首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
LOUIS KRUH 《Cryptologia》2013,37(2):110-122
ABSTRACT

In an effort to support its massive conspiracy theory headed by President Franklin D. Roosevelt to get the United States into the European war and it continuing cover-up, Day of Deceit misinterprets, misstates, and omits much of the old and some new cryptologic information surrounding the Japanese attack on Pearl Harbor. In spite of this huge research effort by the author, Robert B. Sinnett, it is still clear that no U. S. official knew about the attack beforehand.  相似文献   

2.
ABSTRACT

In late October 1942, LtCmdr Joseph Rocherfort, USN, was dismissed from his job as officer in charge of the Navy's radio intelligence center in Honolulu. Trained in both Japanese language and radio intelligence, he had been sent there a little over a year before by OP-20-G, the element in naval communications in overall charge of radio intelligence. During that time he had seen his beloved Pacific Fleet in both defeat and victory. His contributions in radio intelligence in that short time were legendary among his colleagues in Hawaii and his services were so highly valued by the Commander in Chief of the Pacific Fleet, Admiral Chester Nimitz, that, after the American victory at Midway, he was recommended for a Distinguished Service Medal. This article describes how and why, so early in the war, this multi-talented naval officer lost his job in Hawaii and spent virtually the entire war outside the intelligence field altogether.  相似文献   

3.
In early February, 1942, Commander M. E. Miles proposed the establishment of a radio intelligence unit in China. His proposal led to the creation of Naval Group China (NGC), the umbrella organization for units that performed weather forecasting, advised and trained Chinese guerillas, and intercepted and analyzed Japanese radio traffic. NGC was part of the Sino-American Cooperative Organization (SACO). Most of the commitments of China and NGC were formalized on 15 April 1943 with the signing of the Sino-American Cooperative Agreement (SACO). Article 18 required further delicate negotiations between Miles and General Tai Li, head of the Bureau of Investigation and Statistics (China's secret service). Miles was soon trapped between his commitment to Tai Li and Joseph Wenger's concern that any intercepted traffic shared with the Chinese would quickly become available to the Japanese via insecure Chinese codes. Fleet Radio Unit, China (FRUCHI) resolved this dilemma.  相似文献   

4.
Abstract

Background: We proposed a new automatic and rapid computer-aided diagnosis system to detect pathological brain images obtained in the scans of magnetic resonance imaging (MRI). Methods: For simplification, we transformed the problem to a binary classification task (pathological or normal). It consisted of two steps: first, Hu moment invariants (HMI) were extracted from a specific MR brain image; then, seven HMI features were fed into two classifiers: twin support vector machine (TSVM) and generalised eigenvalue proximal SVM (GEPSVM). Results: Then, a 5 × 5-fold cross validation on a data set containing 90 MR brain images, demonstrated that the proposed methods “HMI + GEPSVM” and “HMI + TSVM” achieved classification accuracy of 98.89%, higher than eight state-of-the-art methods: “DWT + PCA + BP-NN”, “DWT + PCA + RBF-NN”, “DWT + PCA + PSO-KSVM”, “WE + BP-NN”, “WE + KSVM”, “DWT + PCA + GA-KSVM”, “WE + PSO-KSVM” and “WE + BBO-KSVM”. Conclusion: The proposed methods are superior to other methods on pathological brain detection (p < 0.05).  相似文献   

5.
Recently declassified documents from the “Crane Collection” at the National Archives (USA) reveal much of the purpose of Alan Turing's visit to the United States during the Winter of 1942–1943. The “Bombe Correspondence” file contains Turing's “Visit To National Cash Register Corporation of Dayton, Ohio” and additional material which places this report and his earlier “Treatise on the Enigma” in the context of his role as consultant to the U. S. Navy Cryptanalytic Section (Op-20-G) on the design of the Navy Bombe and other related matters. The documents in this collection reveal a productive and decisive relationship between Turing and Op-20-G dating from the visit of the Sinkov mission to Bletchley Park in February 1941.  相似文献   

6.
In their revisionist efforts to establish a “foreknowledge” of the planned attack on Pearl Harbor as a basis for suspicions that there was a deliberate failure by high U.S. officials to warn the military commanders in Hawaii, two modern day writers have misinterpreted numerous archival documents to come up with the speculation that the U. S. Navy cryptanalysts at Corregidor may have made a number of complete pre-war JN-25B decrypts of intelligence value. They then bootstrap this questionable camel's nose under the tent into a suggestion that these few highly speculative decrypts must somehow have become the equivalent of the selected 2,413 post-war translations from 25,581 decrypts of pre-war messages despite the vehement testimonies of key Corregidor personnel and official documentation to the contrary. A critical review of these claims and the pertinent documentation shows that essentially no JN-25B decrypts of Intelligence value were achieved pre-war, much less any cryptanalytic information revealing any foreknowledge of the planned attack on Pearl Harbor.  相似文献   

7.
Attraction (or asymptoticily) is defined for a general space-time system consisting of a set endowed with a preorder (the “flow”), a family of monotone mappings (the “time scale”) and two collections of subsets, or quasifilters (a kind of generalized neighborhood systems).

