城市基础设施的全方位描述与信息化管理是建设新型智慧城市的重要基础。目前在城市基础设施建模与管理方面,以地图为模板的空间数据模型、传统的面向对象空间数据模型以及实时GIS数据模型不支持对时空对象组成结构、行为能力等要素的描...城市基础设施的全方位描述与信息化管理是建设新型智慧城市的重要基础。目前在城市基础设施建模与管理方面,以地图为模板的空间数据模型、传统的面向对象空间数据模型以及实时GIS数据模型不支持对时空对象组成结构、行为能力等要素的描述,无法全面、精细地表达设施对象信息,而计算机、物联网和地理信息系统(Geographic Information System,GIS)领域已有的城市基础设施管理方案忽略了对设施自身信息的管理,无法较好地支持设施对象及其产生数据的一体化管理。针对上述问题,首先通过扩展GBT30428.2-2013标准,完成了城市基础设施的分类与编码;然后基于多粒度时空对象数据模型(Multi-granularity Spatiotemporal Object Data Model,MGSTODM),提出了一种城市基础设施对象化描述模型,支持对城市基础设施信息的全方位描述与表达;在此基础上,提出一种城市基础设施对象化管理方法,设计了相应的技术架构,并研制了基于云存储的百万级城市基础设施对象化管理原型系统。试验结果表明,所提出的城市基础设施对象化描述模型与管理方法具备可行性、有效性和高效性。展开更多
Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networ...Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networks,beyond the theoretical capacity limit.Despite the extensive research on SC,there is a lack of comprehensive survey on technologies,solutions,applications,and challenges for SC.In this article,the development of SC is first reviewed and its characteristics,architecture,and advantages are summarized.Next,key technologies such as semantic extraction,semantic encoding,and semantic segmentation are discussed and their corresponding solutions in terms of efficiency,robustness,adaptability,and reliability are summarized.Applications of SC to UAV communication,remote image sensing and fusion,intelligent transportation,and healthcare are also presented and their strategies are summarized.Finally,some challenges and future research directions are presented to provide guidance for further research of SC.展开更多
In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievingh...In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievinghigh-value data in plaintext form and/or the associated decryption key.Inthis paper,the author presents a number of simple methods for identifyingand extracting crypfographic keys from memory dumps of softwareapplications that utilize the Microsoft.NET Framework,as well as source-code level countermeasures to protect against same.Given the EXE file ofan application and a basic knowledge of the cryptographic libraries utilizedin the NET Framework,the author shows how to create a memory dumpof a running application and how to extract cryptographic keys from sameusing WinDBG-without any prior knowledgel of the cryptographic keyutilized.Whilst the proof-of-concept application utilized as part of thispaper uses an implementation of the DES cipher,it should be noted that thesteps shown can be utilized against all three generations of symmetric andasymmetric ciphers supported within the NET Framework.展开更多
文摘城市基础设施的全方位描述与信息化管理是建设新型智慧城市的重要基础。目前在城市基础设施建模与管理方面,以地图为模板的空间数据模型、传统的面向对象空间数据模型以及实时GIS数据模型不支持对时空对象组成结构、行为能力等要素的描述,无法全面、精细地表达设施对象信息,而计算机、物联网和地理信息系统(Geographic Information System,GIS)领域已有的城市基础设施管理方案忽略了对设施自身信息的管理,无法较好地支持设施对象及其产生数据的一体化管理。针对上述问题,首先通过扩展GBT30428.2-2013标准,完成了城市基础设施的分类与编码;然后基于多粒度时空对象数据模型(Multi-granularity Spatiotemporal Object Data Model,MGSTODM),提出了一种城市基础设施对象化描述模型,支持对城市基础设施信息的全方位描述与表达;在此基础上,提出一种城市基础设施对象化管理方法,设计了相应的技术架构,并研制了基于云存储的百万级城市基础设施对象化管理原型系统。试验结果表明,所提出的城市基础设施对象化描述模型与管理方法具备可行性、有效性和高效性。
基金supported by the Natural Science Foundation of China under Grants 61971084,62025105,62001073,62272075the National Natural Science Foundation of Chongqing under Grants cstc2021ycjh-bgzxm0039,cstc2021jcyj-msxmX0031+1 种基金the Science and Technology Research Program for Chongqing Municipal Education Commission KJZD-M202200601the Support Program for Overseas Students to Return to China for Entrepreneurship and Innovation under Grants cx2021003,cx2021053.
文摘Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networks,beyond the theoretical capacity limit.Despite the extensive research on SC,there is a lack of comprehensive survey on technologies,solutions,applications,and challenges for SC.In this article,the development of SC is first reviewed and its characteristics,architecture,and advantages are summarized.Next,key technologies such as semantic extraction,semantic encoding,and semantic segmentation are discussed and their corresponding solutions in terms of efficiency,robustness,adaptability,and reliability are summarized.Applications of SC to UAV communication,remote image sensing and fusion,intelligent transportation,and healthcare are also presented and their strategies are summarized.Finally,some challenges and future research directions are presented to provide guidance for further research of SC.
文摘In the absence of specialized encryption hardware,cryptographic operationsmust be performed in main memory.As such,it is common place for cybercriminals to examine the content of main memory with a view to retrievinghigh-value data in plaintext form and/or the associated decryption key.Inthis paper,the author presents a number of simple methods for identifyingand extracting crypfographic keys from memory dumps of softwareapplications that utilize the Microsoft.NET Framework,as well as source-code level countermeasures to protect against same.Given the EXE file ofan application and a basic knowledge of the cryptographic libraries utilizedin the NET Framework,the author shows how to create a memory dumpof a running application and how to extract cryptographic keys from sameusing WinDBG-without any prior knowledgel of the cryptographic keyutilized.Whilst the proof-of-concept application utilized as part of thispaper uses an implementation of the DES cipher,it should be noted that thesteps shown can be utilized against all three generations of symmetric andasymmetric ciphers supported within the NET Framework.