Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (...Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (GML), Scalable Vector Graphics (SVG) and Web Feature Service (WFS) Implementation Specifications developed by the OpenGIS Consortium (OGC), a strategy of WebGIS is proposed. The GML is used as a coding and data transportation mechanism to realize interoperability, the SVG to display GML data on the Web and the WFS as a data query mechanism to access and retrieve data at the feature level in real time on the Web. A case study shows that the combination mentioned above has enormous potential to achieve interoperability while not requiring considerable changes to existing legacy data. Original data formats need not be changed and could still be retrieved using WFS and transformed into GML in real time. SVG can oroduce suoerior ouality vector maps on a Web browser.展开更多
Recent advances in computer with geographic information system(GIS) technologies have allowed modelers to develop physics-based models for modeling soil erosion processes in time and space.However, it has been widely ...Recent advances in computer with geographic information system(GIS) technologies have allowed modelers to develop physics-based models for modeling soil erosion processes in time and space.However, it has been widely recognized that the effect of uncertainties on model predictions may be more significant when modelers apply such models for their own modeling purposes.Sources of uncertainty involved in modeling include data, model structural, and parameter uncertainty.To deal with the uncertain parameters of a catchment-scale soil erosion model(CSEM) and assess simulation uncertainties in soil erosion, particle filtering modeling(PF) is introduced in the CSEM.The proposed method, CSEM-PF, estimates parameters of non-linear and non-Gaussian systems, such as a physics-based soil erosion model by assimilating observation data such as discharge and sediment discharge sequences at outlets.PF provides timevarying feasible parameter sets as well as uncertainty bounds of outputs while traditional automatic calibration techniques result in a time-invariant global optimal parameter set.CSEM-PF was applied to a small mountainous catchment of the Yongdamdam in Korea for soil erosion modeling and uncertainty assessment for three historical typhoon events.Finally, the most optimal parameter sets and uncertainty bounds of simulation of both discharge and sediment discharge at each time step of the study events are provided.展开更多
A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov...A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system.展开更多
This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student in...This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.展开更多
In financial investment planning,a large number of components that interact in varying and complexways are involved.This leads to complex behavior that is difficult to understand,predict and manage.Asingle intelligent...In financial investment planning,a large number of components that interact in varying and complexways are involved.This leads to complex behavior that is difficult to understand,predict and manage.Asingle intelligent technique can not solve the complicated and elaborate investment planning problems.Itis necessary to study those problems synthetically by combining the multiple intelligent techniques.Weemployed fussy algorithms,genetic algorithms,etc.to solve complicated financial portfolio managementin this paper.We analyse and design an agent-based hybrid intelligent system by following the methodolo-gy for constructing agent-based hybrid intelligent system(MAHIS).The system starts with the financialrisk tolerance evaluation based on fussy algorithms.Asset allocation,portfolio selections,interest predic-tions,and ordered weighted averaging can be conducted by using hybrid intelligent techniques.The plan-ning agent in the system can easily access all the intelligent processing agents,including the agents of fi-nancial risk tolerance assessment,asset allocation,portfolio selection,interest prediction,and decisionaggregation.Overall system robustness is facilitated.展开更多
The paper describes information technologies (IT) role in organization---especially its influence on organizational structure. Article concerns the importance of analyzing IT acceptance, while describing IT in organ...The paper describes information technologies (IT) role in organization---especially its influence on organizational structure. Article concerns the importance of analyzing IT acceptance, while describing IT in organization and points out that inadequate variable choice may influence validity of IT analysis. First part of the article describes both variables analyzed in presented research--IT dissemination and IT acceptance. It also presents how in theory IT can influence organizational structure. The main part of the article describes empirical studies conducted in order to verify if the influence of IT on the organizational structure exists. First, the main goal and methodology of the empirical studies are presented. Variables used to assess IT and organizational structure in organizations are discussed. Then, there is a description of research results--statistical correlation between analyzed variables and regression models is shown. Conclusion of the article is that IT can influence organizational structure, but the most important factor ensuring this influence is the actual use of IT by employees of the organization--their access to IT is not enough.展开更多
基金Project 2006A018 supported by the Youth Scientific Research Foundation of China University of Mining & Technology
文摘Our study deals with two major issues impacting current WebGIS development: interoperability of heterogeneous data and visualization of vector data on the Web. By using the combination of Geography Markup Language (GML), Scalable Vector Graphics (SVG) and Web Feature Service (WFS) Implementation Specifications developed by the OpenGIS Consortium (OGC), a strategy of WebGIS is proposed. The GML is used as a coding and data transportation mechanism to realize interoperability, the SVG to display GML data on the Web and the WFS as a data query mechanism to access and retrieve data at the feature level in real time on the Web. A case study shows that the combination mentioned above has enormous potential to achieve interoperability while not requiring considerable changes to existing legacy data. Original data formats need not be changed and could still be retrieved using WFS and transformed into GML in real time. SVG can oroduce suoerior ouality vector maps on a Web browser.
