an integrated approach that includes transduction and boosting for ranking and sequential fusion/aggregation, respectively, on one side, and active learning and change/ outlier/intrusion detection realized using information gain and martingale, respectively, on the other side. The methodology proposed can be mapped to additional types of information beyond biometrics.展开更多
The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
AIM To establish minimum clinically important difference(MCID) for measurements in an orthopaedic patient population with joint disorders.METHODS Adult patients aged 18 years and older seeking care for joint condition...AIM To establish minimum clinically important difference(MCID) for measurements in an orthopaedic patient population with joint disorders.METHODS Adult patients aged 18 years and older seeking care for joint conditions at an orthopaedic clinic took the Patient-Reported Outcomes Measurement Information System Physical Function(PROMIS~? PF) computerized adaptive test(CAT), hip disability and osteoarthritis outcome score for joint reconstruction(HOOS JR), and the knee injury and osteoarthritis outcome score for joint reconstruction(KOOS JR) from February 2014 to April 2017. MCIDs were calculated using anchorbased and distribution-based methods. Patient reports of meaningful change in function since their first clinic encounter were used as an anchor.RESULTS There were 2226 patients who participated with a mean age of 61.16(SD = 12.84) years, 41.6% male, and 89.7% Caucasian. Mean change ranged from 7.29 to 8.41 for the PROMIS~? PF CAT, from 14.81 to 19.68 for the HOOS JR, and from 14.51 to 18.85 for the KOOS JR. ROC cut-offs ranged from 1.97-8.18 for the PF CAT, 6.33-43.36 for the HOOS JR, and 2.21-8.16 for the KOOS JR. Distribution-based methods estimated MCID values ranging from 2.45 to 21.55 for the PROMIS~? PF CAT; from 3.90 to 43.61 for the HOOS JR, and from 3.98 to 40.67 for the KOOS JR. The median MCID value in the range was similar to the mean change score for each measure and was 7.9 for the PF CAT, 18.0 for the HOOS JR, and 15.1 for the KOOS JR.CONCLUSION This is the first comprehensive study providing a wide range of MCIDs for the PROMIS? PF, HOOS JR, and KOOS JR in orthopaedic patients with joint ailments.展开更多
This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the p...This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.展开更多
We start from a minimal number of generally accepted premises, in particular Hartle-Hawking quantum wave of the universe and von Neumann-Connes’ pointless and self referential spacetime geometry. We then proceed from...We start from a minimal number of generally accepted premises, in particular Hartle-Hawking quantum wave of the universe and von Neumann-Connes’ pointless and self referential spacetime geometry. We then proceed from there to show, using Dvoretzky’s theorem of measure concentration, that the total energy of the universe is divided into two parts, an ordinary energy very small part which we can measure while most of the energy is concentrated as the second part at the boundary of the holographic boundary which we cannot measure in a direct way. Finally the results are shown to imply a resolution of the black hole information paradox without violating the fundamental laws of physics. In this way the main thrust of the two opposing arguments and views, namely that of Hawking on the one side and Susskind as well as tHooft on the other side, is brought to a consistent and compatible coherent unit.展开更多
In this research we are going to define two new concepts: a) “The Potential of Events” (EP) and b) “The Catholic Information” (CI). The term CI derives from the ancient Greek language and declares all the Catholic...In this research we are going to define two new concepts: a) “The Potential of Events” (EP) and b) “The Catholic Information” (CI). The term CI derives from the ancient Greek language and declares all the Catholic (general) Logical Propositions (<img src="Edit_5f13a4a5-abc6-4bc5-9e4c-4ff981627b2a.png" width="33" height="21" alt="" />) which will true for every element of a set A. We will study the Riemann Hypothesis in two stages: a) By using the EP we will prove that the distribution of events e (even) and o (odd) of Square Free Numbers (SFN) on the axis Ax(N) of naturals is Heads-Tails (H-T) type. b) By using the CI we will explain the way that the distribution of prime numbers can be correlated with the non-trivial zeros of the function <em>ζ</em>(<em>s</em>) of Riemann. The Introduction and the Chapter 2 are necessary for understanding the solution. In the Chapter 3 we will present a simple method of forecasting in many very useful applications (e.g. financial, technological, medical, social, etc) developing a generalization of this new, proven here, theory which we finally apply to the solution of RH. The following Introduction as well the Results with the Discussion at the end shed light about the possibility of the proof of all the above. The article consists of 9 chapters that are numbered by 1, 2, …, 9.展开更多
A black hole is essentially a relativistic as well as a quantum object. Therefore the information paradox of black holes is a consequence of the clash between these two most fundamental theories of modern physics. It ...A black hole is essentially a relativistic as well as a quantum object. Therefore the information paradox of black holes is a consequence of the clash between these two most fundamental theories of modern physics. It is logical to conclude that a resolution of the problem requires some form of a quantum gravity theory. The present work proposes such a resolution using set theory and pointless spacetime geometry.展开更多
