Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication throug...Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.展开更多
On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 20...On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu...展开更多
Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation...Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation operation and information transmission,thus is widely applied to the power system.In the case of ensuring that the power system is compatible with the network information communication technology,the control of the power system can be strengthened,and the operational efficiency of the power system can be improved.This paper mainly analyzes the specific application of network information communication technology in power system.展开更多
The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find ...The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.展开更多
Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and mo...Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model.展开更多
Cross-region innovation is widely recognized as an important source of the long-term regional innovation capacity.In the recent past,a growing number of studies has investigated the network structure and mechanisms of...Cross-region innovation is widely recognized as an important source of the long-term regional innovation capacity.In the recent past,a growing number of studies has investigated the network structure and mechanisms of cross-region innovation collaboration in various contexts.However,existing research mainly focuses on physical effects,such as geographical distance and high-speed railway connections.These studies ignore the intangible drivers in a changing environment,the more digitalized economy and the increasingly solidified innovation network structure.Thus,the focus of this study is on estimating determinants of innovation networks,especially on intangible drivers,which have been largely neglected so far.Using city-level data of Chinese patents(excluding Hong Kong,Macao,and Taiwan Province of China),we trace innovation networks across Chinese cities over a long period of time.By integrating a measure on Information and Communications Technology(ICT)development gap and network structural effects into the general proximity framework,this paper explores the changing mechanisms of Chinese innovation networks from a new perspective.The results show that the structure of cross-region innovation networks has changed in China.As mechanisms behind this development,the results confirm the increasingly important role of intangible drivers in Chinese inter-city innovation collaboration when controlling for effects of physical proximity,such as geographical distance.Since digitalization and coordinated development are the mainstream trends in China and other developing countries,these countries'inter-city innovation collaboration patterns will witness dramatic changes under the influence of intangible drivers.展开更多
The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high ...The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high bandwidth in a parallel fashion, producing a picture worth more than a thousand words. Effective information visualization can be a powerful tool to capture people's attention and quickly communicate large amounts of data and complex information. This is particularly important in the context of communication data, which often describes entities (people, organizations) and their connections through communication. Visual analytics approaches can optimize the user-computer interaction to gain insights into communication networks and learn about their structures. Network visualization is a perfect instrument to better communicate the results of analysis. The precondition for effective information visualization and successful visual reasoning is the capability to draw "good" pictures. Even though communication networks are often large, including thousands or even millions of people, underlying visualization principles are identical to those used for visualizing smaller networks. In this article, you will learn about these principles, giving you the ability to assess the quality of network visualizations and to draw better network pictures by yourself.展开更多
Household medicine lease (HML) industry originated way back in the Edo period (17C-19C), when it was promoted by the local fiefdom government to revitalize the economy. Accumulations of wealth, acquired thereafter...Household medicine lease (HML) industry originated way back in the Edo period (17C-19C), when it was promoted by the local fiefdom government to revitalize the economy. Accumulations of wealth, acquired thereafter from everywhere outside the region, have culminated in the formation of the present-day industrial cluster in Toyama, the largest in the whole area facing the Sea of Japan. Today an adaptation of the quasi-CRM (customer relationship management) business model of the HML system has proved to be a success in Mongolia. This fact seems to offer the authors some clues for dealing with those problems that healthcare and medical services in Japan and elsewhere are riddled with. In this paper, focusing on the common critical success factors (CSFs) behind the success of the authors' prototype HML system and its recent successful application in Mongolia, the authors will analyze these factors from the perspective of CRM. The authors will then clarify the following: (1) the usefulness of the business model for ensuring primary healthcare for people in developing countries; (2) the usefulness in our ubiquitous network society of applying ICT to the HML system; (3) possible contributions that the use of the system can make toward improving the quality of our everyday healthcare and medical services in our prominently aging society; and the authors will also suggest (4) the importance of elevating "individual self-medication" to "community-based self-medication".展开更多
