期刊文献+
共找到5,380篇文章
< 1 2 250 >
每页显示 20 50 100
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
1
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
下载PDF
ST-Map:an Interactive Map for Discovering Spatial and Temporal Patterns in Bibliographic Data 被引量:1
2
作者 ZUO Chenyu XU Yifan +1 位作者 DING Lingfang MENG Liqiu 《Journal of Geodesy and Geoinformation Science》 CSCD 2024年第1期3-15,共13页
Getting insight into the spatiotemporal distribution patterns of knowledge innovation is receiving increasing attention from policymakers and economic research organizations.Many studies use bibliometric data to analy... Getting insight into the spatiotemporal distribution patterns of knowledge innovation is receiving increasing attention from policymakers and economic research organizations.Many studies use bibliometric data to analyze the popularity of certain research topics,well-adopted methodologies,influential authors,and the interrelationships among research disciplines.However,the visual exploration of the patterns of research topics with an emphasis on their spatial and temporal distribution remains challenging.This study combined a Space-Time Cube(STC)and a 3D glyph to represent the complex multivariate bibliographic data.We further implemented a visual design by developing an interactive interface.The effectiveness,understandability,and engagement of ST-Map are evaluated by seven experts in geovisualization.The results suggest that it is promising to use three-dimensional visualization to show the overview and on-demand details on a single screen. 展开更多
关键词 space-time cube bibliographic data spatiotemporal analysis user study interactive map
下载PDF
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
3
作者 Aodi Liu Na Wang +3 位作者 Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第4期1705-1726,共22页
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources. 展开更多
关键词 Big data access control data security BiLSTM
下载PDF
Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
4
作者 Youngho Park Su Jin Shin Sang Uk Shin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期671-688,共18页
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly... Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies. 展开更多
关键词 Bilateral access control blockchain data sharing policy-match
下载PDF
Enhancing ChatGPT’s Querying Capability with Voice-Based Interaction and CNN-Based Impair Vision Detection Model
5
作者 Awais Ahmad Sohail Jabbar +3 位作者 Sheeraz Akram Anand Paul Umar Raza Nuha Mohammed Alshuqayran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3129-3150,共22页
This paper presents an innovative approach to enhance the querying capability of ChatGPT,a conversational artificial intelligence model,by incorporating voice-based interaction and a convolutional neural network(CNN)-... This paper presents an innovative approach to enhance the querying capability of ChatGPT,a conversational artificial intelligence model,by incorporating voice-based interaction and a convolutional neural network(CNN)-based impaired vision detection model.The proposed system aims to improve user experience and accessibility by allowing users to interact with ChatGPT using voice commands.Additionally,a CNN-based model is employed to detect impairments in user vision,enabling the system to adapt its responses and provide appropriate assistance.This research tackles head-on the challenges of user experience and inclusivity in artificial intelligence(AI).It underscores our commitment to overcoming these obstacles,making ChatGPT more accessible and valuable for a broader audience.The integration of voice-based interaction and impaired vision detection represents a novel approach to conversational AI.Notably,this innovation transcends novelty;it carries the potential to profoundly impact the lives of users,particularly those with visual impairments.The modular approach to system design ensures adaptability and scalability,critical for the practical implementation of these advancements.Crucially,the solution places the user at its core.Customizing responses for those with visual impairments demonstrates AI’s potential to not only understand but also accommodate individual needs and preferences. 展开更多
关键词 accessibility in conversational AI CNN-based impair vision detection ChatGPT voice-based interaction recommender system
下载PDF
Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things
6
作者 Pengtian Guo Kai Xiao +1 位作者 Xiaohui Wang Daoxing Li 《Global Energy Interconnection》 EI CSCD 2024年第1期94-105,共12页
The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall... The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT. 展开更多
关键词 Power Internet of Things Object model High concurrency access Zero trust mechanism Multi-source heterogeneous data
下载PDF
Dynamic Interaction Analysis of Coupled Axial-Torsional-Lateral Mechanical Vibrations in Rotary Drilling Systems
7
作者 Sabrina Meddah Sid Ahmed Tadjer +3 位作者 Abdelhakim Idir Kong Fah Tee Mohamed Zinelabidine Doghmane Madjid Kidouche 《Structural Durability & Health Monitoring》 EI 2025年第1期77-103,共27页
Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emp... Maintaining the integrity and longevity of structures is essential in many industries,such as aerospace,nuclear,and petroleum.To achieve the cost-effectiveness of large-scale systems in petroleum drilling,a strong emphasis on structural durability and monitoring is required.This study focuses on the mechanical vibrations that occur in rotary drilling systems,which have a substantial impact on the structural integrity of drilling equipment.The study specifically investigates axial,torsional,and lateral vibrations,which might lead to negative consequences such as bit-bounce,chaotic whirling,and high-frequency stick-slip.These events not only hinder the efficiency of drilling but also lead to exhaustion and harm to the system’s components since they are difficult to be detected and controlled in real time.The study investigates the dynamic interactions of these vibrations,specifically in their high-frequency modes,usingfield data obtained from measurement while drilling.Thefindings have demonstrated the effect of strong coupling between the high-frequency modes of these vibrations on drilling sys-tem performance.The obtained results highlight the importance of considering the interconnected impacts of these vibrations when designing and implementing robust control systems.Therefore,integrating these compo-nents can increase the durability of drill bits and drill strings,as well as improve the ability to monitor and detect damage.Moreover,by exploiting thesefindings,the assessment of structural resilience in rotary drilling systems can be enhanced.Furthermore,the study demonstrates the capacity of structural health monitoring to improve the quality,dependability,and efficiency of rotary drilling systems in the petroleum industry. 展开更多
关键词 Rotary drilling systems mechanical vibrations structural durability dynamic interaction analysis field data analysis
下载PDF
Optimizing Memory Access Efficiency in CUDA Kernel via Data Layout Technique
8
作者 Neda Seifi Abdullah Al-Mamun 《Journal of Computer and Communications》 2024年第5期124-139,共16页
Over the past decade, Graphics Processing Units (GPUs) have revolutionized high-performance computing, playing pivotal roles in advancing fields like IoT, autonomous vehicles, and exascale computing. Despite these adv... Over the past decade, Graphics Processing Units (GPUs) have revolutionized high-performance computing, playing pivotal roles in advancing fields like IoT, autonomous vehicles, and exascale computing. Despite these advancements, efficiently programming GPUs remains a daunting challenge, often relying on trial-and-error optimization methods. This paper introduces an optimization technique for CUDA programs through a novel Data Layout strategy, aimed at restructuring memory data arrangement to significantly enhance data access locality. Focusing on the dynamic programming algorithm for chained matrix multiplication—a critical operation across various domains including artificial intelligence (AI), high-performance computing (HPC), and the Internet of Things (IoT)—this technique facilitates more localized access. We specifically illustrate the importance of efficient matrix multiplication in these areas, underscoring the technique’s broader applicability and its potential to address some of the most pressing computational challenges in GPU-accelerated applications. Our findings reveal a remarkable reduction in memory consumption and a substantial 50% decrease in execution time for CUDA programs utilizing this technique, thereby setting a new benchmark for optimization in GPU computing. 展开更多
关键词 data Layout Optimization CUDA Performance Optimization GPU Memory Optimization Dynamic Programming Matrix Multiplication Memory access Pattern Optimization in CUDA
下载PDF
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data 被引量:1
9
作者 Zhiwei Wang Nianhua Yang +2 位作者 Qingqing Chen Wei Shen Zhiying Zhang 《China Communications》 SCIE CSCD 2024年第1期310-322,共13页
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved.Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester.We prove that our protocol is semanticallly secure,blind,and secure against oblivious requesters and malicious file keepers.We also provide security analysis in the context of four typical attacks. 展开更多
关键词 blind batch encryption data sharing onetime adaptive access public ledger security and privacy
下载PDF
Galaxy Interactions in Filaments and Sheets:Insights from EAGLE Simulations
10
作者 Apashanka Das Biswajit Pandey Suman Sarkar 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2023年第11期161-168,共8页