Thus, the notion of attraction is presented under the weakest possible conditions which allow us its adaptation to a wide variety of special situations. Within this framework we state necessary and sufficient conditions for asymptoticity in terms of Liapunov-type functions.  相似文献   

8.
Abstract

Henry L. Stimson is best known to readers of this journal for his quote, “Gentlemen do not read each other's mail,” and his shutting down of Herbert O. Yardley's black chamber. The present piece reveals a second cryptologic episode from his life. During WWII, Stimson made a request of hundreds of libraries that they withdraw all material on explosives, secret inks, and ciphers from circulation and report the names of anyone requesting these materials to the local office of the Federal Bureau of Investigation (FBI). A pair of original documents is reproduced for the first time along with some references. A list of libraries contacted is also provided.  相似文献   

9.
Soviet comint personnel were active participants in at least Spain, China, and Mongolia during the 1930's. Special Operations Groups of cryptanalysts and comint intercept operators provided assistance to the host governments fighting German, Italian, and Japanese military forces in those countries.  相似文献   

10.
本文结合锦州市大凌河供水工程SCADA系统设计的实例,详细介绍了该SCADA系统的配置和功能。该水厂已投产运行达十五年之久,取得了较大的经济效益和社会效益,积累了丰富的操作使用经验,对今后设计新的给水项目具有较大的指导意义。  相似文献   

11.
Waka is a form of traditional Japanese poetry with a 1300-year history. In this paper, we attempt to discover characteristics common to a collection ofwaka poems. As a schema for characteristics, we use regular patterns where the constant parts are limited to sequences of auxiliary verbs and postpostional particles. We call such patternsfushi. The problem is to automate the process of finding significantfushi patterns that characterize the poems. Solving this problem requires a reliable significance measure for the patterns. Brāzma et al. (1996) proposed such a measure according to the MDL principle. Using this method, we report successful results in finding patterns from five anthologies. Some of the results are quite stimulating, and we hope that they will lead to new discoveries. Mayumi Yamasaki, M.A.: She received her B.E. and M.A. degrees from Kyushu Institute of Technology in 1997 and from Kyushu University in 1999, respectively. Her research interests include machine discovery and datamining. Presently, she works at Fujitsu FIP Corporation. Masayuki Takeda, Dr. Eng.: He is an Associate Professor in Department of informatics at Kyushu University. He received his B.S., M.S., and Dr. Eng. degrees from Kyushu University in 1987, 1989 and 1996 respectively. His present research interests include pattern matching algorithims, text compression, discovery science, information retrieval and natural language processing. He is a member of Information Processing Society of Japan, Japanese Society for Artificial Intelligence and Japanese Society for Soft-ware Science and Technology. Tomoko Fukuda, M.A.: She is a Lecturer at Fukuoka Jo Gakuin University and at Junshin Women’s Junior College, She received her B.A. and M.A. degrees from Fukuoka Women’s University in 1987 and from Kyushu University in 1992 respectively. Her present research interests are in Japanese literature in the Heian period and classical 31-syllable Japanese poems. She is a member of Waka-Bungaku Kai (Society for Study of Japanese Poems) and Chuko-Bungaku Kai (Society for Study of Japanese Literature in the Heian Period). Ichiro Nanri, M.A.: He is an Associate Professor at Junshin Women’s Juior College. He received his B.A. and M.A. degrees from Kyushu University in 1990 and 1995 respectively. His present research interests are in Japanese language in the Heian-Kamakura period and classical 31-syllable Japanese poems. He is a member of Kokugo Gakkai (Society for Study of Japanese Language) and Kuntengo Gakkai (Society for Studyy of Old Language).  相似文献   

12.
在介绍人工免疫系统基本概念的基础上,讨论了人工免疫系统中应用广泛的负选择模型。研究的重点是负选择模型中初始检测器集的生成算法,对线性检测器生成算法进行了改进。改进算法从两个方向分别构造数组CC′,并做叉乘得到D数组,使产生的检测器能够匹配更多的“非我”字符串,去除冗余检测器缩小了检测器集的规模,包括算法的设计、性能分析和实验。理论分析与实验结果表明,改进算法降低了检测器规模,漏检概率Pf有较大下降。  相似文献   