The integrated information network is a large capacity information network that integrates various communication platforms on the ground, at sea, in the air and in the deep air through the inter-satellite and satellit...The integrated information network is a large capacity information network that integrates various communication platforms on the ground, at sea, in the air and in the deep air through the inter-satellite and satellite-ground links to acquire information accurately, process it quickly, and transmit it efficiently. The satellite communication, as an important part of integrated information networks, is one of main approaches to acquire, process and distribute communication information and resources. In this paper, based on current researches of the satellite communication network, we put forward a 3-layer satellite communication network model based on the Software Defined Network (SDN). Meanwhile, to improve current routing policies of the Low Earth Orbit (LEO) satellite communication network, we put forward an Adaptive Routing Algorithm (ARA) to sustain the shortest satellite communication link. Experiment results show that the proposed method can effectively reduce link distance and communication delay, and realize adaptive path planning.展开更多
Edge intelligence is anticipated to underlay the pathway to connected intelligence for 6G networks,but the organic confluence of edge computing and artificial intelligence still needs to be carefully treated.To this e...Edge intelligence is anticipated to underlay the pathway to connected intelligence for 6G networks,but the organic confluence of edge computing and artificial intelligence still needs to be carefully treated.To this end,this article discusses the concepts of edge intelligence from the semantic cognitive perspective.Two instructive theoretical models for edge semantic cognitive intelligence(ESCI)are first established.Afterwards,the ESCI framework orchestrating deep learning with semantic communication is discussed.Two representative applications are present to shed light on the prospect of ESCI in 6G networks.Some open problems are finally listed to elicit the future research directions of ESCI.展开更多
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The...In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.展开更多
Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new m...Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.展开更多
Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency ar...Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency are the main concerns when designing a routing protocol for WSNs with low complexity. There are various existing design approaches, such as data-centric approach, hierarchical approach and location-based approach, which were designed for a particular application with specific requirements. In this paper, we study the design and implementation of a routing protocol for data acquisition in WSNs. The designed routing protocol is named Centralized Sensor Protocol for Information via Negotiation (CSPIN), which essentially combines the advertise-request-transfer process and a routing distribution mechanism. Implementation is realized and demonstrated with the Crossbow MicaZ hardware using nesC/TinyOS. It was our intention to provide a hand-on study of implementation of centralized routing protocol for WSNs.展开更多
With the development of Intemet technology, various kinds of network link show up, from common links to deep links, from the web to mobile client. Many platforms named the deep links banner aggregation service emerged...With the development of Intemet technology, various kinds of network link show up, from common links to deep links, from the web to mobile client. Many platforms named the deep links banner aggregation service emerged gradually. The deep linking has brought convenience to the public and also caused a lot of copyright infringement problems. This paper expounds the identification of infringement of the deep linking information transmission on internet and the identification of infringement of the right of reproduction, furthermore analyzing three kinds of applicable standards to determine interact information transmission behavior. Finally, we should gradually get rid of the dependence on server standard applicable, auxiliary for the substantive alternative standard, and gradually complete the substantive alternative standard.展开更多
Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation posit...Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation positioning and science exploration. In this paper, the architecture of Software Defined Space Optical Network (SDSON) based on cloud platform is designed by means of Software Defined Optical Network (SDON) and cloud services. The new architecture combining centralized and distributed management-control mechanism is a multi-layer and multi-domain architecture with powerful computing and storage ability. Moreover, reliable service and unreliable service communication models employed in the space information network are proposed considering the characteristic of Disruption/Delay Tolerant Network (DTN). Finally, the functional verification and demonstration are performed on our optical experimental network platform.展开更多
