首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
宋人唐诗观的嬗变与宋诗的发展方面的研究,大部分成就的共享方式是传统的方式。为了更好地对为宋人唐诗观的资料库进行信息化和数字化管理,文中提出了基于B/S架构的资源共享系统的实现方案,为研究者提供个性化信息服务,同时也是对古代文学学科的计算机辅助研究的前瞻性探索。系统分为表示层,业务处理层,数据持久层和数据库层,各个层次具备明确的界限和分工,在处理程序上都有明确的责任,不与其他层混合,具有良好的可扩展性和可维护性。  相似文献   

2.
(k,n)门限秘密共享方案是在n个参与者之间共享秘密K的方法。广义自缩序列是一类基于LFSR的非常规钟控序列,具有良好的均衡性,各序列之间具有良好的相关性,生成速度快、结构简捷。将广义自缩序列引入秘密共享而提出的新方案具有能简捷更新子秘密,有效阻止秘密的暴露的特性,并能防止参与者之间的相互欺骗及合法参与者伪造子秘密。  相似文献   

3.
Bureaucratic control by formal rules and procedures has its limitations as a tool of risk management. Therefore, the central thought developed in this paper is that the content of a company's risk management, as a set of formal procedures, should be congruent with the tacit knowledge and informal rules present in that company. Next to the type of rules, the ways in which rules are handled – the regulation regime – is of importance. In this paper, data collected is presented that enables a comparative analysis of those who work in high-risk situations and those who do not. From a multivariate regression-analysis it is concluded that high-risk workers’ satisfaction with formal rules is strongly dependent on the ways in which these rules are handled. Such a regulation regime is characterized by workers' participation in the formulation of formal rules; by consultation with workers by managers as to the former’s experiences with the rules involved; and by the degree of direct control. The analysis shows that top-down risk management, itself, creates risks by its hierarchical character. It also shows that an approach which takes into account the perceptions of workers is more promising.  相似文献   

4.
Arctic coastal polynyas, defined here as persistent openings in the winter sea ice pack, are significant areas for ocean–atmosphere heat exchange, high winter sea ice production with resulting brine rejection and the dependence of local ecosystems. It is therefore critical to accurately quantify polynya dynamics to understand their spatial and temporal variability, particularly in the context of recent dramatic Arctic sea ice declines. In this study, the so-called erosion algorithm (a greyscale morphology image-processing technique) is applied to satellite-derived sea ice concentrations in the northern Bering Sea to investigate polynya dynamics throughout this region. Greyscale morphology allows for the estimation of sea ice extent with a defined error tolerance through the removal of regions with low sea ice concentrations in the marginal ice zone. Furthermore, since polynyas are the primary source of water within the sea ice pack, the presence of water here can therefore be utilized to define the areal extent of polynyas. We utilized AMSR-E (Advanced Microwave Scanning Radiometer-EOS) sea ice concentrations during January–April from 2003 to 2008 in the northern Bering Sea to extract daily time series of water area within polynyas by a water integration method after data are preprocessed using greyscale morphology techniques. These results compare well with those calculated by more traditional methods utilizing sea ice concentration thresholds and show the great utility of greyscale morphology techniques as a preprocessing method (which eliminates artificial determination of polynya areal extents and enables automation of the overall image-processing routine). In addition, based on the results of our algorithms we investigated the potential driving forces (e.g. offshore wind velocity) of polynya development in the northern Bering Sea as well as calculate the spatial and interannual variability of heat fluxes across these water surfaces owing to polynya formation.  相似文献   

5.

In this paper, two new practical attacks on some secret sharing-based data outsourcing schemes are first introduced, and several other security and performance issues with the existing schemes are also explored. The existing and new attacks exploit the information about the share range boundaries or the correspondences between the secret values and shares. A range expansion technique is then proposed to thwart one of the attacks. It expands the ranges in every range predicate in the submitted queries in order to hide the share range boundaries from any query observer. Next, a mapping method is proposed to thwart the other attacks. It maps each secret value to a mapping value using a secret one-to-many mapping with a finite set of linear mapping rules so that the tuples of shares are generated from the mapping values rather than directly from the secret values. The proposed mapping method works as an additional layer of security and addresses any attack based on the correspondences between the secret values and shares. At the same time, it preserves the homomorphism property of secret sharing. Finally, a new secure data outsourcing scheme is elaborated on secret sharing, the proposed mapping method, and the proposed range expansion technique. The proposed scheme is resistant to various attacks and also some inferences. It supports the fully server-side or a partially server-side query execution of most types of queries. The experimental results confirm that the proposed scheme is quite practical and efficient.

