Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti...Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.展开更多
This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. Mo...This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace.展开更多
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom...The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.展开更多
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
A new algorithm to automatically extract drainage networks and catchments based on triangulation irregular networks(TINs) digital elevation model(DEM) was developed. The flow direction in this approach is determined b...A new algorithm to automatically extract drainage networks and catchments based on triangulation irregular networks(TINs) digital elevation model(DEM) was developed. The flow direction in this approach is determined by computing the spatial gradient of triangle and triangle edges. Outflow edge was defined by comparing the contribution area that is separated by the steepest descent of the triangle. Local channels were then tracked to build drainage networks. Both triangle edges and facets were considered to construct flow path. The algorithm has been tested in the site for Hawaiian Island of Kaho'olawe, and the results were compared with those calculated by ARCGIS as well as terrain map. The reported algorithm has been proved to be a reliable approach with high efficiency to generate well-connected and coherent drainage networks.展开更多
An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet a...An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm.展开更多
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th...In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.展开更多
As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been stan...As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been standardized in China, only wireless access is defined to be allowable. Therefore, it becomes the focus of further research how to establish a wireless digital home network. This article proposes the concept and shows the architecture of ubiquitous access for wireless digital home networks. Moreover, key technologies for ubiquitous access are discussed here, including cognitive radio, the concept of wireless Mesh, generic link transfer mechanism, Quality of Service (QoS) guarantee mechanism, Electromagnetic Compatibility (EMC) and coexistence of heterogeneous systems.展开更多
Based on wave digital filter(WDF) principles, this paper presents a digital model of cellular neural networks(CNNs). The model can precisely simulate the dynamic behavior of CNNs.
Using the records of 3,069 regional earthquake events from the Fujian Digital Seismic Network from October 2008 to December 2015,in which the magnitude of each of the events was measured by at least six stations,stati...Using the records of 3,069 regional earthquake events from the Fujian Digital Seismic Network from October 2008 to December 2015,in which the magnitude of each of the events was measured by at least six stations,statistics are taken on the deviation between the magnitude of a single station and the average magnitude of the network. It is found that the magnitudes average deviation of each station is-0. 31-0. 68. Statistics are also taken for the period corresponding to the maximum amplitude of the record measured in each station for calculating the magnitude,and the dominant period gained is 0. 06s-0. 38s; site response of each seismic station is inverted using the Moya method,and it is found that the site response of 98 stations is in the bands of 1-20 Hz,suggesting that the site has an amplifying or suppressing effect on the signals in certain frequency bands;Considering the site response corresponding to the inherent 0. 8s period of the WoodAnderson pendulum seismograph,and comparing the magnitude deviation caused by the site response corresponding to the dominant period time of each station with the average magnitude deviation, we obtain that there is a good linear relationship between the magnitude deviation from the dominant period site response and the average deviation of the magnitude of each station,indicating that the magnitude deviation of a single station has a close relationship with the site response of the period corresponding to the maximum amplitude measured for calculating the magnitude.展开更多
A new approach for the design of two-dimensional (2-D) linear phase FIR digital filters based on a new neural networks algorithm (NNA) is provided. A compact expression for the transfer function of a 2-D linear ph...A new approach for the design of two-dimensional (2-D) linear phase FIR digital filters based on a new neural networks algorithm (NNA) is provided. A compact expression for the transfer function of a 2-D linear phase FIR filter is derived based on its frequency response characteristic, and the NNA, based on minimizing the square-error in the frequency-domain, is established according to the compact expression. To illustrate the stability of the NNA, the convergence theorem is presented and proved. Design examples are also given, and the results show that the ripple is considerably small in passband and stopband, and the NNA-based method is of powerful stability and requires quite little amount of computations.展开更多
文摘Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.
