37 research outputs found

    Principle analysis on Flexibility of BPMN and BPEL Based Process Management Technology

    Get PDF
    从体系结构和技术标准本身分析了面向服务的,基于BPMN和BPEL的新一代流程管理技术柔性实现的原理。This paper gives the principle analysis on flexibility of the new generation of process management technology which is service-oriented,BPMN and BPEL based from the perspective of architecture and technical standard

    An asymmetric encryption algorithm for images based on matrix transformation

    Get PDF
    为提高图像数据的加解密速度与安全性,提出了一种新的非对称图像加密算法.算法原理是基于某种矩阵变换,使得原始图像每一分块像素及其频域产生置乱.具体实现上,首先利用矩阵变换产生密钥对;然后使用私钥对图像在变换域进行加密;最后接收方用公钥解密加密的图像.由于该算法是基于矩阵变换的,具有实现方便,加解密快速的特点;非对称的加密机制则使得数据加密更具安全性.同时,为了进一步提高矩阵变换的安全性,引入了第二种加密机制,将伪随机的高斯白噪声加载到变换矩阵上.分析表明,这种方法对于加密大容量数据尤其是数字图像特别有用.On the basis of a certain matrix transformation,a novel asymmetric encryption algorithm for image was proposed to scramble all the pixels and frequencies in each block of the original images.The proposed algorithm was especially useful for the encryption of large amounts of data,such as digital images,and had been implemented.A pair of keys was created through the matrix transformation.The image was encrypted by using private key in its transformation domain.The encrypted messages were decrypted by the receiver with the help of the public key.This algorithm was easily implemented and highly efficient to quickly encrypt and decrypt image messages.The asymmetric encryption mechanism made the encrypted data more secure.The second encryption schema was used to produce transformation matrix by pseudo-random Gauss white noise to farther improve the security of matrix transformation.国家高技术研究发展计划资助项目(2004AA414050);; 福建省科技重大专项基金资助项目(2004HZ02

    Performance evaluation for content-based image authentication

    Get PDF
    介绍了一个有效的图像鉴别系统设计应具备的4种特征:鲁棒性、易碎性、安全性和篡改可定位性,综述主要的图像内容hash算法以及常用的4种信息安全机制.进而分析和讨论了现有算法所存在的性能折中和安全问题,并对目前流行的图像篡改检测算法通过实验进行深入评估和分析.实验表明与hash属性相关的4种性能是互相冲突的:鲁棒性要求在小的扰动下保持良好的健壮性,易碎性则要求尽可能降低感知不相似输入的碰撞可能性,安全性则可能阻止鲁棒性的获得.从安全的角度看易碎性和安全性是非常重要的,一个hash算法应通过某种程度的性能折中来实现上述互为冲突的目标.The four features required to design an effective authentication scheme are first introduced,i.e.,robustness,fragility,security and localization.And some algorithms and frequently used security mechanisms are also reviewed.Then the performance trade-offs and related security issues among existing technology are discussed and analyzed.Finally an in-depth experimental analysis on the methods of detecting image tampering is presented.The results show that the four desirable performance-related hash properties conflict with one another: robustness demands small perturbations to keep itself,whereas fragility requires minimization of collision probabilities for perceptually distinct inputs,and perfect randomization generally would stand in the way of achieving robustness. Fragility and security are very important,and it is desired for the hash algorithm to achieve these conflicting goals to some extent by trade-offs.福建省新世纪优秀人才计划资助项

    基于资源的制造企业信息化绩效评价模型

    Get PDF
    文章从基于资源理论角度出发,结合《制造业信息化指数构成方案》建立了制造企业信息化绩效评估指标体系,并对福建省制造企业进行问卷调查、收集数据,采用具有客观性的主成分因子分析方法对数据进行多元统计分析,通过分析企业的主因子得分得出信息化建设在哪些方面与企业信息化绩效紧密相关,为制造企业信息化发展提出合理化建议