Starting from a philosophical perspective,which states that the living structures are actually a combination between matter and information,this article presents the results on an analysis of the bipolar information-m...Starting from a philosophical perspective,which states that the living structures are actually a combination between matter and information,this article presents the results on an analysis of the bipolar information-matter structure of the human organism,distinguishing three fundamental circuits for its survival,which demonstrates and supports this statement,as a base for further development of the informational model of consciousness to a general informational model of the human organism.For this,it was examined the Informational System of the Human Body and its components from the perspective of the physics/information/neurosciences concepts,showing specific functions of each of them,highlighting the correspondence of these centers with brain support areas and with their projections in consciousness,which are:Center of Acquisition and Storing of Information(CASI)reflected in consciousness as memory,Center of Decision and Command(CDC)(decision),Info-Emotional Center(IES)(emotions),Maintenance Informational System(MIS)(personal status),Genetic Transmission System(GTS)(associativity/genetic transmission)and Info Genetic Generator(IGG)related by the body development and inherited behaviors.The Info Connection(IC),detected in consciousness as trust and confidence can explain the Near-Death Experiences(NDEs)and associated phenomena.This connection is antientropic and informational,because from the multitude of uncertain possibilities is selected a certain one,helping/supporting the survival and life.The human body appears therefore as a bipolar structure,connected to two poles:information and matter.It is argued that the survival,which is the main objective of the organism,is complied in three main ways,by means of:(i)the reactive operation for adaptation by attitude;(ii)the info-genetic integration of information by epigenetic processes and genetic transmission of information for species survival,both circuits(i)and(ii)being associated to the information pole;(iii)maintenance of the material body(defined as informed matter)and its functions,associated to the matter pole of the organism.It results therefore that the informational system of the human body is supported by seven informational circuits formed by the neuro-connections between the specific zones of the brain corresponding to the informational subsystems,the cognitive centers,the sensors,transducers and execution(motor/mobile)elements.The fundamental informational circuits assuring the survival are the reactive circuit,expressible by attitude,the epigenetic/genetic circuit,absorbing and codifying information to be transmitted to the next generations,and the metabolic circuit,connected to matter(matter pole).The presented analysis allows to extend the informational modeling of consciousness to an Informational Model of Consciousness and Organism,fully describing the composition/functions of the organism in terms of information/matter and neurosciences concepts.展开更多
This paper presents a novel framework for understanding time as an emergent phenomenon arising from quantum information dynamics. We propose that the flow of time and its directional arrow are intrinsically linked to ...This paper presents a novel framework for understanding time as an emergent phenomenon arising from quantum information dynamics. We propose that the flow of time and its directional arrow are intrinsically linked to the growth of quantum complexity and the evolution of entanglement entropy in physical systems. By integrating principles from quantum mechanics, information theory, and holography, we develop a comprehensive theory that explains how time can emerge from timeless quantum processes. Our approach unifies concepts from quantum mechanics, general relativity, and thermodynamics, providing new perspectives on longstanding puzzles such as the black hole information paradox and the arrow of time. We derive modified Friedmann equations that incorporate quantum information measures, offering novel insights into cosmic evolution and the nature of dark energy. The paper presents a series of experimental proposals to test key aspects of this theory, ranging from quantum simulations to cosmological observations. Our framework suggests a deeply information-theoretic view of the universe, challenging our understanding of the nature of reality and opening new avenues for technological applications in quantum computing and sensing. This work contributes to the ongoing quest for a unified theory of quantum gravity and information, potentially with far-reaching implications for our understanding of space, time, and the fundamental structure of the cosmos.展开更多
