首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
随着电子商务的发展,应用需求的复杂化,数字签名技术得到广泛应用,该文介绍了公开密钥加密体制,数字签名技术原理和功能,以及多重数字签名技术,并探讨多重数字签名技术在办公自动化系统中的应用的安全解决方案.  相似文献   

2.
Current K-12 students are considered digital learners because technology is as pervasive in their academic world as in their personal lives. Technology enthusiasts argue that these learners are the “digital natives” having sophisticated technology knowledge and skills that can be potentially harnessed for better learning engagement inside the classroom. This phenomenological study investigates how some current high school students as the digital learners engage with technology at home and school; and how these two types of engagement overlap in their learning inside the classroom. Data were gathered from phenomenological three series in-depth interviews with five participants and also field observation. Findings show that the overlap between the personal and educational digital engagement(s) of these students was not necessarily positive as portrayed by the prevalent discourses of technology enthusiasts. The overlapping had mixed roles – facilitative as well as obstructive. Pedagogical and future research implications are discussed.  相似文献   

3.
数字摄影测量技术与数字地球空间数据框架的建设   总被引:2,自引:1,他引:2  
数字地球的构建与数字摄影测量、遥感、全球定位系统、地理信息系统、计算机、宽带网络、多维虚拟现实等新技术有着紧密的联系,数字摄影测量已成为构建数字地球提供空间数据框架的一种不可或缺的技术手段。基于数字地球的发展需求,结合数字摄影测量技术优势和最新发展,着重阐述了数字摄影测量在数字地球空间框架的建设中的作用。随着数字地球发展的深化,数字摄影测量将显示着愈来愈重要的作用。
  相似文献   

4.
以数字合成技术为基础。采用数字调幅、数字变频、数字移相技术,提出了一种高精度正弦波发生电路的实现方法。可实现全范围的高精度调幅调频调相。  相似文献   

5.
We show that there are only two topologies in and five topologies in whose connected sets are connected in the intuitive sense. Both topologies for are well known (e.g., one is presented in D. Marcus, F. Wyse et al., Amer. Math. Monthly 77 (1979) 1119, and the second in E. Khalimsky et al., Topology and its Applications 36 (1990) 1) and found applications in computer graphics and computer vision (e.g., A. Rosenfeld, Amer. Math. Monthly 77 (1979) pp. 621, and T.Y. Kong et al., Amer. Math. Monthly 98 (1991) 901). Two of the five topologies for are products of the topologies known from and . The remaining three topologies for are also generated from the two topologies for , however, they are not product topologies.  相似文献   

6.
This paper presents OpenDLib, a digital library infrastructure that provides capabilities for new-generation digital libraries. In particular, the paper introduces a document model that can be used to represent a wide variety of document types and describes the open architectural infrastructure that allows for the expansion of the digital library through the dynamic plugin of new services.  相似文献   

7.
在VC++中用CryptoAPI保证安全数据通信   总被引:2,自引:2,他引:0  
Microsoft的加密应用程序接口CryptoAPI使开发人员可以在应用程序中加入强大的保证数据通信安全性的功能。本文研究了在VC 应用程序中利用CryptoAPI实现数字签名和验证、数据加密和解密等安全数据通信的关键技术,并给出了实现的方法。  相似文献   

8.
PKI框架下的SET购物流程   总被引:2,自引:0,他引:2  
随着因特网、计算机技术、信息技术的迅速发展 ,电子商务已深入到社会生活的各个方面。基于卡业务的SET协议 ,已经成为电子商务中网上购物的一种主要模式 ,它通过采用基于PKI的数字证书技术 ,实现了电子商务中信息的机密性、真实性、完整性和不可否认性  相似文献   

9.
数字图像认证技术   总被引:7,自引:0,他引:7  
1 引言在当今信息时代,以Internet为先锋的网络化浪潮正日益将人们的工作、生活和娱乐涌入全球一体化的数字世界。快捷廉价的数字传输手段为人们获取和交流信息带来了极大便利,然而,网络信息的全透明性和易操作性,却又使得恶意攻击者可以轻易地对其进行篡改或伪造,由此可能造成极为严  相似文献   

10.
Digital limitations (or, conversely, digital capabilities) are a new way to frame the digital divide discourse in three dimensions: access, cognition and behavior. Digital limitations address an individual's barriers to properly access the information and communication technologies (ICTs), as well as his/her cognitive disabilities and negative behaviors towards ICT use effectiveness. In a survey with 174 undergraduate students in a traditional state university in underdeveloped Northeastern Brazil who compulsorily use an institutional ICT-based academic system, we investigated the factorial structure and the relationship of two constructs that pertain to the cognitive dimension of digital limitations – computer self-efficacy and anxiety. Our findings address the negative correlation between the two constructs and the unanticipated proposition that both low and high levels of self-efficacy and anxiety do not signal per se the presence of cognitive digital limitations or capabilities.  相似文献   

