期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography 被引量:1
1
作者 Richard E Overill Jantje A M Silomon +1 位作者 Kam-Pui Chow Hayson Tse 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期9-15,共7页
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy... The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time. 展开更多
关键词 Trojan Horse defence child pornography digital forensic evidence complexity quantitative plausibility metrics posterior odds
下载PDF
Do My Loop Detectors Count Correctly? A Set of Functions for Detector Plausibility Testing
2
作者 Thomas Riedel Kurt Erni 《Journal of Traffic and Transportation Engineering》 2016年第3期117-130,共14页
Loop detectors are wide-spread and relatively cheap detecting devices. With today's traffic communication revolution, high resolution detector data is available on a central traffic management level. High resolution ... Loop detectors are wide-spread and relatively cheap detecting devices. With today's traffic communication revolution, high resolution detector data is available on a central traffic management level. High resolution detector data consist of detector slopes, also called pulse data. There is an initial and continuous need for checking the detectors for correct data as all kinds of disturbances may add erroneous information to the data. This paper proposes pulse data checking and interval data checking with optional data replacement in order to guarantee a continuous data flow even if detectors do not deliver the expected data quality: Raw detector data checking analyses rising and falling slopes of detector signals; Cumulative data checking compares interval values to reference curves. Cumulative data checking needs less computational effort, but needs more parameterization effort than raw detector data checking. Both checking principles are applied to different systems in Switzerland since about five years. 展开更多
关键词 Loop detectors plausibility detector count statistics
下载PDF
A Survey on Sensor-and Communication-Based Issues of Autonomous UAVs
3
作者 Pavlo Mykytyn Marcin Brzozowski +1 位作者 Zoya Dyka Peter Langendoerfer 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1019-1050,共32页
The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader th... The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader thanever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack ofimplemented securitymeasures and raise new security and safety concerns. For instance, the issue of implausible ortampered UAV sensor measurements is barely addressed in the current research literature and thus, requires moreattention from the research community. The goal of this survey is to extensively review state-of-the-art literatureregarding common sensor- and communication-based vulnerabilities, existing threats, and active or passive cyberattacksagainst UAVs, as well as shed light on the research gaps in the literature. In this work, we describe theUnmanned Aerial System (UAS) architecture to point out the origination sources for security and safety issues.Weevaluate the coverage and completeness of each related research work in a comprehensive comparison table as wellas classify the threats, vulnerabilities and cyber-attacks into sensor-based and communication-based categories.Additionally, for each individual cyber-attack, we describe existing countermeasures or detectionmechanisms andprovide a list of requirements to ensureUAV’s security and safety.We also address the problem of implausible sensormeasurements and introduce the idea of a plausibility check for sensor data. By doing so, we discover additionalmeasures to improve security and safety and report on a research niche that is not well represented in the currentresearch literature. 展开更多
关键词 Unmanned aerial vehicle unmanned aerial system cyber security and privacy drone swarm security vulnerabilities cyber-threats cyber-attacks plausibility check
下载PDF
量化plausibility测度在默认推理系统中的推理能力
4
作者 霍旭辉 寇辉 《四川大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第4期767-770,共4页
作者讨论了量化plausibility测度在默认推理逻辑系统(P系统)中的推理能力,给出了一般量化plausibility测度与possibility测度具有相同推理能力的条件.