Small-scale farming accounts for 78% of total agricultural production in Kenya and contributes to 23.5% of the country’s GDP. Their crop production activities are mostly rainfed subsistence with any surplus being sol...Small-scale farming accounts for 78% of total agricultural production in Kenya and contributes to 23.5% of the country’s GDP. Their crop production activities are mostly rainfed subsistence with any surplus being sold to bring in some income. Timely decisions on farm practices such as farm preparation and planting are critical determinants of the seasonal outcomes. In Kenya, most small-scale farmers have no reliable source of information that would help them make timely and accurate decisions. County governments have extension officers who are mandated with giving farmers advisory services to farmers but they are not able to reach most farmers due to facilitation constraints. The mode and format of sharing information is also critical since it’s important to ensure that it’s timely, well-understood and usable. This study sought to assess access to geospatial derived and other crop production information by farmers in four selected counties of Kenya. Specific objectives were to determine the profile of small-scale farmers in terms of age, education and farm size;to determine the type of information that is made available to them by County and Sub-County extension officers including the format and mode of provision;and to determine if the information provided was useful in terms of accuracy, timeliness and adequacy. The results indicated that over 80% of the farmers were over 35 years of age and over 56% were male. Majority had attained primary education (34%) or secondary education (29%) and most farmers in all the counties grew maize (71%). Notably, fellow farmers were a source of information (71%) with the frequency of sharing information being mostly seasonal (37%) and when information was available (43%). Over 66% of interviewed farmers indicating that they faced challenges while using provided information. The results from the study are insightful and helpful in determining effective ways of providing farmers with useful information to ensure maximum benefits.展开更多
With the requirements for high performance results in the today’s mobile, global, highly competitive, and technology-based business world, business professionals have to get supported by convenient mobile decision su...With the requirements for high performance results in the today’s mobile, global, highly competitive, and technology-based business world, business professionals have to get supported by convenient mobile decision support systems (DSS). To give an improved support to mobile business professionals, it is necessary to go further than just allowing a simple remote access to a Business Intelligence platform. In this paper, the need for actual context-aware mobile Geospatial Business Intelligence (GeoBI) systems that can help capture, filter, organize and structure the user mobile context is exposed and justified. Furthermore, since capturing, structuring, and modeling mobile contextual information is still a research issue, a wide inventory of existing research work on context and mobile context is provided. Then, step by step, we methodologically identify relevant contextual information to capture for mobility purposes as well as for BI needs, organize them into context-dimensions, and build a hierarchical mobile GeoBI context model which (1) is geo-spatial-extended, (2) fits with human perception of mobility, (3) takes into account the local context interactions and information-sharing with remote contexts, and (4) matches with the usual hierarchical aggregated structure of BI data.展开更多
Individuals may gather information about environmental conditions when deciding where to breed in order to maximize their lifetime fitness.They can obtain social information by observing conspecifics and heterospecifi...Individuals may gather information about environmental conditions when deciding where to breed in order to maximize their lifetime fitness.They can obtain social information by observing conspecifics and heterospecifics with similar ecological needs.Many studies have shown that birds can rely on social information to select their nest sites.The location of active nests and the reproductive success of conspecifics and heterospecifics can provide accurate predictions about the quality of the breeding habitat.Some short-lived species can facultatively reproduce two and/or more times within a breeding season.However,few studies have focused on how multiplebrooding individuals select nest sites for their second breeding attempts.In this study,we use long-term data to test whether the Japanese Tit(Parus minor)can use social information from conspecifics and/or heterospecifics(the Eurasian Nuthatch Sitta europaea,the Daurian Redstart Phoenicurus auroreus and the Yellow-rumped Flycatcher Ficedula zanthopygia)to select a nest site for the second breeding attempt.Our results showed that the nest boxes occupied by tits on their second breeding attempt tended to be surrounded by more breeding conspecific nests,successful first nests of conspecifics,and fewer failed first nests of conspecifics than the nest boxes that remained unoccupied(the control group).However,the numbers of breeding heterospecific nests,successful heterospecific nests,and failed heterospecific nests did not differ between the nest boxes occupied by tits on their second breeding attempt and the unoccupied nest boxes.Furthermore,the tits with local successful breeding experience tended to choose areas with more successful first nests of conspecifics than those without successful breeding experience.Thus,we suggest that conspecifics'but not heterospecifics'social information within the same breeding season is the major factor influencing the nest site selection of Japanese Tits during second breeding attempts.展开更多