13.
For two given ordinal scales in a measurement process, the present paper investigates how an indistinguishability operator evaluated according to one of these ordinal scales can be converted to another indistinguishability operator w.r.t. the other ordinal scale, and establishes the mathematical base of these conversions under the framework of measurement theory [Krantz, D.H., Luce, R.D., Suppes, P., Tversky, A. (1971) Foundations of Measurement, Vol. 1 (Academic Press, San Diego)]. Additionally, this work exposes the rudimentary facts behind the studies in [“Fuzzy Numbers and Equality Relations”, Proc. FUZZ'IEEE 93 (1993) 1298–1301; “Fuzzy Sets and Vague Environments”, Fuzzy Sets and Systems 66 (1994) 207–221; “Fuzzy Control on the Basis of Equality Relations-with an Example from Idle Speed Control”, IEEE Transactions on Fuzzy Systems 3 (1995) 336–350; and “T-partitions of the Real Line Generated by Idempotent Shapes”, Fuzzy Sets and Systems 91 (1997) 177–184], and points out the measurement theoretic derivations of the results in these studies.  相似文献   

14.
Book Reviews     
As the results of man-engineered experiments with social design, social “revolution”, socialist “architectures”, and other feats of “social engineering”, are crumbling down, they are causing large-scale human suffering through their failures. There is a renewed awareness that self-organizing and spontaneous properties of complex social systems are much too powerful (and much too vulnerable at the same lime) to respond or be exposed to the endless, reductionistic “tinkering” of policy “makers”, “scientists” of the artificial, and “engineers of human souls”.? ? Geoffrey Vickers, in his Human Systems are Different26 ends up expressing a similar awareness: “It [his book] does not offer a blueprint for the design of human societies. I hope it will weaken the contemporary urge to regard such activities as akin to engineering rather than (at most) to gardening.” View all notes The mankind is again ready to learn how to “trigger”, “catalyze”, “sustain” and “lead-manage” a spontaneous process of social self-organization; it is becoming less inclined to design another “central super-controller”, “information-processing command system”, or “World Brain”.

The purpose of this paper is to show: (1) that theories dealing with “spontaneous social orders” have deep historical roots and (2) that systems sciences are in a good position (better than economics, engineering or sociology) to build upon these roots and expand the theories into useful, practical methodologies. For example, modern theories of autopoiesis and order through fluctuations, especially their rich, computer-based simulation experiments, provide a good and solid point of departure.  相似文献   


15.
HawkHelp     
SUMMARY

This article describes the factors that influenced the design of a chat reference service that meets the needs of distance learners as well as traditional students. Emphasis is placed in the importance of collaborative projects, evaluation of software, and planning the organizational structure. An innovative “peer and tier” staffing initiative may extend hours and free reference librarians to concentrate on research and in-depth questions. Finally, a planning effort by information services may lead to a one-stop shopping service that will include student services that often are problematic for the distant learner (counseling, enrollment, financial aid, etc.).  相似文献   

16.
BackgroundThe use of colors in visual displays can facilitate visual search and perception, but their use may not be effective without consideration of differences in the interpretation of their connoted meanings between individuals of different occupational backgrounds.ObjectiveThis study examined color-concept associations for Hong Kong Chinese students and white-collar workers, and then compared their associations with those of two other occupational groups to assess whether occupational background is related to color-concept associations.MethodA questionnaire survey was used to examine color-concept associations among 100 university students and 100 white-collar workers in Hong Kong. The participants were presented with 16 safety-related concepts and were asked to choose one of 10 colors that best represented each concept. The associations reported by four groups with different occupations (the two groups in this study and the groups of managerial staff and steel workers examined in our previous study) were compared. A chi-square test was applied to determine whether significant color association(s) existed for each concept.ResultsOur results revealed that each concept was significantly associated with at least one color (p < 0.01). The Hong Kong white-collar workers and managerial staff in mainland China both expressed the same color associations for 14 of the tested concepts, and differed only over which colors were associated with “strong,” and “radiation hazard.” These findings generally suggest that populations with similar occupations can have similar color perceptions. However, the students and the other three employee groups reported different color associations with the concepts “normal,” “off” and “potential hazard.”ConclusionsOccupational background is associated with how color is interpreted for its connoted meaning. One should consider occupational background carefully when choosing colors in product designs, especially for safety.  相似文献   