关键词 量化plausibility测度 默认推理 possibility测度
原文传递
On Software Application Database Constraint-driven Design and Development
5
作者 Christian Mancas Cristina Serban Diana Christina Mancas 《Journal of Computer Science Research》 2023年第1期31-45,共15页
This paper presents a methodology driven by database constraints for designing and developing(database)software applications.Much needed and with excellent results,this paradigm guarantees the highest possible quality... This paper presents a methodology driven by database constraints for designing and developing(database)software applications.Much needed and with excellent results,this paradigm guarantees the highest possible quality of the managed data.The proposed methodology is illustrated with an easy to understand,yet complex medium-sized genealogy software application driven by more than 200 database constraints,which fully meets such expectations. 展开更多
关键词 Database constraint-driven design and development Database constraint Data plausibility Software architecture Design and development The(elementary)mathematical data model MatBase
下载PDF
Lateral interaction by Laplacian‐based graph smoothing for deep neural networks
6
作者 Jianhui Chen Zuoren Wang Cheng‐Lin Liu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第4期1590-1607,共18页
Lateral interaction in the biological brain is a key mechanism that underlies higher cognitive functions.Linear self‐organising map(SOM)introduces lateral interaction in a general form in which signals of any modalit... Lateral interaction in the biological brain is a key mechanism that underlies higher cognitive functions.Linear self‐organising map(SOM)introduces lateral interaction in a general form in which signals of any modality can be used.Some approaches directly incorporate SOM learning rules into neural networks,but incur complex operations and poor extendibility.The efficient way to implement lateral interaction in deep neural networks is not well established.The use of Laplacian Matrix‐based Smoothing(LS)regularisation is proposed for implementing lateral interaction in a concise form.The authors’derivation and experiments show that lateral interaction implemented by SOM model is a special case of LS‐regulated k‐means,and they both show the topology‐preserving capability.The authors also verify that LS‐regularisation can be used in conjunction with the end‐to‐end training paradigm in deep auto‐encoders.Additionally,the benefits of LS‐regularisation in relaxing the requirement of parameter initialisation in various models and improving the classification performance of prototype classifiers are evaluated.Furthermore,the topologically ordered structure introduced by LS‐regularisation in feature extractor can improve the generalisation performance on classification tasks.Overall,LS‐regularisation is an effective and efficient way to implement lateral interaction and can be easily extended to different models. 展开更多
关键词 artificial neural networks biologically plausible Laplacian‐based graph smoothing lateral interaction machine learning
下载PDF
Assessing the impact of conceptual mineral systems uncertainty on prospectivity predictions 被引量:1
7
作者 Mark D Lindsay Agnieszka M.Piechocka +4 位作者 Mark W Jessell Richard Scalzo Jeremie Giraud Guillaume Pirot Edward Cripps 《Geoscience Frontiers》 SCIE CAS CSCD 2022年第6期182-207,共26页
The past two decades have seen a rapid adoption of artificial intelligence methods applied to mineral exploration. More recently, the easier acquisition of some types of data has inspired a broad literature that has e... The past two decades have seen a rapid adoption of artificial intelligence methods applied to mineral exploration. More recently, the easier acquisition of some types of data has inspired a broad literature that has examined many machine learning and modelling techniques that combine exploration criteria,or ’features’, to generate predictions for mineral prospectivity. Central to the design of prospectivity models is a ’mineral system’, a conceptual model describing the key geological elements that control the timing and location of economic mineralisation. The mineral systems model defines what constitutes a training set, which features represent geological evidence of mineralisation, how features are engineered and what modelling methods are used. Mineral systems are knowledge-driven conceptual models, thus all parameter choices are subject to human biases and opinion so alternative models are possible.However, the effect of alternative mineral systems models on prospectivity is rarely compared despite the potential to heavily influence final predictions. In this study, we focus on the effect of conceptual uncertainty on Fe ore prospectivity models in the Hamersley region, Western Australia. Four important considerations are tested.(1) Five different supergene and hypogene conceptual mineral systems models guide the inputs for five forest-based classification prospectivity models model.(2) To represent conceptual uncertainty, the predictions are then combined for prospectivity model comparison.(3)Representation of three-dimensional objects as two-dimensional features are tested to address commonly ignored thickness of geological units.(4) The training dataset is composed of known economic mineralisation sites(deposits) as ’positive’ examples, and exploration drilling data providing ’negative’sampling locations. Each of the spatial predictions are assessed using independent performance metrics common to AI-based classification methods and subjected to geological plausibility testing. We find that different conceptual mineral systems produce significantly different spatial predictions, thus conceptual uncertainty must be recognised. A benefit to recognising and modelling different conceptual models is that robust and geologically plausible predictions can be made that may guide mineral discovery. 展开更多