The research aims to improve the performance of image recognition methods based on a description in the form of a set of keypoint descriptors.The main focus is on increasing the speed of establishing the relevance of ...The research aims to improve the performance of image recognition methods based on a description in the form of a set of keypoint descriptors.The main focus is on increasing the speed of establishing the relevance of object and etalon descriptions while maintaining the required level of classification efficiency.The class to be recognized is represented by an infinite set of images obtained from the etalon by applying arbitrary geometric transformations.It is proposed to reduce the descriptions for the etalon database by selecting the most significant descriptor components according to the information content criterion.The informativeness of an etalon descriptor is estimated by the difference of the closest distances to its own and other descriptions.The developed method determines the relevance of the full description of the recognized object with the reduced description of the etalons.Several practical models of the classifier with different options for establishing the correspondence between object descriptors and etalons are considered.The results of the experimental modeling of the proposed methods for a database including images of museum jewelry are presented.The test sample is formed as a set of images from the etalon database and out of the database with the application of geometric transformations of scale and rotation in the field of view.The practical problems of determining the threshold for the number of votes,based on which a classification decision is made,have been researched.Modeling has revealed the practical possibility of tenfold reducing descriptions with full preservation of classification accuracy.Reducing the descriptions by twenty times in the experiment leads to slightly decreased accuracy.The speed of the analysis increases in proportion to the degree of reduction.The use of reduction by the informativeness criterion confirmed the possibility of obtaining the most significant subset of features for classification,which guarantees a decent level of accuracy.展开更多
ABSTRACT: This paper generalizes the makeup and forming dynamic mechanism of natural disaster systems, principles and methods of comprehensive division of natural disasters, as well as structure, function and up-build...ABSTRACT: This paper generalizes the makeup and forming dynamic mechanism of natural disaster systems, principles and methods of comprehensive division of natural disasters, as well as structure, function and up-build routes of map and file information visualization system (MFIVS). Taking the Changjiang(Yangtze) Valley as an example, on the basis of revealing up the integrated mechanism on the formations of its natural disasters and its distributing law, thereafter, the paper relies on the MFIVS technique, adopts two top-down and bottom-up approaches to study a comprehensive division of natural disasters. It is relatively objective and precise that the required division results include three natural disaster sections and nine natural disaster sub-sections, which can not only provide a scientific basis for utilizing natural resources and controlling natural disaster and environmental degradation, but also be illuminated to a concise, practical and effective technique on comprehensive division.展开更多
This paper presents keystroke dynamics based authentication system using the information set concept. Two types of membership functions (MFs) are computed: one based on the timing features of all the samples and anoth...This paper presents keystroke dynamics based authentication system using the information set concept. Two types of membership functions (MFs) are computed: one based on the timing features of all the samples and another based on the timing features of a single sample. These MFs lead to two types of information components (spatial and temporal) which are concatenated and modified to produce different feature types. Two Component Information Set (TCIS) is proposed for keystroke dynamics based user authentication. The keystroke features are converted into TCIS features which are then classified by SVM, Random Forest and proposed Convex Entropy Based Hanman Classifier. The TCIS features are capable of representing the spatial and temporal uncertainties. The performance of the proposed features is tested on CMU benchmark dataset in terms of error rates (FAR, FRR, EER) and accuracy of the features. In addition, the proposed features are also tested on Android Touch screen based Mobile Keystroke Dataset. The TCIS features improve the performance and give lower error rates and better accuracy than that of the existing features in literature.展开更多