We study the color and star formation rates of paired galaxies in filaments and sheets using the EAGLE simulations.We find that the major pairs with pair separation<50 kpc are bluer and more star-forming in filamen... We study the color and star formation rates of paired galaxies in filaments and sheets using the EAGLE simulations.We find that the major pairs with pair separation<50 kpc are bluer and more star-forming in filamentary environments compared to those hosted in sheet-like environments.This trend reverses beyond a pair separation of~50 kpc.The interacting pairs with larger separations(>50 kpc)in filaments are on average redder and low-star-forming compared to those embedded in sheets.The galaxies in filaments and sheets may have different stellar mass and cold gas mass distributions.Using a KS test,we find that for paired galaxies with pair separation<50 kpc,there are no significant differences in these properties in sheets and filaments.The filaments transport gas toward the cluster of galaxies.Some earlier studies find preferential alignment of galaxy pairs with the filament axis.Such alignment of galaxy pairs may lead to different gas accretion efficiency in galaxies residing in filaments and sheets.We propose that the enhancement of star formation rate at smaller pair separation in filaments is caused by the alignment of galaxy pairs.A recent study with SDSS data reports the same findings.The confirmation of these results by the EAGLE simulations suggests that the hydrodynamical simulations are powerful theoretical tools for studying galaxy formation and evolution in the cosmic web. 展开更多
关键词 methods:data analysis methods:statistical galaxies:evolution galaxies:interactions (cosmology:)large-scale structure of universe
下载PDF
Transition Logic Regression Method to Identify Interactions in Binary Longitudinal Data 被引量:1
11
作者 Parvin Sarbakhsh Yadollah Mehrabi +2 位作者 Jeanine J. Houwing-Duistermaat Farid Zayeri Maryam Sadat Daneshpour 《Open Journal of Statistics》 2016年第3期469-481,共13页
Logic regression is an adaptive regression method which searches for Boolean (logic) combinations of binary variables that best explain the variability in the outcome, and thus, it reveals interaction effects which ar... Logic regression is an adaptive regression method which searches for Boolean (logic) combinations of binary variables that best explain the variability in the outcome, and thus, it reveals interaction effects which are associated with the response. In this study, we extended logic regression to longitudinal data with binary response and proposed “Transition Logic Regression Method” to find interactions related to response. In this method, interaction effects over time were found by Annealing Algorithm with AIC (Akaike Information Criterion) as the score function of the model. Also, first and second orders Markov dependence were allowed to capture the correlation among successive observations of the same individual in longitudinal binary response. Performance of the method was evaluated with simulation study in various conditions. Proposed method was used to find interactions of SNPs and other risk factors related to low HDL over time in data of 329 participants of longitudinal TLGS study. 展开更多
关键词 Logic Regression Longitudinal data Transition Model interaction TLGS Study Low HDL SNP
下载PDF
Al-modified yolk-shell silica particle-supported NiMo catalysts for ultradeep hydrodesulfurization of dibenzothiophene and 4,6-dimethyldibenzothiophene:Efficient accessibility of active sites and suitable acidity
12
作者 Ke Yu Wei-Min Kong +3 位作者 Zhen Zhao Ai-Jun Duan Lian Kong Xi-Long Wang 《Petroleum Science》 SCIE EI CAS CSCD 2024年第1期654-666,共13页
Yolk-shell SiO2 particles(YP)with center-radial meso-channels were fabricated through a simple and effective method.Al-containing YP-supported NiMo catalysts with different Al amounts(NiMo/AYP-x,x=Si/Al molar proporti... Yolk-shell SiO2 particles(YP)with center-radial meso-channels were fabricated through a simple and effective method.Al-containing YP-supported NiMo catalysts with different Al amounts(NiMo/AYP-x,x=Si/Al molar proportion)were prepared and dibenzothiophene(DBT)and 4,6-dimethyl-dibenzothiophene(4,6-DMDBT)were employed as the probes to evaluate the hydrodesulfurization(HDS)catalytic performance.The as-prepared AYP-x carriers and corresponding catalysts were characterized by some advanced characterizations to obtain deeper correlations between physicochemical properties and the HDS performance.The average pore sizes of series AYP-x supports are above 6.0 nm,which favors the mass transfer of organic sulfides.The cavity between the yolk and the shell is beneficial for the enrichment of S-containing compounds and the accessibility between reactants and active metals.Aluminum embedded into the silica framework could facilitate the formation of Lewis(L)and Brønsted(B)acid sites and adjust the metal-support interaction(MSI).Among all the as-synthesized catalysts,NiMo/AYP-20 catalyst shows the highest HDS activities.The improved HDS activity of NiMo/AYP-20 catalyst is attributed to the perfect combination of excellent structural properties of the yolk-shell mesoporous silica,enhanced acidity,moderate MSI,and good accessibility/dispersion of active components. 展开更多
关键词 Al-containing yolk-shell silica particles accessIBILITY ACIDITY Metal-support interaction Hydrodesulfurization
下载PDF
Blockchain-Enabled Privacy Protection and Access Control Scheme Towards Sensitive Digital Assets Management
13
作者 Duan Pengfei Ma Zhaofeng +2 位作者 Zhang Yuqing Wang Jingyu Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期224-236,共13页
With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,howeve... With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability. 展开更多
关键词 access control data trading MAABE multi-channel privacy preserving
下载PDF