  相似文献   

6.
We present multitemporal Bayesian classification of Moderate Resolution Imaging Spectroradiometer (MODIS) mosaic data over the Caspian Sea during winter. The multitemporal analysis methods used were cross-correlation and motion detection based on phase correlation. Our motion estimation algorithm estimates the motion of a target between two adjacent images over the same areas based on finding the maximum correlation with respect to location shift within a given area around each location. The motion detection algorithm also provides a quality estimate for the detection. Because sea ice, unlike clouds, is typically rigid and its motion is significantly slower than the motion and metamorphosis of clouds, drifting sea ice can be distinguished from clouds. Over land and static sea ice, detection of clouds, is easier because the cross-correlation is typically higher for land and ice than for clouds. Also, locating clouds over open water is straightforward because clouds appear significantly brighter than open water. The results show that multitemporal features can be used to distinguish between clouds and clear sky.  相似文献   

7.
研究了以免疫算法为工具对信息系统进行规则提取。在免疫算法中结合了小生境技术的共享机制,利用了共享机制中对资源的共享和竞争原理,体现了规则之间竞争与互补的关系。针对普通可信度度量方法的不足,提出了柔性可信度的概念,能够获得更好的规则。实验证明,本文采用的方法不仅在处理无冲突无噪声数据时可以得到好的结果,而且在处理噪声数据、决策类不等量划分的数据中也有很好的表现。  相似文献   

8.
(k,n)可视加密算法是一种重要的信息隐藏算法。应用Shamir秘密分享的概念,将一幅二进制秘密图像隐藏在n幅分享图像中,通过在分享过程中增加随机性控制,保证生成的分享图像是接近噪声图像的无意义图像。从n幅无意义分享图像中,任意选取k幅分享图像,使用拉格朗日插值可提取秘密图像。该算法应用Shamir秘密分享来实现(k,n)可视加密,不需要码书,不会造成无限制的像素扩展。实验结果显示,该算法能实现(k,n)可视加密,提取秘密图像的提取正确率能保证100%。  相似文献   

9.
The insurance claim adjusting process – the process by which an insurance company decides how much it will pay on a claim – is moving from a pen-and-paper task to a computer automated system. Computerized claims adjusting software is very efficient, but is not very transparent, and this mystifying process has created new legal concerns among plaintiffs' lawyers and claims adjusters. This article demonstrates how traditional legal claims can be strengthened by this move to a computerized regime. Rather than trying to find inventive new claims or procedures for bringing their claims, potential plaintiffs should look to the ways in which an automated system can improve their claims for bad faith insurance adjusting or unfair trade practices. Although many insurance companies have begun using the same adjusting software, plaintiffs' claims are not appropriate for an antitrust action and cannot be brought as a class action. Although technology has made this seem like a modern problem, this article finds that established law is well suited to handle plaintiffs' complaints.  相似文献   

10.
Designing efficient and fair solutions for dividing the network resources in a distributed manner among self-interested multimedia users is recently becoming an important research topic because heterogeneous and high bandwidth multimedia applications (users), having different quality-of-service requirements, are sharing the same network. Suitable resource negotiation solutions need to explicitly consider the amount of information exchanged among the users and the computational complexity incurred by the users. In this paper, we propose decentralized solutions for resource negotiation, where multiple autonomous users self-organize into a coalition which shares the same network resources and negotiate the division of these resources by exchanging information about their requirements. We then discuss various resource sharing strategies that the users can deploy based on their exchanged information. Several of these strategies are designed to explicitly consider the utility (i.e., video quality) impact of multimedia applications. In order to quantify the utility benefit derived by exchanging different information, we define a new metric, which we refer to as the value of information. We quantify through simulations the improvements that can be achieved when various information is exchanged between users, and discuss the required complexity at the user side involved in implementing the various resource negotiation strategies.   相似文献   

11.
This paper presents a coupled economic–ecological model that integrates a catchment model with a marine model and incorporates economic data to analyse the long-term economic and ecological consequences of nutrient abatement in the Baltic Sea. The spatially explicit model describes dynamics of soil phosphorus in arable land, developments of nutrient concentrations and phytoplankton biomass in the sea basins, and inter-annual variation in nutrient loads and biophysical processes. The performance of the model is demonstrated by computing the least-cost solution to reach the good environmental state of the sea – as implied by the Baltic Sea Action Plan – within a time span of 40 years. The total cost of achieving this target is 1487 M€ annually. Spatially optimal allocation of load reductions differs from the load reduction targets of the Baltic Sea Action Plan, and focuses more on the control of phosphorus loads.  相似文献   

12.
The Internet has become an indispensable part of Americans’ everyday lives. At the same time, its ease of data collection and storage has put the notion of personal privacy in grave danger. The FTC is finally gearing up to face this danger and opened discussions on how Do Not Track regulations should operate. This article first explores the landscape of the current tracking mechanisms and surveys what Americans actually think of these practices and how much they understand about their legal protections. Second, it proposes a possible solution, partially grounded in a comparison with the popular and proven Do Not Call regulations. Specifically, I parse the problem into three main types of behavior – first-party tracking, third-party tracking, and the selling/sharing of collected data – and suggest a different legal rule for each. Selling/sharing of data poses the greatest threat to personal privacy and therefore, should be governed by an opt-in regime. Third-party tracking can be placed under a browser level opt-out control. This proposal leaves first-party tracking as is, though with some caveats for the direction of potential future regulations. Finally, the article considers a cost-benefit analysis of imposing limits on tracking and offers three responses to the economic-based criticisms of such limits. One, that the choice between free Internet and personal privacy is a false one. Two, that customization and not personalization is a much better answer for both consumer and industry. And three, that there is enough evidence to suggest that the purported benefits are specious at best, and consumers deserve the ability to dispute the cost-benefit balance currently struck by the industry at their expense.  相似文献   

13.
Numerical modelling is a tool to investigate the controls on the formation of the stratigraphic record on geological timescales. The model presented in this paper (DELTASIM) uses a process-response approach that simulates the stratigraphy of fluvial-dominated deltaic systems in two dimensions, based on simplified diffusion rules of cross-shore sedimentation. Net sedimentation is calculated for individual grain-size classes as the sum of independent erosion and deposition functions, enabling simulations of fluvio-deltaic stratigraphy besides clinoform evolution. Critical sediment transport parameters are validated using synthetic data from a process-based morphodynamic model, DELFT3D.Generic experiments show the effect of changes in sea level, sediment supply, offshore gradient and sediment size distribution. These experiments show that the model is fully capable of reproducing classic concepts of delta development on geological timescale. Such experiments allow students a possibility to evaluate the controls on the formation of the stratigraphic record. DELTASIM has been successfully applied to improve the understanding of the sedimentary evolution of a real-world fluvial-dominated delta in the Caspian Sea.Additional functionality encompasses a stochastic discharge model that can be used as input to simulate series of scenarios of delta development using the model's rapid run time to our advantage. This functionality enables us to present probabilistic output of longitudinal stratigraphic sections as an alternative to the deterministic predictions often made by stratigraphic models. The characteristics of the model; simplicity, speed and compatibility of the output to conceptual sequence stratigraphic models make DELTASIM suitable as a teaching tool.  相似文献   

14.
由于会计资源共享管理风险评估值不是全局最优值,导致评估结果不准确,延长了评估时间.本文提出一种基于遗传算法的会计资源共享管理风险评估模型.通过选取会计资源共享管理风险评估指标,采用德尔菲法确定风险评估指标权重,构建会计资源共享管理风险评估量化模型.以此为依据,采用遗传算法计算参数最优解,制定风险程度评估规则判定风险程度...  相似文献   

15.
Rules often contain terms that are ambiguous, poorly defined or not defined at all. In order to interpret and apply rules containing such terms, appeal must be made to their previous constructions, as in the interpretation of legal statutes through relevant legal cases. We describe a system CABARET (CAse-BAsed REasoning Tool) that provides a domain-independent shell that integrates reasoning with rules and reasoning with previous cases in order to apply rules containing ill-defined terms. The integration of these two reasoning paradigms is performed via a collection of control heuristics, which suggest how to interleave case-based methods and rule-based methods to construct an argument to support a particular interpretation. CABARET is currently instantiated with cases and rules from an area of income tax law, the so-called “home office deduction”. An example of CABARET's processing of an actual tax case is provided in some detail. The advantages of CABARET's hybrid approach to interpretation stem from the synergy derived from interleaving case-based and rule-based tasks.  相似文献   