This text is trying to discuss an approximation to the concept of human emancipation,as part of our well-being,in terms of Education and Knowledge.Without abandoning our metaphysical perception of wholeness,as an exte...This text is trying to discuss an approximation to the concept of human emancipation,as part of our well-being,in terms of Education and Knowledge.Without abandoning our metaphysical perception of wholeness,as an extension of the continuity principle which connects our conscious and unconscious world,emancipation is considered as a personal struggle against all oppressions.Some of these are grounded in our inner world.In accordance with the Enlightenment request,reasoning and knowledge can help us to structure new forms of acceptances which are shaping our own emancipatory meaning.Under the impact of social influence and personal interpretation,the perceived knowledge is considered as a mental tool containing an upgraded valid information.Taking under consideration that this validity is not able to overcome the metaphysical origins of human thought,it is suggested that when this mental tool is functioning in a self-transformative,self-constructed,and flexible form,human intelligence is structuring a compatible information management mechanism,which can enable us to formulate our personal acceptances,bridge our empirical and hyper-empirical inner world,and enlighten our request for self-criticism,self-determination,and above all emancipation.展开更多
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation, and functionality, and robustness refers to the ability to handle incomplete and/or corrupt adversarial information, on one side, and image and or device variability, on the other side. The proposed methodology is model-free and non-parametric. It draws support from discriminative methods using likelihood ratios to link at the conceptual level biometrics and forensics. It further links, at the modeling and implementation level, the Bayesian framework, statistical learning theory (SLT) using transduction and semi-supervised lea- rning, and Information Theory (IY) using mutual information. The key concepts supporting the proposed methodology are a) local estimation to facilitate learning and prediction using both labeled and unlabeled data;b) similarity metrics using regularity of patterns, randomness deficiency, and Kolmogorov complexity (similar to MDL) using strangeness/typicality and ranking p-values;and c) the Cover – Hart theorem on the asymptotical performance of k-nearest neighbors approaching the optimal Bayes error. Several topics on biometric inference and prediction related to 1) multi-level and multi-layer data fusion including quality and multi-modal biometrics;2) score normalization and revision theory;3) face selection and tracking;and 4) identity management, are described here using an integrated approach that includes transduction and boosting for ranking and sequential fusion/aggregation, respectively, on one side, and active learning and change/ outlier/intrusion detection realized using information gain and martingale, respectively, on the other side. The methodology proposed can be mapped to additional types of information beyond biometrics.
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
基金National Institute of Arthritis and Musculoskeletal and Skin Diseases of the National Institutes of Health,No.U01AR067138.
文摘AIM To establish minimum clinically important difference(MCID) for measurements in an orthopaedic patient population with joint disorders.METHODS Adult patients aged 18 years and older seeking care for joint conditions at an orthopaedic clinic took the Patient-Reported Outcomes Measurement Information System Physical Function(PROMIS~? PF) computerized adaptive test(CAT), hip disability and osteoarthritis outcome score for joint reconstruction(HOOS JR), and the knee injury and osteoarthritis outcome score for joint reconstruction(KOOS JR) from February 2014 to April 2017. MCIDs were calculated using anchorbased and distribution-based methods. Patient reports of meaningful change in function since their first clinic encounter were used as an anchor.RESULTS There were 2226 patients who participated with a mean age of 61.16(SD = 12.84) years, 41.6% male, and 89.7% Caucasian. Mean change ranged from 7.29 to 8.41 for the PROMIS~? PF CAT, from 14.81 to 19.68 for the HOOS JR, and from 14.51 to 18.85 for the KOOS JR. ROC cut-offs ranged from 1.97-8.18 for the PF CAT, 6.33-43.36 for the HOOS JR, and 2.21-8.16 for the KOOS JR. Distribution-based methods estimated MCID values ranging from 2.45 to 21.55 for the PROMIS~? PF CAT; from 3.90 to 43.61 for the HOOS JR, and from 3.98 to 40.67 for the KOOS JR. The median MCID value in the range was similar to the mean change score for each measure and was 7.9 for the PF CAT, 18.0 for the HOOS JR, and 15.1 for the KOOS JR.CONCLUSION This is the first comprehensive study providing a wide range of MCIDs for the PROMIS? PF, HOOS JR, and KOOS JR in orthopaedic patients with joint ailments.
文摘This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA.
文摘We start from a minimal number of generally accepted premises, in particular Hartle-Hawking quantum wave of the universe and von Neumann-Connes’ pointless and self referential spacetime geometry. We then proceed from there to show, using Dvoretzky’s theorem of measure concentration, that the total energy of the universe is divided into two parts, an ordinary energy very small part which we can measure while most of the energy is concentrated as the second part at the boundary of the holographic boundary which we cannot measure in a direct way. Finally the results are shown to imply a resolution of the black hole information paradox without violating the fundamental laws of physics. In this way the main thrust of the two opposing arguments and views, namely that of Hawking on the one side and Susskind as well as tHooft on the other side, is brought to a consistent and compatible coherent unit.