    低碳经济下碳税对供应链减排及合作策略的影响分析

    Get PDF
    在低碳经济下,以由低碳制造商、普通制造商和零售商组成的供应链作为研究对象,考虑了无碳税和有碳税两种情形,分析了分散决策和集中决策两种情况下供应链减排决策及合作策略,研究发现,在分散决策的情况下,碳税税率应该设置在一个合理分范围内,这样才能够充分调动低碳制造商减排的积极性,碳税如果设置过高,增加了企业的经营负担,并没有起到减排的作用,但是在集中决策下,碳税越高越能促进企业减排;同时还发现集中决策能够有效地提高供应链利润,因此需要设计一定约束机制来保证供应链各企业能够按照集中决策的方式来进行决策,并分析得出了合作机制。最后使用算例分析的方法分析了相关参数对供应链最优决策的影响。福建省社会科学规划项目“碳税规制下供应链减排合作策略研究”(FJ2017C014);;福建省自然科学基金项目“碳排约束下的可持续产品设计及其技术选择策略研究”(2018J05117);;山东省自然科学基金青年项目“基于产品多样性的战略顾客选择购买渠道研究”(ZR2017BG017

    Replenishment Modeling for Complex Automatic Picking System

    Get PDF
    The replenishment plan of complex automatic picking system(CAPS) determines the efficiency of picking and whether the picking can be operated smoothl(1)y, which is not only highly related to the pallet storage area and picking buffer but also the operation and operating efficiency of Horizontal Dispenser (HD) and Channel Dispenser(CD). The questions here can be summarized as when replenishment should be required and how many cartons of cigarettes should be dedicated to picking buffer. To answer these questions, we first present a comprehensive description for the general multi-tier, multi-model inventory system of CAPS and analyse the stocking and picking activities of HD and CD. Then we consider replenishment in two cases. One is single replenishing request from one picking flue, the other is multiple replenishing requests from more than one picking flues at the same time which is more complex. For the latter case, we solve the problem based-on optimal scheduling policy. Our mathematical model provides a viable solution to optimize replenishment operation for CAPS

    基于碳交易的可持续供应链网络设计

    Get PDF
    将环境因素融入到传统供应链中,构建了一个基于碳交易的可持续供应链网络的混合整数线性规划模型,然后用一个具体实例对模型验证,同时通过软件进行求解,得到该企业在采购、制造、分销及回收等环节的最优化决策,并进行分析。国家自然科学基金项目(70971112

    Tamper detection in RFID-enabled supply chains using fragile watermarking

    Get PDF
    While mainstream RFID research has been focused on solving privacy issues, security in general and data tampering in specific is still an open question. This paper analyzes potential security threats especially data tampering in RFID-enabled supply chains and proposes solutions how these threats might be addressed using fragile watermarking technologies. We first survey RFID system and its security problems, and then explain the importance of fragile watermarking schemes for RFID systems and possible applications using fragile watermarking to detect and locate any modification in RFID systems. Finally we suggest possible solutions using fragile watermarking for RFID-enabled supply chain

    A Bricklaying Heuristic Algorithm for the Orthogonal Rectangular

    Get PDF
    中文摘要:为求解正交矩形Packing 问题提出了一个新颖而有效的砌墙式启发式算法. 该算法主要基于砌墙式启发式策略,其思想主要来源于砖匠在砌墙过程中所积累的经验:基于基准砖的砌墙规则. 对国际上公认的大量的Bench-mark 问题例的计算结果表明,该算法的计算速度不仅比著名的现代启发式算法快,而且获得更优的高度.英文摘要:Abstract  A novel and effective bricklaying heuristic algorit hm for two-dimensional rectangular Packing problem is presented. This algorit hm is mainly based on bricklaying heuristic st rategies inspired by a large number of experiences accumulated by bricklayers during t he process of building t he wall , especially , t he building wall st rategy based on t he reference brick is presented. The computational result s on large number of Benchmark p roblems have shown that this algorithm not only runs in shorter time t han known meta-heuristic but al so finds shorter height .国家自然科学基金(60773126) 、福建省自然科学基金(A0710023) 、厦门大学院士启动基金(X01109) 、厦门大学“九八五”信息科技基金(00002X07204) 资助

    Tamper Detection in the EPC Network Using Digital Watermarking

    Get PDF
    National Science Foundation of China [70971112, 70902042
    corecore