16.
Knowledge has replaced capital and energy as an important resource to enable a company to gain a competitive advantage. Knowledge sharing is the core content of knowledge management and the source of knowledge innovation. As an important resource of the company, the customer plays a vital role in the process of knowledge sharing. Therefore, research on the mechanism of customers' participation in knowledge sharing is especially important. In this paper, from the perspective of knowledge sharing between customers and enterprises, a customer participation model of a knowledge‐sharing mechanism is built based on three aspects: subjective influencing factors of knowledge sharing, objective influencing factors of knowledge sharing, and environmental influencing factors of knowledge sharing. On the basis of 222 valid questionnaires, the theoretical model was verified by using the experimental data analysed by the SPSS and AMOS software. The research shows the following: with respect to the objective influencing factors of knowledge sharing, the timeliness, scarcity, complexity, and economy of knowledge will affect the sharing cost and the expected return of knowledge sharing. With respect to the subjective factors, the sharing ability, the sharing cost, and customer loyalty will affect the knowledge‐sharing behaviour by influencing the knowledge‐sharing willingness. With respect to the environmental influencing factors, technical support and incentive mechanisms can indirectly affect knowledge‐sharing behaviour. In addition, on the one hand, customer loyalty can enhance the knowledge‐sharing ability and sharing willingness. On the other hand, knowledge‐sharing behaviour can enhance customer loyalty and thus form a virtuous cycle.  相似文献   

17.
所有者为中心的网格文件共享研究   总被引:5,自引:1,他引:5  
为满足网格环境下的文件访问和共享需求,提出一种所有者为中心的网格文件共享机制,这种机制的核心思想是资源所有权的分割,通过把资源所有权分割为物理所有权和逻辑所有权,资源管理任务被安全地分担到多个资源所有者;全局用户标识、紧密绑定和一致性授权使所有者可以对逻辑资源的访问和授权传递实现完全自主的控制,基于这种机制,实现了网格文件系统原型VegaFS,VegaFS的用户可以不受管理域信息特性的限制,一致性地访问分布在不同管理域的文件资源。  相似文献   

18.
资源指派是工作流管理系统的一项重要功能,它在运行期将资源模型和过程模型联系起来。对资源指派规则的表达机制进行了分析,并在此基础上研究开发了一个基于指派规则和资源管理服务的资源指派系统,它具有良好的可扩充性,并支持资源模型的共享。  相似文献   

19.
首先提出了一种多秘密共享方案,该方案共享t个多重秘密,需要计算t个联立方程。然后基于多秘密共享的思想,提出了一种新的(t,n)门限可视密码方案。该方案把一幅秘密图像分割成t幅子秘密图像,每幅子秘密图像是原始图像的1/t;然后再由t幅子秘密图像计算出n幅共享图像,秘密送给n个参与者,其中每个共享图像与子秘密图像同样大小。使得任意t个或更多的参与者合作能够恢复原始秘密图像,而任意少于t个参与者却得不到有关原始图像的任何信息。另外,恢复的图像和秘密图像完全一样,没有任何失真。新方案安全、有效,是一种完备的(t,n)门限方案,适用于把黑白、灰度、彩色图像作为秘密进行共享。  相似文献   

20.
In this paper a data hiding method is proposed based on the combination of a secret sharing technique and a novel steganography method using integer wavelet transform. In this method in encoding phase, first a secret image is shared into n shares, using a secret sharing technique. Then, the shares and Fletcher-16 checksum of shares are hidden into n cover images using proposed wavelet based steganography method. In decoding phase, t out of n stego images are required to recover the secret image. In this phase, first t shares and their checksums are extracted from t stego images. Then, by using the Lagrange interpolation the secret image is revealed from the t shares. The proposed method is stable against serious attacks, including RS and supervisory training steganalysis methods, it has the lowest detection rate under global feature extraction classifier examination compared to the state-of-the-art techniques. Experimental results on a set of benchmarks showed that this method outperforms conventional methods in offering a high secure and robust mechanism for joining secret image sharing and steganography.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号