Computer Science ›› 2015, Vol. 42 ›› Issue (11): 73-79.doi: 10.11896/j.issn.1002-137X.2015.11.015

Previous Articles     Next Articles

Chinese Character Computing Model Based on Cloud Information Protection

LI Qing-sheng, ZHANG Li, LIU Quan, XIONG Jing and YANG Xin-xin   

  • Online:2018-11-14 Published:2018-11-14

Abstract: A new cloud information protection model was proposed based on information protection.The method of Chinese strokes abstract was designed by abstracting the digraph from the strokes of Chinese characters.Using this me-thod,a dynamic description library for the glyphs of Chinese characters was constructed,and an algorithm of characters generation was shown based on the library.The dream of storing the glyphs of Chinese characters on the Web and outputting the characteristic glyphs on the client was realized.In addition,the model provides a solution to the storage of Chinese characters and the protection of information in the clouds.The model of Chinese computing based on information security is not only helpful for machines to understand linguistics but also helpful to protect information,semantic computation and information security computation.

Key words: Chinese character,Strokes,Character description,Digraph,Information security

[1] 俞士汶.语言随计算齐飞[J].当代语言学,2009,1(2):97-99 Yu Shi-wen.Languages with calculation and ebony[J].Contemporary Linguistics,2009,1(2):97-99
[2] 马希文.可计算的语言[M]∥逻辑-语言-计算.北京:商务印书馆,2003:45-60 Ma Xi-wen.Computable language[M]∥logic-languages-calculation.Beijing:The Commercial Press.,2003:45-60
[3] 张积家,王娟,刘鸣.英文词、汉字词、早期文字和图画的认知加工比较[J].心理学报,2011,3(4):347-363 Zhang Ji-jia,Wang Juan,Liu Ming.The Comparative Study on English Words,Chinese Words,Early Words and Pictures[J].Acta Psychologica Sinica,2011,3(4):347-363
[4] 熊金波,姚志强,等.基于行为的结构化文档多级访问控制[J].计算机研究与发展,2013,0(7):1399-1408 Xiong Jin-bo,Yao Zhi-qiang,et al.Action-Based Multilevel Access Control for Structured Document [J].Journal of Computer Research and Development,2013,0(7):1399-1408
[5] 俞士汶,段慧明,朱学锋,等.北京大学现代汉语语料库基本加工规范[J].中文信息学报,2002,6(5):49-56 Yu Shi-wen,Duan Hui-ming,Zhu Xue-feng,et al.The Basic Processing of Contemporary Chinese Corpus at Peking University SPECIFICATION[J].Journal of Chinese Information Processing,2002,6(5):49-56
[6] 《知网》.[2014-2-20].
[7] 台湾中央研究院.中文句结构树资料库.[2014-2-20]
[8] 黄居仁.中文词汇网络.[2014-2-20].
[9] Yiu C L K,Wong Wai.Chinese character synthesis usingMETAPOST.[2014-2-22].
[10] CDL:Character description language.[2014-2-22].ht-tp://
[11] Peebles D G.A Structural Representation for Chinese Characters.[2014-1-24].
[12] 林民,宋柔.汉字字形形式化方法研究[J].计算机科学,2007,4(11):185-189 Lin Min,Song Rou.Formal Description of Chinese character Glyph[J].Computer Science,2007,4(11):185-189
[13] 栗青生,熊晶,吴琴霞,等.基于特征加权的汉字点笔画生成研究[J].北京大学学报(自然科学版),2014,0(1):153-160 Li Qing-sheng,Xiong Jing,Wu Qin-xia,et al.Study of Feature Weighted-based Generation Method for Dian Strokes of Chinese Character[J].Acta Scientiarum Naturalium Universitatis Pe-kinensis,2014,0(1):153-160
[14] 吴琴霞,栗青生,高峰.基于语义构件的甲骨文字库自动生成技术研究[J].北京大学学报(自然科学版),2014,0(1):161-166 Wu Qin-xia,Li Qing-sheng,Gao Feng.Study on the Technique of Automatic Generation of Oracle Characters Based on Semantic Component [J].Acta Scientiarum Naturalium Universitatis Pekinensis,2014,0(1):161-166
[15] 吴琴霞,栗青生.基于动态描述库的汉字字形自动生成技术研[J].科学技术与工程,2013,3(15):4425-4431 Wu Qin-xia,Li Qing-sheng.Research of Chinese Character Auto-generation Technology Based on Dynamic Description Library[J].Science Technology and Engineering,2013,3(15):4425-4431
[16] 栗青生,吴琴霞,杨玉星.甲骨文字形动态描述库及其字形生成技术研究[J].北京大学学报(自然科学版),2013,9(1):61-67 Li Qing-sheng,Wu Qin-xia,Yang Yu-xing.Dynamic Description Library for Jiaguwen Characters and the Research of the Characters Processing [J].Acta Scientiarum Naturalium Universitatis Pekinensis,2013,9(1):61-67

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .