期刊文献+

科技创新模式下融合哈希检索技术的网站维护策略研究

Website Maintenance Strategy of Fusion Hash Retrieval Technology under Science and Technology Innovation Model
下载PDF
导出
摘要 网站的顺利运行可以推进科技创新,而在科技创新模式下使用新技术也可对网站进行高效维护。在科技创新模式下,为了在网站维护中对出现的相似网站问题可以准确定位并进行排查以保证公司内部网络顺利运行,提出了融合哈希检索技术的网站维护策略。实验结果表明,所提方法能实现相似网站问题数据信息的快速定位检索,且检索精度较高。 The smooth operation of the website can promote technological innovation,and the use of new technologies in the scientific and technological innovation mode can also maintain the website efficiently. Under the technological innovation model,in order to accurately locate and troubleshoot to ensure the smooth operation of the company’s internal network when similar website issues occur during website maintenance,this paper proposes a website maintenance strategy based on hash retrieval technology. The experimental results show that the proposed method can realize the fast location and retrieval of problem data information of similar websites,and the retrieval accuracy is high.
作者 尉敬涛 李涓楠 王欣 陈雨 余柯佳 WEI Jingtao;LI Juannan;WANG Xin;CHEN Yu;YU Kejia
出处 《山西科技》 2020年第2期58-63,共6页 Shanxi Science and Technology
基金 山西省软科学研究计划项目“科技宣传助推科技创新模式的研究”(项目编号:2018041043-6)。
关键词 科技创新模式 网站问题数据 哈希检索技术 特征提取 science and technology innovation model website problem data hash retrieval technology feature extraction
  • 相关文献

参考文献4

二级参考文献21

  • 1桂林.R-tree空间索引方法的优化研究[J].武汉理工大学学报,2009,31(2):97-99. 被引量:3
  • 2秦运龙 孙广玲 张新鹏.利用运动矢量进行视频篡改检测.计算机研究与发展,2009,46:227-233.
  • 3Lin Y R, Huang H Y, Hsu W H. An embedded watermark tech- nique in video for copyright protection [ C ]//Proceedings of the 18th Int. Conf. on Pattern Recognition. Piscataway, NJ: Institu- te of Electrical and Electronics Engineers Inc. 2006: 795-798. [DOI: 10. 1109/ICPR. 2006. 244].
  • 4Ahun O, Sharma G, Celik M, et al. A set theoretic framework for watermarking and its application to semifragile tamper detec- tion [ J ]. IEEE Transactions on Information, Forensics and Secu- rity, 2006, 1 ( 4 ) : 479492. [DOI: 10. 1109/TIFS. 2006. 885018 ].
  • 5De Roover C, De Vleeschouwer C, Lefebvre F, et al. Robust video hashing based on radial projections of key frames [ J ]. IEEE Transactions on Signal Processing, 2005, 53 (10) : 4020- 4037. [ DOI: 10. ll09/TSP. 2005. 855414].
  • 6Wang W H, Farid H. Exposing digital forgeries in color filter ar- ray interpolated images [ C ]//Proc. of MM&Sec' 07. New York : Association for Computing Machinery, 2007:715-728.
  • 7Wang W H, Farid H. Exposing digital forgeries in video by de- tecting double MPEG compression [ C ]//Proceedings of the Mul- timedia and Security Workshop Geneva. Switzerland: ACM, 2006 : 37-47.
  • 8Wang W H, Farid H. Exposing digital forgeries in video by de- tecting double quantization [ C ]//Proceedings of the 11 th ACM Multimedia and Security Workshop. Princeton : ACM, 2009 : 39- 48.
  • 9Zhang J, Su Y T. Detecting logo-removal forgery by inconsisten- cies of blur [ C ]//Proceedings of 2009 International Conference on Industrial Mechatronics and Automation. Singapore: IEEE Industrial Electronics Society, 2009: 32-36. [ DOI: 10. 1109/ ICIMA. 2009.5156553 ].
  • 10Kobayashi M, Okabe T, Sato Y. Detecting forgery from static- scene video based on inconsistency in noise level functions [ J]. IEEE Transactions on Information Forensics and Security, 2010, 5(4) :883-892. [ DOI: 10. 1109/TIFS. 2010. 2074194].

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部