One of the most outstanding characteristics of library legislation in China is that theoretical research and legislative practice are mutually reinforcing, making important issues and basic rules and regulations close...One of the most outstanding characteristics of library legislation in China is that theoretical research and legislative practice are mutually reinforcing, making important issues and basic rules and regulations closely associated with legislation and the research focus. A national library law is currently being enacted while several local library legislations have already seen fruitful results. In the enactment of 'Regulations for the Protection of Information Network Dissemination Rights', the library professional participated for the first time in enacting a national copyright law, which led to unprecedented flourishing of library activities and copyright studies. The promulgation of another legal framework,'Government Information Disclosure Regulations' further advanced the research on related issues and pushed forward government information services in public libraries in the same way. A new landmark for library legislation in recent years is the promulgation of'Guidelines for Land Utilization for Public Library Construction' and 'Public Library Construction Standards', while the framing of 'Rules of Professional Ethics for Librarians in China(On trial)' and the 'Library Service Manifesto' give indication that a framework of self-disciplinary measures of library professionals is established.展开更多
The main purpose of this paper is to analyze and provide reliable solutions to the Reiki application technique,starting from the fundamental principles expressed by the Reiki origin philosophy,which are proved to be i...The main purpose of this paper is to analyze and provide reliable solutions to the Reiki application technique,starting from the fundamental principles expressed by the Reiki origin philosophy,which are proved to be in accordance with the Informational Model of Human and Living Structures(IMHLS).This model reveals the following main fundamental features of the living organisms:(i)On the entire scale of evolution and organization,from the eukaryotic cell-the composing unit of human,plants,animals to human,the living organisms show a similar informational structure,defined as Informational System of Human and Living Structure(ISHLS);(ii)this informational system is organized in seven informational components,three of them assuring the structuration/restructuration/reproduction and maintenance of the body itself,and the other four the connection with external/inner reality for adaptation;(iii)the neuro-connections between brain and body of the informational components of the ISHLS correspond with the activity of“Chakras”of the ancient empirical model as vital centers of human;(iv)the activity of the ISHLS is reflected in mind by cognitive centers,explaining consciousness.The comparison between the informational results of the IMHLS,with the philosophic Reiki origin concepts,sustains the application of Reiki technique,but improves its understanding and right application by using new,modern concepts developed by the informational model,in accordance not only with their ancient,empirical expression,but much more than that,with actual scientific knowledge on this issue nowadays,concerning information and info-transferring/communication stream in the living bodies.The successful application and effective results of this new version allow to consider this as Ro-Reiki version,just to recognize the essential Romanian contribution to this improvement,concerning the implication and effectiveness of information and the info-communication mechanisms into the human and living organisms,explained in scientific terms of information and psycho-somatic therapy effects.展开更多
文摘Article 1 These Regulations have been formulated under the Copyright Law of the People's Republic of China (hereinafter referred to as the Copyright Law) with a view to protecting the right of communication through information network enjoyed by copyright owners, performers and producers of sound recordings and video recordings (hereinafter collectively referred to as the right owners) and to encouraging creation and communication of works conducive to the building of a socialist society that is advanced ethically and materially.
文摘On 27 October 2001, the Standing Committee of the People's Congress reviewed and passed the Amendment to the Copyright Law of the People's Republic of China. In Article 10 of the amended Copyright Law as of 2001 has been incorporated a new subject matter under the copyright protection: the right of communication through information network, that is, the right to make a work available to the public by wire or by wireless means, so that people may have access to the work from a place and at a time individu...
文摘Network information communication technology in power systems is the key to ensuring the safe and efficient operation of power grids.The network information communication technology itself has advantages in automation operation and information transmission,thus is widely applied to the power system.In the case of ensuring that the power system is compatible with the network information communication technology,the control of the power system can be strengthened,and the operational efficiency of the power system can be improved.This paper mainly analyzes the specific application of network information communication technology in power system.
文摘The spread of social media has increased contacts of members of communities on the lntemet. Members of these communities often use account names instead of real names. When they meet in the real world, they will find it useful to have a tool that enables them to associate the faces in fiont of them with the account names they know. This paper proposes a method that enables a person to identify the account name of the person ("target") in front of him/her using a smartphone. The attendees to a meeting exchange their identifiers (i.e., the account name) and GPS information using smartphones. When the user points his/her smartphone towards a target, the target's identifier is displayed near the target's head on the camera screen using AR (augmented reality). The position where the identifier is displayed is calculated from the differences in longitude and latitude between the user and the target and the azimuth direction of the target from the user. The target is identified based on this information, the face detection coordinates, and the distance between the two. The proposed method has been implemented using Android terminals, and identification accuracy has been examined through experiments.
基金This work is supported by National Natural Science Foundation of China(Grant:62272109).
文摘Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model.
基金Under the auspices of China Scholarship Council。
文摘Cross-region innovation is widely recognized as an important source of the long-term regional innovation capacity.In the recent past,a growing number of studies has investigated the network structure and mechanisms of cross-region innovation collaboration in various contexts.However,existing research mainly focuses on physical effects,such as geographical distance and high-speed railway connections.These studies ignore the intangible drivers in a changing environment,the more digitalized economy and the increasingly solidified innovation network structure.Thus,the focus of this study is on estimating determinants of innovation networks,especially on intangible drivers,which have been largely neglected so far.Using city-level data of Chinese patents(excluding Hong Kong,Macao,and Taiwan Province of China),we trace innovation networks across Chinese cities over a long period of time.By integrating a measure on Information and Communications Technology(ICT)development gap and network structural effects into the general proximity framework,this paper explores the changing mechanisms of Chinese innovation networks from a new perspective.The results show that the structure of cross-region innovation networks has changed in China.As mechanisms behind this development,the results confirm the increasingly important role of intangible drivers in Chinese inter-city innovation collaboration when controlling for effects of physical proximity,such as geographical distance.Since digitalization and coordinated development are the mainstream trends in China and other developing countries,these countries'inter-city innovation collaboration patterns will witness dramatic changes under the influence of intangible drivers.
文摘The human brain is built to process complex visual impressions within milliseconds. In comparison with sequentially coded spoken language and written texts, we are capable of consuming graphical information at a high bandwidth in a parallel fashion, producing a picture worth more than a thousand words. Effective information visualization can be a powerful tool to capture people's attention and quickly communicate large amounts of data and complex information. This is particularly important in the context of communication data, which often describes entities (people, organizations) and their connections through communication. Visual analytics approaches can optimize the user-computer interaction to gain insights into communication networks and learn about their structures. Network visualization is a perfect instrument to better communicate the results of analysis. The precondition for effective information visualization and successful visual reasoning is the capability to draw "good" pictures. Even though communication networks are often large, including thousands or even millions of people, underlying visualization principles are identical to those used for visualizing smaller networks. In this article, you will learn about these principles, giving you the ability to assess the quality of network visualizations and to draw better network pictures by yourself.
文摘Household medicine lease (HML) industry originated way back in the Edo period (17C-19C), when it was promoted by the local fiefdom government to revitalize the economy. Accumulations of wealth, acquired thereafter from everywhere outside the region, have culminated in the formation of the present-day industrial cluster in Toyama, the largest in the whole area facing the Sea of Japan. Today an adaptation of the quasi-CRM (customer relationship management) business model of the HML system has proved to be a success in Mongolia. This fact seems to offer the authors some clues for dealing with those problems that healthcare and medical services in Japan and elsewhere are riddled with. In this paper, focusing on the common critical success factors (CSFs) behind the success of the authors' prototype HML system and its recent successful application in Mongolia, the authors will analyze these factors from the perspective of CRM. The authors will then clarify the following: (1) the usefulness of the business model for ensuring primary healthcare for people in developing countries; (2) the usefulness in our ubiquitous network society of applying ICT to the HML system; (3) possible contributions that the use of the system can make toward improving the quality of our everyday healthcare and medical services in our prominently aging society; and the authors will also suggest (4) the importance of elevating "individual self-medication" to "community-based self-medication".