17.
ABSTRACT

This paper provides a taxonomy of secure software systems engineering (SSE) by surveying and organizing relevant SSE research and presents current trends in SSE, on-going challenges, and models for reasoning about threats and vulnerabilities. Several challenging questions related to risk assessment/mitigation (e.g., “what is the likelihood of attack”) as well as practical questions (e.g., “where do vulnerabilities originate” and “how can vulnerabilities be prevented”) are addressed.  相似文献   

18.
Abstract

The relationship between systems and their users is an important aspect in the study of general systems. In order to enhance their functionality, systems should be adaptive to different types of human users. In this paper, we discuss how to apply inductive reasoning techniques to achieve this goal and we use knowledge-based systems as an example to illustrate the approach. A conceptual model is described. Our approach is interpreted from the perspective of the General System Problem Solving framework  相似文献   

19.
Most previous creativity support systems sustain short-term temporal thinking that is separate from users’ daily activities. In this paper, we propose a system to support long-term idea-generation in daily life. The system consists of two subsystems: a management system for problems and ideas calledIdeaManager, and a personal information storage system callediBox. When information is registered in iBox, it searches related problems and ideas in IdeaManager and presents the results. Users then try to generate or enhance ideas for automatically retrieved problems or ideas using registered information as the hint. To evaluate and enhance our system, we carried out a six-week experiment. Based on the results, we give some proposals for future systems. Hirohito Shibata: He received his B.Sci. degree from Kanazawa University in 1992 and his M.Sci. degree from Osaka University in 1994. He was a software engineer at Fuji Xerox Co., Ld from 1994 to 2000. He is currently a doctoral student with Department of Advanced Interdisciplinary Studies, University of Tokyo. His research interests include human-computer interaction and computer support for creative activities. He is a member of Japanese Society for Artificial Intelligence (JSAI) and Japanese Cognitive Science Society (JCSS). Koichi Hori, D.Eng.: He received his B.Eng, M.Eng, and Dr.Eng. degrees in electronic engineering from the University of Tokyo in 1979, 1981, and 1984, respectively. In 1984, he joined National Institute of Japanese Literature, where he developed AI systems for literature studies. Since 1988, he has been with the University of Tokyo. He is currently a professor with Department of Advanced Interdisciplinary Studies, the University of Tokyo. From September 1989 to January 1990, he also held a visiting position at University of Compiegne, France. His current research interests include AI technology for supporting human creative activities, cognitive engineering and Intelligent CAD systems. He is a member of IEEE, ACM, IEICE, IPS J, JSAI, JSSST, and JCSS.  相似文献   

20.
BackgroundWhen studying work related musculoskeletal disorders (WMSDs), various factors (mechanical, organizational, psychophysical, individual) and their interrelationships have been considered to be important in general models for epidemiologic surveys and risk assessment and management. Hence the need for a “holistic” approach towards MSD prevention. On the other hand, considering the widespread presence of these factors and of WMSDs in many work places located in both developed and developing countries, there is a strong demand from OSH agencies and operators for “simple” risk assessment and management tools that can also be used by non-experts.ObjectivesThis paper is one of the main contributions towards a WHO/IEA project for developing a “Toolkit for WMSD prevention” by the TC on MSD of the IEA. The paper focuses on selecting tools at different levels for hazard identification, risk estimation and management. The proposals were primarily developed in this context but they also derive from other converging issues such as the ISO TR 12295 – published in 2014.Methods and criteriaProposals are based on two essential criteria: 1) adoption of a step-by-step approach starting with basic tools and moving to more complex tools only when necessary; 2) factoring in complexity and the presence of multiple influencing factors at every step (although with different degrees of in-depth analysis).ResultsThe proposals include: Step one: identification of preliminary occupational hazards and priority setting via “key-enter” questions (at this step, all potential hazards affecting WMSDs should be considered). Step two: identification of risk factors for WMSDs, consisting of a “quick assessment” and substantially aimed at identifying three possible conditions: acceptable/no consequences; critical/redesign urgently needed; more detailed analysis required. Step three: recognized tools for estimating risk (of WMSDs) are used depending on the outcomes of step two. Examples of such tools include “adaptations” of the Revised NIOSH Lifting Equation, Liberty Mutual Psychophysical Tables, OCRA Checklist, etc. These tools should adequately cover most of the influencing factors.Relevance to industryThe use of a step-by-step approach and validated risk estimation tools, in accordance with international standards, makes it possible to tackle the challenge of simplifying complexity in the assessment of biomechanical overload conditions and in the prevention of WMSDs in enterprises of all sizes, small businesses, agriculture, and in developing countries.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号