文摘In this research we are going to define two new concepts: a) “The Potential of Events” (EP) and b) “The Catholic Information” (CI). The term CI derives from the ancient Greek language and declares all the Catholic (general) Logical Propositions (<img src="Edit_5f13a4a5-abc6-4bc5-9e4c-4ff981627b2a.png" width="33" height="21" alt="" />) which will true for every element of a set A. We will study the Riemann Hypothesis in two stages: a) By using the EP we will prove that the distribution of events e (even) and o (odd) of Square Free Numbers (SFN) on the axis Ax(N) of naturals is Heads-Tails (H-T) type. b) By using the CI we will explain the way that the distribution of prime numbers can be correlated with the non-trivial zeros of the function <em>ζ</em>(<em>s</em>) of Riemann. The Introduction and the Chapter 2 are necessary for understanding the solution. In the Chapter 3 we will present a simple method of forecasting in many very useful applications (e.g. financial, technological, medical, social, etc) developing a generalization of this new, proven here, theory which we finally apply to the solution of RH. The following Introduction as well the Results with the Discussion at the end shed light about the possibility of the proof of all the above. The article consists of 9 chapters that are numbered by 1, 2, …, 9.
文摘A black hole is essentially a relativistic as well as a quantum object. Therefore the information paradox of black holes is a consequence of the clash between these two most fundamental theories of modern physics. It is logical to conclude that a resolution of the problem requires some form of a quantum gravity theory. The present work proposes such a resolution using set theory and pointless spacetime geometry.
文摘Starting from a philosophical perspective,which states that the living structures are actually a combination between matter and information,this article presents the results on an analysis of the bipolar information-matter structure of the human organism,distinguishing three fundamental circuits for its survival,which demonstrates and supports this statement,as a base for further development of the informational model of consciousness to a general informational model of the human organism.For this,it was examined the Informational System of the Human Body and its components from the perspective of the physics/information/neurosciences concepts,showing specific functions of each of them,highlighting the correspondence of these centers with brain support areas and with their projections in consciousness,which are:Center of Acquisition and Storing of Information(CASI)reflected in consciousness as memory,Center of Decision and Command(CDC)(decision),Info-Emotional Center(IES)(emotions),Maintenance Informational System(MIS)(personal status),Genetic Transmission System(GTS)(associativity/genetic transmission)and Info Genetic Generator(IGG)related by the body development and inherited behaviors.The Info Connection(IC),detected in consciousness as trust and confidence can explain the Near-Death Experiences(NDEs)and associated phenomena.This connection is antientropic and informational,because from the multitude of uncertain possibilities is selected a certain one,helping/supporting the survival and life.The human body appears therefore as a bipolar structure,connected to two poles:information and matter.It is argued that the survival,which is the main objective of the organism,is complied in three main ways,by means of:(i)the reactive operation for adaptation by attitude;(ii)the info-genetic integration of information by epigenetic processes and genetic transmission of information for species survival,both circuits(i)and(ii)being associated to the information pole;(iii)maintenance of the material body(defined as informed matter)and its functions,associated to the matter pole of the organism.It results therefore that the informational system of the human body is supported by seven informational circuits formed by the neuro-connections between the specific zones of the brain corresponding to the informational subsystems,the cognitive centers,the sensors,transducers and execution(motor/mobile)elements.The fundamental informational circuits assuring the survival are the reactive circuit,expressible by attitude,the epigenetic/genetic circuit,absorbing and codifying information to be transmitted to the next generations,and the metabolic circuit,connected to matter(matter pole).The presented analysis allows to extend the informational modeling of consciousness to an Informational Model of Consciousness and Organism,fully describing the composition/functions of the organism in terms of information/matter and neurosciences concepts.
文摘This paper presents a novel framework for understanding time as an emergent phenomenon arising from quantum information dynamics. We propose that the flow of time and its directional arrow are intrinsically linked to the growth of quantum complexity and the evolution of entanglement entropy in physical systems. By integrating principles from quantum mechanics, information theory, and holography, we develop a comprehensive theory that explains how time can emerge from timeless quantum processes. Our approach unifies concepts from quantum mechanics, general relativity, and thermodynamics, providing new perspectives on longstanding puzzles such as the black hole information paradox and the arrow of time. We derive modified Friedmann equations that incorporate quantum information measures, offering novel insights into cosmic evolution and the nature of dark energy. The paper presents a series of experimental proposals to test key aspects of this theory, ranging from quantum simulations to cosmological observations. Our framework suggests a deeply information-theoretic view of the universe, challenging our understanding of the nature of reality and opening new avenues for technological applications in quantum computing and sensing. This work contributes to the ongoing quest for a unified theory of quantum gravity and information, potentially with far-reaching implications for our understanding of space, time, and the fundamental structure of the cosmos.
文摘Small-scale farming accounts for 78% of total agricultural production in Kenya and contributes to 23.5% of the country’s GDP. Their crop production activities are mostly rainfed subsistence with any surplus being sold to bring in some income. Timely decisions on farm practices such as farm preparation and planting are critical determinants of the seasonal outcomes. In Kenya, most small-scale farmers have no reliable source of information that would help them make timely and accurate decisions. County governments have extension officers who are mandated with giving farmers advisory services to farmers but they are not able to reach most farmers due to facilitation constraints. The mode and format of sharing information is also critical since it’s important to ensure that it’s timely, well-understood and usable. This study sought to assess access to geospatial derived and other crop production information by farmers in four selected counties of Kenya. Specific objectives were to determine the profile of small-scale farmers in terms of age, education and farm size;to determine the type of information that is made available to them by County and Sub-County extension officers including the format and mode of provision;and to determine if the information provided was useful in terms of accuracy, timeliness and adequacy. The results indicated that over 80% of the farmers were over 35 years of age and over 56% were male. Majority had attained primary education (34%) or secondary education (29%) and most farmers in all the counties grew maize (71%). Notably, fellow farmers were a source of information (71%) with the frequency of sharing information being mostly seasonal (37%) and when information was available (43%). Over 66% of interviewed farmers indicating that they faced challenges while using provided information. The results from the study are insightful and helpful in determining effective ways of providing farmers with useful information to ensure maximum benefits.
文摘With the requirements for high performance results in the today’s mobile, global, highly competitive, and technology-based business world, business professionals have to get supported by convenient mobile decision support systems (DSS). To give an improved support to mobile business professionals, it is necessary to go further than just allowing a simple remote access to a Business Intelligence platform. In this paper, the need for actual context-aware mobile Geospatial Business Intelligence (GeoBI) systems that can help capture, filter, organize and structure the user mobile context is exposed and justified. Furthermore, since capturing, structuring, and modeling mobile contextual information is still a research issue, a wide inventory of existing research work on context and mobile context is provided. Then, step by step, we methodologically identify relevant contextual information to capture for mobility purposes as well as for BI needs, organize them into context-dimensions, and build a hierarchical mobile GeoBI context model which (1) is geo-spatial-extended, (2) fits with human perception of mobility, (3) takes into account the local context interactions and information-sharing with remote contexts, and (4) matches with the usual hierarchical aggregated structure of BI data.
基金financed by the National Natural Science Foundation of China(31971402 to H.Wang,32001094 to J.Yu,31870368 to K.Zhang)the High-level Startup Talents Introduced Scientific Research Fund Project of Baotou Teacher's College,China(No.BTTCRCQD2024-C34)。
文摘Individuals may gather information about environmental conditions when deciding where to breed in order to maximize their lifetime fitness.They can obtain social information by observing conspecifics and heterospecifics with similar ecological needs.Many studies have shown that birds can rely on social information to select their nest sites.The location of active nests and the reproductive success of conspecifics and heterospecifics can provide accurate predictions about the quality of the breeding habitat.Some short-lived species can facultatively reproduce two and/or more times within a breeding season.However,few studies have focused on how multiplebrooding individuals select nest sites for their second breeding attempts.In this study,we use long-term data to test whether the Japanese Tit(Parus minor)can use social information from conspecifics and/or heterospecifics(the Eurasian Nuthatch Sitta europaea,the Daurian Redstart Phoenicurus auroreus and the Yellow-rumped Flycatcher Ficedula zanthopygia)to select a nest site for the second breeding attempt.Our results showed that the nest boxes occupied by tits on their second breeding attempt tended to be surrounded by more breeding conspecific nests,successful first nests of conspecifics,and fewer failed first nests of conspecifics than the nest boxes that remained unoccupied(the control group).However,the numbers of breeding heterospecific nests,successful heterospecific nests,and failed heterospecific nests did not differ between the nest boxes occupied by tits on their second breeding attempt and the unoccupied nest boxes.Furthermore,the tits with local successful breeding experience tended to choose areas with more successful first nests of conspecifics than those without successful breeding experience.Thus,we suggest that conspecifics'but not heterospecifics'social information within the same breeding season is the major factor influencing the nest site selection of Japanese Tits during second breeding attempts.
基金This research was funded by Prince Sattam bin Abdulaziz University(Project Number PSAU/2023/01/25387).
文摘The research aims to improve the performance of image recognition methods based on a description in the form of a set of keypoint descriptors.The main focus is on increasing the speed of establishing the relevance of object and etalon descriptions while maintaining the required level of classification efficiency.The class to be recognized is represented by an infinite set of images obtained from the etalon by applying arbitrary geometric transformations.It is proposed to reduce the descriptions for the etalon database by selecting the most significant descriptor components according to the information content criterion.The informativeness of an etalon descriptor is estimated by the difference of the closest distances to its own and other descriptions.The developed method determines the relevance of the full description of the recognized object with the reduced description of the etalons.Several practical models of the classifier with different options for establishing the correspondence between object descriptors and etalons are considered.The results of the experimental modeling of the proposed methods for a database including images of museum jewelry are presented.The test sample is formed as a set of images from the etalon database and out of the database with the application of geometric transformations of scale and rotation in the field of view.The practical problems of determining the threshold for the number of votes,based on which a classification decision is made,have been researched.Modeling has revealed the practical possibility of tenfold reducing descriptions with full preservation of classification accuracy.Reducing the descriptions by twenty times in the experiment leads to slightly decreased accuracy.The speed of the analysis increases in proportion to the degree of reduction.The use of reduction by the informativeness criterion confirmed the possibility of obtaining the most significant subset of features for classification,which guarantees a decent level of accuracy.
基金Under the auspices of President Foundation of the Chinese Academy of Sciences(1999).
文摘ABSTRACT: This paper generalizes the makeup and forming dynamic mechanism of natural disaster systems, principles and methods of comprehensive division of natural disasters, as well as structure, function and up-build routes of map and file information visualization system (MFIVS). Taking the Changjiang(Yangtze) Valley as an example, on the basis of revealing up the integrated mechanism on the formations of its natural disasters and its distributing law, thereafter, the paper relies on the MFIVS technique, adopts two top-down and bottom-up approaches to study a comprehensive division of natural disasters. It is relatively objective and precise that the required division results include three natural disaster sections and nine natural disaster sub-sections, which can not only provide a scientific basis for utilizing natural resources and controlling natural disaster and environmental degradation, but also be illuminated to a concise, practical and effective technique on comprehensive division.
文摘This paper presents keystroke dynamics based authentication system using the information set concept. Two types of membership functions (MFs) are computed: one based on the timing features of all the samples and another based on the timing features of a single sample. These MFs lead to two types of information components (spatial and temporal) which are concatenated and modified to produce different feature types. Two Component Information Set (TCIS) is proposed for keystroke dynamics based user authentication. The keystroke features are converted into TCIS features which are then classified by SVM, Random Forest and proposed Convex Entropy Based Hanman Classifier. The TCIS features are capable of representing the spatial and temporal uncertainties. The performance of the proposed features is tested on CMU benchmark dataset in terms of error rates (FAR, FRR, EER) and accuracy of the features. In addition, the proposed features are also tested on Android Touch screen based Mobile Keystroke Dataset. The TCIS features improve the performance and give lower error rates and better accuracy than that of the existing features in literature.
文摘This text is trying to discuss an approximation to the concept of human emancipation,as part of our well-being,in terms of Education and Knowledge.Without abandoning our metaphysical perception of wholeness,as an extension of the continuity principle which connects our conscious and unconscious world,emancipation is considered as a personal struggle against all oppressions.Some of these are grounded in our inner world.In accordance with the Enlightenment request,reasoning and knowledge can help us to structure new forms of acceptances which are shaping our own emancipatory meaning.Under the impact of social influence and personal interpretation,the perceived knowledge is considered as a mental tool containing an upgraded valid information.Taking under consideration that this validity is not able to overcome the metaphysical origins of human thought,it is suggested that when this mental tool is functioning in a self-transformative,self-constructed,and flexible form,human intelligence is structuring a compatible information management mechanism,which can enable us to formulate our personal acceptances,bridge our empirical and hyper-empirical inner world,and enlighten our request for self-criticism,self-determination,and above all emancipation.