基金supported in part by the National Natural Science Foundation of China (No. 61571104)the Sichuan Science and Technology Program (No. 2018JY0539)+2 种基金the Key projects of the Sichuan Provincial Education Department (No. 18ZA0219)the Fundamental Research Funds for the Central Universities (No. ZYGX2017KYQD170)the Innovation Funding (No. 2018510007000134)
文摘The integrated information network is a large capacity information network that integrates various communication platforms on the ground, at sea, in the air and in the deep air through the inter-satellite and satellite-ground links to acquire information accurately, process it quickly, and transmit it efficiently. The satellite communication, as an important part of integrated information networks, is one of main approaches to acquire, process and distribute communication information and resources. In this paper, based on current researches of the satellite communication network, we put forward a 3-layer satellite communication network model based on the Software Defined Network (SDN). Meanwhile, to improve current routing policies of the Low Earth Orbit (LEO) satellite communication network, we put forward an Adaptive Routing Algorithm (ARA) to sustain the shortest satellite communication link. Experiment results show that the proposed method can effectively reduce link distance and communication delay, and realize adaptive path planning.
基金supported in part by the National Science Foundation of China under Grant 62101253the Natural Science Foundation of Jiangsu Province under Grant BK20210283+2 种基金the Jiangsu Provincial Inno-vation and Entrepreneurship Doctor Program under Grant JSSCBS20210158the Open Research Foun-dation of National Mobile Communications Research Laboratory under Grant 2022D08the Research Foundation of Nanjing for Returned Chinese Scholars.
文摘Edge intelligence is anticipated to underlay the pathway to connected intelligence for 6G networks,but the organic confluence of edge computing and artificial intelligence still needs to be carefully treated.To this end,this article discusses the concepts of edge intelligence from the semantic cognitive perspective.Two instructive theoretical models for edge semantic cognitive intelligence(ESCI)are first established.Afterwards,the ESCI framework orchestrating deep learning with semantic communication is discussed.Two representative applications are present to shed light on the prospect of ESCI in 6G networks.Some open problems are finally listed to elicit the future research directions of ESCI.
基金financial support of National Natural Science Foundation of China(NSFC),No.U1705263 and 61971102GF Innovative Research Programthe Sichuan Science and Technology Program,No.2019YJ0194。
文摘In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.
文摘Information security is the backbone of current intelligent systems,such as the Internet of Things(IoT),smart grids,and Machine-to-Machine(M2M)communication.The increasing threat of information security requires new models to ensure the safe transmission of information through such systems.Recently,quantum systems have drawn much attention since they are expected to have a significant impact on the research in information security.This paper proposes a quantum teleportation scheme based on controlled multi-users to ensure the secure information transmission among users.Quantum teleportation is an original key element in a variety of quantum information tasks as well as quantum-based technologies,which plays a pivotal role in the current progress of quantum computing and communication.In the proposed scheme,the sender transmits the information to the receiver under the control of a third user or controller.Here,we show that the efficiency of the proposed scheme depends on the properties of the transmission channel and the honesty of the controller.Compared with various teleportation scheme presented recently in the literature,the most important difference in the proposed scheme is the possibility of suspicion about the honesty of the controller and,consequently,taking proper precautions.
文摘Wireless sensor networks (WSNs) attract considerable amount of research efforts from both industry and academia. With limited power and computational capability available on a sensor node, robustness and efficiency are the main concerns when designing a routing protocol for WSNs with low complexity. There are various existing design approaches, such as data-centric approach, hierarchical approach and location-based approach, which were designed for a particular application with specific requirements. In this paper, we study the design and implementation of a routing protocol for data acquisition in WSNs. The designed routing protocol is named Centralized Sensor Protocol for Information via Negotiation (CSPIN), which essentially combines the advertise-request-transfer process and a routing distribution mechanism. Implementation is realized and demonstrated with the Crossbow MicaZ hardware using nesC/TinyOS. It was our intention to provide a hand-on study of implementation of centralized routing protocol for WSNs.