11.
陆治国  翟阳 《计算机仿真》2007,24(4):235-239
随着数字控制技术的不断发展,在电源变换领域涌现出许多全新的控制策略来弥补模拟控制的不足.文中采用改进的预测控制算法,不仅解决了数字控制系统难于实现高频化的问题,而且消除了输出电压纹波对控制系统性能的影响,使得系统的功率因数得到了进一步改善,采用这种控制策略,还可令系统的输出电压基本不受到负载变化的影响,输出电压的稳定性更好.使用Matlab/simulink仿真软件对整体控制系统进行了数字仿真实验,并取得了比较理想的控制效果.  相似文献   

12.
数字水印技术是解决数字作品版权保护问题的一个有力的武器。本文结合密码学理论和技术,提出了一种结合数字水印和数字签名的安全保障机制。结合数字签名技术把原始图像所有者有关信息通过认证中心进行认证签名,从而能够保证了水印的安全性。  相似文献   

13.
本文简要回顾了数字地球基本理论和基本信息集成技术,讨论了在数字地球和信息集成技术基础上实现数字矿区的方法,并讨论了数字矿区的结构模型。  相似文献   

14.
数字直扩接收机中同步环路设计与仿真   总被引:2,自引:0,他引:2  
尹燕  赵明生  蔡凡 《计算机仿真》2006,23(11):325-327,331
同步是扩频通信系统中的一个重要问题。该文详细介绍了直接序列扩频(DSSS)通信系统中,数字科斯塔斯(Costas)环、数字延迟锁定环(DLL)的工作原理和环路中二阶环路滤波器的设计方法,并根据该原理提出了一种新的码环实现方案。使用Matlab对数字直扩接收机进行了仿真。不同环路滤波器参数下环路捕获性能的仿真结果及系统解调误码率证明了该环路滤波器在Costas环和DLL环中的正确性和实用性。其较好地解决了直扩系统中载波和伪码精确同步的问题。该文所设计的数字直扩接收机可有效地应用于CDMA及GPS等系统之中。  相似文献   

15.
In many three-dimensional imaging applications, the three-dimensional space is represented by an array of cubical volume elements (voxels) and a subset of the voxels is specified by some property. Objects in the scene are then recognised by being components of the specified set and individual boundaries are recognised as sets of voxel faces separating objects from components in the complement of the specified set. This paper deals with the problem of algorithmic tracking of such a boundary specified by one of the voxel faces lying in it. The paper is expository in that all ideas are carefully motivated and introduced. Its original contribution is the investigation of the question of whether the use of a queue (of loose ends in the tracking process which are to be picked up again to complete the tracking) is necessary for an algorithmic tracker of boundaries in three-dimensional space. Such a queue is not needed for two-dimensional boundary tracking, but published three-dimensional boundary trackers all make use of such a thing. We prove that this is not accidental: under some mild assumptions, a boundary tracker without a queue will fail its task on some three-dimensional boundaries.  相似文献   

16.
基于数字水印技术的安全电子合同系统   总被引:1,自引:0,他引:1  
本文就电子合同的易仿造和易篡改提出了一种新的解决方案——采用数字水印技术来保证电子合同的完整性和不可否认性。本方案以在某企业的具体应用为背景实现了一套对电子合同进行散列、数字签名,然后通过水印技术将信息隐藏入合同的安全电子合同系统。  相似文献   

17.
基于彩色静止数字图像的信息隐藏技术研究   总被引:16,自引:0,他引:16  
数字图像的信息隐蔽技术是数字图像处理领域中最具挑战性、最为活跃的研究课题之一。本文概述了数字图像的信息隐蔽技术,并给出了一个新的基于彩色静止数字图像的信息隐蔽算法。  相似文献   

18.
The Florida Digital Archive is a long-term digital preservation repository for the use of the libraries of the public universities of Florida. It is managed by the Florida Center for Library Automation (FCLA) and based on Dark Archive in the Sunshine State (DAITSS), repository software developed by FCLA with the aid of grant funding from the Institute of Museum and Library Services (IMLS). DAITSS is designed to implement active preservation strategies based on format transformations including forward migration, normalization, and localization. As a case study, the Florida Digital Archive and DAITSS show that active preservation strategies can be incorporated into repository applications from the start, and that doing so affects all aspects of application design. The Florida Digital Archive has been in production since November 2005. The DAITSS application is nearing completion and will be released as open source software in 2006.  相似文献   

19.
电子邮件的安全措施与实现   总被引:1,自引:0,他引:1  
阮耀平  许晓东 《计算机工程》1999,25(10):38-39,74
首先分析了电子邮件所面临的安全威胁,然后介绍了保证电子邮件 加密和数字签名的实现原理和过程。并结合OutlookExpress中提高的加密与数字签名功能。简单介绍了安全电子邮件的实现过程。  相似文献   

20.
虚拟现实技术及其在数字流域中的应用   总被引:3,自引:1,他引:3  
任波  王乘  李利军 《计算机仿真》2003,20(4):60-62,15
该文介绍了面向21世纪的数字化工程中的数字流域、虚拟现实等重要概念。研究了虚拟现实技术应用于数字流域研发的相关技术:提高图形系统效率的多种细节层次的视景表示、多层次数据管理与视景调度技术,优化界面的多维人机交互技术,流域模型构建以及3S数据在数字流域中的应用模型。讨论了数字流域采用虚拟现实技术在三维漫游,仿真结果叠加,抗洪减灾,开发旅游资源等方面的重要应用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号