Uncertainties of ENSO-related Regional Hadley Circulation Anomalies within Eight Reanalysis Datasets
14
作者 Yadi LI Xichen LI +3 位作者 Juan FENG Yi ZHOU Wenzhu WANG Yurong HOU 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第1期115-140,共26页
El Nino-Southern Oscillation(ENSO),the leading mode of global interannual variability,usually intensifies the Hadley Circulation(HC),and meanwhile constrains its meridional extension,leading to an equatorward movement... El Nino-Southern Oscillation(ENSO),the leading mode of global interannual variability,usually intensifies the Hadley Circulation(HC),and meanwhile constrains its meridional extension,leading to an equatorward movement of the jet system.Previous studies have investigated the response of HC to ENSO events using different reanalysis datasets and evaluated their capability in capturing the main features of ENSO-associated HC anomalies.However,these studies mainly focused on the global HC,represented by a zonal-mean mass stream function(MSF).Comparatively fewer studies have evaluated HC responses from a regional perspective,partly due to the prerequisite of the Stokes MSF,which prevents us from integrating a regional HC.In this study,we adopt a recently developed technique to construct the three-dimensional structure of HC and evaluate the capability of eight state-of-the-art reanalyses in reproducing the regional HC response to ENSO events.Results show that all eight reanalyses reproduce the spatial structure of HC responses well,with an intensified HC around the central-eastern Pacific but weakened circulations around the Indo-Pacific warm pool and tropical Atlantic.The spatial correlation coefficient of the three-dimensional HC anomalies among the different datasets is always larger than 0.93.However,these datasets may not capture the amplitudes of the HC responses well.This uncertainty is especially large for ENSO-associated equatorially asymmetric HC anomalies,with the maximum amplitude in Climate Forecast System Reanalysis(CFSR)being about 2.7 times the minimum value in the Twentieth Century Reanalysis(20CR).One should be careful when using reanalysis data to evaluate the intensity of ENSO-associated HC anomalies. 展开更多
关键词 regional Hadley circulation ENSO atmosphere-ocean interaction reanalysis data
下载PDF
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
15
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
下载PDF
Research on Data Tampering Prevention Method for ATC Network Based on Zero Trust
16
作者 Xiaoyan Zhu Ruchun Jia +1 位作者 Tingrui Zhang Song Yao 《Computers, Materials & Continua》 SCIE EI 2024年第3期4363-4377,共15页
The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the ... The traditional air traffic control information sharing data has weak security characteristics of personal privacy data and poor effect,which is easy to leads to the problem that the data is usurped.Starting from the application of the ATC(automatic train control)network,this paper focuses on the zero trust and zero trust access strategy and the tamper-proof method of information-sharing network data.Through the improvement of ATC’s zero trust physical layer authentication and network data distributed feature differentiation calculation,this paper reconstructs the personal privacy scope authentication structure and designs a tamper-proof method of ATC’s information sharing on the Internet.From the single management authority to the unified management of data units,the systematic algorithm improvement of shared network data tamper prevention method is realized,and RDTP(Reliable Data Transfer Protocol)is selected in the network data of information sharing resources to realize the effectiveness of tamper prevention of air traffic control data during transmission.The results show that this method can reasonably avoid the tampering of information sharing on the Internet,maintain the security factors of air traffic control information sharing on the Internet,and the Central Processing Unit(CPU)utilization rate is only 4.64%,which effectively increases the performance of air traffic control data comprehensive security protection system. 展开更多
关键词 Zero trust access policy air traffic information sharing network privacy data tam-per-proof certification features
下载PDF
Context-Aware Animation Data Description and Interaction Method Based on Sketch
17
作者 Fang Liu Zhaoxu Sun +1 位作者 Cuixia Ma Hongan Wang 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期8-16,共9页
In this paper,an interactive method is proposed to describe computer animation data and accelerate the process of animation generation.First,a semantic model and a resource description framework(RDF)are utilized to an... In this paper,an interactive method is proposed to describe computer animation data and accelerate the process of animation generation.First,a semantic model and a resource description framework(RDF)are utilized to analyze and describe the relationships between animation data.Second,a novel context model which is able to keep the context-awareness was proposed to facilitate data organization and storage.In our context model,all the main animation elements in a scene are operated as a whole.Then sketch is utilized as the main interactive method to describe the relationships between animation data,edit the context model and make some other user operations.Finally,a context-aware computer animation data description system based on sketch is generated and it also works well in animation generation process. 展开更多