文摘With the development of Intemet technology, various kinds of network link show up, from common links to deep links, from the web to mobile client. Many platforms named the deep links banner aggregation service emerged gradually. The deep linking has brought convenience to the public and also caused a lot of copyright infringement problems. This paper expounds the identification of infringement of the deep linking information transmission on internet and the identification of infringement of the right of reproduction, furthermore analyzing three kinds of applicable standards to determine interact information transmission behavior. Finally, we should gradually get rid of the dependence on server standard applicable, auxiliary for the substantive alternative standard, and gradually complete the substantive alternative standard.
文摘Space information network is used for real time acquiring, transmitting and processing the space information on the space platform, which provides significant communication services for communication, navigation positioning and science exploration. In this paper, the architecture of Software Defined Space Optical Network (SDSON) based on cloud platform is designed by means of Software Defined Optical Network (SDON) and cloud services. The new architecture combining centralized and distributed management-control mechanism is a multi-layer and multi-domain architecture with powerful computing and storage ability. Moreover, reliable service and unreliable service communication models employed in the space information network are proposed considering the characteristic of Disruption/Delay Tolerant Network (DTN). Finally, the functional verification and demonstration are performed on our optical experimental network platform.
文摘One of the most outstanding characteristics of library legislation in China is that theoretical research and legislative practice are mutually reinforcing, making important issues and basic rules and regulations closely associated with legislation and the research focus. A national library law is currently being enacted while several local library legislations have already seen fruitful results. In the enactment of 'Regulations for the Protection of Information Network Dissemination Rights', the library professional participated for the first time in enacting a national copyright law, which led to unprecedented flourishing of library activities and copyright studies. The promulgation of another legal framework,'Government Information Disclosure Regulations' further advanced the research on related issues and pushed forward government information services in public libraries in the same way. A new landmark for library legislation in recent years is the promulgation of'Guidelines for Land Utilization for Public Library Construction' and 'Public Library Construction Standards', while the framing of 'Rules of Professional Ethics for Librarians in China(On trial)' and the 'Library Service Manifesto' give indication that a framework of self-disciplinary measures of library professionals is established.
文摘The main purpose of this paper is to analyze and provide reliable solutions to the Reiki application technique,starting from the fundamental principles expressed by the Reiki origin philosophy,which are proved to be in accordance with the Informational Model of Human and Living Structures(IMHLS).This model reveals the following main fundamental features of the living organisms:(i)On the entire scale of evolution and organization,from the eukaryotic cell-the composing unit of human,plants,animals to human,the living organisms show a similar informational structure,defined as Informational System of Human and Living Structure(ISHLS);(ii)this informational system is organized in seven informational components,three of them assuring the structuration/restructuration/reproduction and maintenance of the body itself,and the other four the connection with external/inner reality for adaptation;(iii)the neuro-connections between brain and body of the informational components of the ISHLS correspond with the activity of“Chakras”of the ancient empirical model as vital centers of human;(iv)the activity of the ISHLS is reflected in mind by cognitive centers,explaining consciousness.The comparison between the informational results of the IMHLS,with the philosophic Reiki origin concepts,sustains the application of Reiki technique,but improves its understanding and right application by using new,modern concepts developed by the informational model,in accordance not only with their ancient,empirical expression,but much more than that,with actual scientific knowledge on this issue nowadays,concerning information and info-transferring/communication stream in the living bodies.The successful application and effective results of this new version allow to consider this as Ro-Reiki version,just to recognize the essential Romanian contribution to this improvement,concerning the implication and effectiveness of information and the info-communication mechanisms into the human and living organisms,explained in scientific terms of information and psycho-somatic therapy effects.