基金supported by Korea Ministry of Environment(MOE)as"GAIA Program2014000540005"
文摘Recent advances in computer with geographic information system(GIS) technologies have allowed modelers to develop physics-based models for modeling soil erosion processes in time and space.However, it has been widely recognized that the effect of uncertainties on model predictions may be more significant when modelers apply such models for their own modeling purposes.Sources of uncertainty involved in modeling include data, model structural, and parameter uncertainty.To deal with the uncertain parameters of a catchment-scale soil erosion model(CSEM) and assess simulation uncertainties in soil erosion, particle filtering modeling(PF) is introduced in the CSEM.The proposed method, CSEM-PF, estimates parameters of non-linear and non-Gaussian systems, such as a physics-based soil erosion model by assimilating observation data such as discharge and sediment discharge sequences at outlets.PF provides timevarying feasible parameter sets as well as uncertainty bounds of outputs while traditional automatic calibration techniques result in a time-invariant global optimal parameter set.CSEM-PF was applied to a small mountainous catchment of the Yongdamdam in Korea for soil erosion modeling and uncertainty assessment for three historical typhoon events.Finally, the most optimal parameter sets and uncertainty bounds of simulation of both discharge and sediment discharge at each time step of the study events are provided.
基金the National Natural Science Foundation of China (No. 60773049)the Natural Science Foundation of Jiangsu Province (No. BK2007086)+1 种基金the Fundamental Research Project of the Natural Science in Colleges of Jiangsu Province (No. 07KJB520016)the Person with Ability Project of Jiangsu University (No. 07JDG053), China
文摘A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system.
文摘This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.
基金the Overseas Scholar Research Foundation of Heilongjiang,China(No.LC0609)
文摘In financial investment planning,a large number of components that interact in varying and complexways are involved.This leads to complex behavior that is difficult to understand,predict and manage.Asingle intelligent technique can not solve the complicated and elaborate investment planning problems.Itis necessary to study those problems synthetically by combining the multiple intelligent techniques.Weemployed fussy algorithms,genetic algorithms,etc.to solve complicated financial portfolio managementin this paper.We analyse and design an agent-based hybrid intelligent system by following the methodolo-gy for constructing agent-based hybrid intelligent system(MAHIS).The system starts with the financialrisk tolerance evaluation based on fussy algorithms.Asset allocation,portfolio selections,interest predic-tions,and ordered weighted averaging can be conducted by using hybrid intelligent techniques.The plan-ning agent in the system can easily access all the intelligent processing agents,including the agents of fi-nancial risk tolerance assessment,asset allocation,portfolio selection,interest prediction,and decisionaggregation.Overall system robustness is facilitated.
文摘The paper describes information technologies (IT) role in organization---especially its influence on organizational structure. Article concerns the importance of analyzing IT acceptance, while describing IT in organization and points out that inadequate variable choice may influence validity of IT analysis. First part of the article describes both variables analyzed in presented research--IT dissemination and IT acceptance. It also presents how in theory IT can influence organizational structure. The main part of the article describes empirical studies conducted in order to verify if the influence of IT on the organizational structure exists. First, the main goal and methodology of the empirical studies are presented. Variables used to assess IT and organizational structure in organizations are discussed. Then, there is a description of research results--statistical correlation between analyzed variables and regression models is shown. Conclusion of the article is that IT can influence organizational structure, but the most important factor ensuring this influence is the actual use of IT by employees of the organization--their access to IT is not enough.