关键词 ANIMATION data DESCRIPTION SKETCH interactIVE ANIMATION CONTEXT-AWARE
下载PDF
Spatial Interactions of China's Steel Output: An Empirical Analysis Based on Chinese Inter-provincial Panel Data
18
作者 WAN Dai LI Ningting 《Journal of Landscape Research》 2019年第2期20-27,共8页
In view of the extensive growth of China's steel production in recent years, this paper analyzed the industrial development background and economic geography theory, and discussed the possible spatial interaction ... In view of the extensive growth of China's steel production in recent years, this paper analyzed the industrial development background and economic geography theory, and discussed the possible spatial interaction mechanism. Based on panel data of China's inter-provincial steel output from 2001 to 2015, using spatial econometric model, this paper also explored whether China's provincial steel production shows material orientation, market orientation and traffic orientation, and isolated spatial interactions of interprovincial steel output. The results showed that the inter-provincial steel production in China did show both material orientation, market orientation and traffic orientation and that there was a significant negative spatial interaction, indicating that there might be strong competition and a crowing-out effect between neighboring provinces, and that the smaller the spatial scope, the more significant the spatial interactions of steel production. 展开更多
关键词 INTER-PROVINCIAL STEEL OUTPUT Panel data SPATIAL interactions SPATIAL ECONOMETRICS
下载PDF
Revealing GE Interactions from Trial Data without Replications
19
作者 Jixiang Wu Johnie Jenkins Jack C. McCarty 《Open Journal of Statistics》 2019年第3期407-419,共13页
Detecting genotype-by-environment (GE) interaction effects or yield stability is one of the most important components for crop trial data analysis, especially in historical crop trial data. However, it is statisticall... Detecting genotype-by-environment (GE) interaction effects or yield stability is one of the most important components for crop trial data analysis, especially in historical crop trial data. However, it is statistically challenging to discover the GE interaction effects because many published data were just entry means under each environment rather than repeated field plot data. In this study, we propose a new methodology, which can be used to impute replicated trial data sets to reveal GE interactions from the original data. As a demonstration, we used a data set, which includes 28 potato genotypes and six environments with three replications to numerically evaluate the properties of this new imputation method. We compared the phenotypic means and predicted random effects from the imputed data with the results from the original data. The results from the imputed data were highly consistent with those from the original data set, indicating that imputed data from the method we proposed in this study can be used to reveal information including GE interaction effects harbored in the original data. Therefore, this study could pave a way to detect the GE interactions and other related information from historical crop trial reports when replications were not available. 展开更多
关键词 GE interaction HISTORICAL CROP TRIAL data IMPUTATION
下载PDF
Ending Privacy’s Gremlin: Stopping the Data-Broker Loophole to the Fourth Amendment’s Search Warrant Requirement
20
作者 Samantha B. Larkin Shakour Abuzneid 《Journal of Information Security》 2024年第4期589-611,共23页
Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about... Advances in technology require upgrades in the law. One such area involves data brokers, which have thus far gone unregulated. Data brokers use artificial intelligence to aggregate information into data profiles about individual Americans derived from consumer use of the internet and connected devices. Data profiles are then sold for profit. Government investigators use a legal loophole to purchase this data instead of obtaining a search warrant, which the Fourth Amendment would otherwise require. Consumers have lacked a reasonable means to fight or correct the information data brokers collect. Americans may not even be aware of the risks of data aggregation, which upends the test of reasonable expectations used in a search warrant analysis. Data aggregation should be controlled and regulated, which is the direction some privacy laws take. Legislatures must step forward to safeguard against shadowy data-profiling practices, whether abroad or at home. In the meantime, courts can modify their search warrant analysis by including data privacy principles. 展开更多
关键词 access Control access Rights Artificial Intelligence Consumer Behavior Consumer Protection Criminal Law data Brokers data Handling data Privacy data Processing data Profiling Digital Forensics
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部