文摘This article explores the use of social networks by workers in Abidjan, Côte d’Ivoire, with particular emphasis on a descriptive or quantitative analysis aimed at understanding motivations and methods of use. More than five hundred and fifty questionnaires were distributed, highlighting workers’ preferred digital channels and platforms. The results indicate that the majority use social media through their mobile phones, with WhatsApp being the most popular app, followed by Facebook and LinkedIn. The study reveals that workers use social media for entertainment purposes and to develop professional and social relationships, with 55% unable to live without social media at work for recreational activities. In addition, 35% spend on average 1 to 2 hours on social networks, mainly between 12 p.m. and 2 p.m. It also appears that 46% believe that social networks moderately improve their productivity. These findings can guide marketing strategies, training, technology development and government policies related to the use of social media in the workplace.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.
基金the National Basic Research Program(973)of China(No.2007CB714103)
文摘A new algorithm to automatically extract drainage networks and catchments based on triangulation irregular networks(TINs) digital elevation model(DEM) was developed. The flow direction in this approach is determined by computing the spatial gradient of triangle and triangle edges. Outflow edge was defined by comparing the contribution area that is separated by the steepest descent of the triangle. Local channels were then tracked to build drainage networks. Both triangle edges and facets were considered to construct flow path. The algorithm has been tested in the site for Hawaiian Island of Kaho'olawe, and the results were compared with those calculated by ARCGIS as well as terrain map. The reported algorithm has been proved to be a reliable approach with high efficiency to generate well-connected and coherent drainage networks.
基金Supported by the National Natural Science Foun-dation of China ( 60473015)
文摘An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm.
基金Funded by the National Natural Science Foundation of China(No.50335020)the International Cooperation Project(No.2003CA007)
文摘In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.
文摘As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been standardized in China, only wireless access is defined to be allowable. Therefore, it becomes the focus of further research how to establish a wireless digital home network. This article proposes the concept and shows the architecture of ubiquitous access for wireless digital home networks. Moreover, key technologies for ubiquitous access are discussed here, including cognitive radio, the concept of wireless Mesh, generic link transfer mechanism, Quality of Service (QoS) guarantee mechanism, Electromagnetic Compatibility (EMC) and coexistence of heterogeneous systems.
文摘Based on wave digital filter(WDF) principles, this paper presents a digital model of cellular neural networks(CNNs). The model can precisely simulate the dynamic behavior of CNNs.
文摘Using the records of 3,069 regional earthquake events from the Fujian Digital Seismic Network from October 2008 to December 2015,in which the magnitude of each of the events was measured by at least six stations,statistics are taken on the deviation between the magnitude of a single station and the average magnitude of the network. It is found that the magnitudes average deviation of each station is-0. 31-0. 68. Statistics are also taken for the period corresponding to the maximum amplitude of the record measured in each station for calculating the magnitude,and the dominant period gained is 0. 06s-0. 38s; site response of each seismic station is inverted using the Moya method,and it is found that the site response of 98 stations is in the bands of 1-20 Hz,suggesting that the site has an amplifying or suppressing effect on the signals in certain frequency bands;Considering the site response corresponding to the inherent 0. 8s period of the WoodAnderson pendulum seismograph,and comparing the magnitude deviation caused by the site response corresponding to the dominant period time of each station with the average magnitude deviation, we obtain that there is a good linear relationship between the magnitude deviation from the dominant period site response and the average deviation of the magnitude of each station,indicating that the magnitude deviation of a single station has a close relationship with the site response of the period corresponding to the maximum amplitude measured for calculating the magnitude.
文摘A new approach for the design of two-dimensional (2-D) linear phase FIR digital filters based on a new neural networks algorithm (NNA) is provided. A compact expression for the transfer function of a 2-D linear phase FIR filter is derived based on its frequency response characteristic, and the NNA, based on minimizing the square-error in the frequency-domain, is established according to the compact expression. To illustrate the stability of the NNA, the convergence theorem is presented and proved. Design examples are also given, and the results show that the ripple is considerably small in passband and stopband, and the NNA-based method is of powerful stability and requires quite little amount of computations.