关键词 UNCERTAINTY Modelling Prospectivity Economic geology Geological plausibility Forest-based classification
下载PDF
Numerical Characterizations of Covering Rough Sets Based on Evidence Theory
8
作者 CHEN Degang ZHANG Xiao 《浙江海洋学院学报(自然科学版)》 CAS 2010年第5期416-419,共4页
Covering rough sets are improvements of traditional rough sets by considering cover of universe instead of partition.In this paper,we develop several measures based on evidence theory to characterize covering rough se... Covering rough sets are improvements of traditional rough sets by considering cover of universe instead of partition.In this paper,we develop several measures based on evidence theory to characterize covering rough sets.First,we present belief and plausibility functions in covering information systems and study their properties.With these measures we characterize lower and upper approximation operators and attribute reductions in covering information systems and decision systems respectively.With these discussions we propose a basic framework of numerical characterizations of covering rough sets. 展开更多
关键词 Covering rough sets Attribute reduction Belief and plausibility functions Evidence theory
下载PDF
On the Seismic Resilience
9
作者 Ramiro Sofronie 《Journal of Geological Resource and Engineering》 2019年第4期132-139,共8页
The paper deals with the self-defending capacity of buildings and structures against earthquakes. The idea of this conceptcomes from Hooke’s Law of elasticity published in 1678. The original deterministic concept was... The paper deals with the self-defending capacity of buildings and structures against earthquakes. The idea of this conceptcomes from Hooke’s Law of elasticity published in 1678. The original deterministic concept was converted, with the aid of reliabilityanalysis, into a probalistic form. In this way seismic resilience covers a larger field of random phenomena and becomes directlyinvolved in more engineering applications. 展开更多
关键词 Complementarity CONFIDENCE DURABILITY ELASTICITY JERK plausibility RELIABILITY
下载PDF
On the Seismic Jerk
10
作者 Ramiro Sofronie 《Journal of Geological Resource and Engineering》 2017年第4期147-168,共22页
The paper deals with the mathematical concept of jerk created in 1825 by Carl Jacobi and introduced in 1936, forapplications purposes in dynamics by Aurel A. Beles. Extended in seismic engineering that phenomenon of d... The paper deals with the mathematical concept of jerk created in 1825 by Carl Jacobi and introduced in 1936, forapplications purposes in dynamics by Aurel A. Beles. Extended in seismic engineering that phenomenon of dynamic amplification isbased on the first law of conservation in Mechanics combined with the theory of dislocations developed by Lev Landau. Finally, thetwo study cases presented in the paper recommend this simply analysis method for advanced practical cases with any degree ofaccuracy as well as in solving some plausibility inquire as requested by ISO 13822:2010. 展开更多
关键词 DISLOCATION EARTHQUAKE plausibility SHEAR stress concentration.
下载PDF
A Comparative Study of Scientific Hedging by Chinese Writers and English Writers
11
作者 Hua Yang 《Sino-US English Teaching》 2006年第3期58-61,71,共5页
Based on a corpus of 10 texts in material science discipline, this paper explores the use of scientific English hedging both by Chinese and English writers. The result shows that there are similarities as well as diff... Based on a corpus of 10 texts in material science discipline, this paper explores the use of scientific English hedging both by Chinese and English writers. The result shows that there are similarities as well as differences in hedging frequency and distribution between the research articles by Chinese writers and native English writers. Research articles written by Chinese writers tend to be more direct and authoritative in tone as a result of higher frequency of approximators and lower frequency of plausibility shields. 展开更多
关键词 hedging attribution shield plausibility shield approximators
下载PDF
Modeling and Characterization of Vegetation, Aquatic and Mineral Surfaces Using the Theory of Plausible and Paradoxical Reasoning from Satellite Images: Case of the Toumodi-Yamoussoukro-Tiébissou Zone in V Baoulé(Côte d’Ivoire)
12
作者 Jean-Claude Okaingni Sié Ouattara +3 位作者 Adles Kouassi Wognin J.Vangah Aubin K.Koffi Alain Clement 《Open Journal of Applied Sciences》 2017年第10期520-536,共17页
In this paper, the theory of plausible and paradoxical reasoning of Dezert- Smarandache (DSmT) is used to take into account the paradoxical charac-ter through the intersections of vegetation, aquatic and mineral surfa... In this paper, the theory of plausible and paradoxical reasoning of Dezert- Smarandache (DSmT) is used to take into account the paradoxical charac-ter through the intersections of vegetation, aquatic and mineral surfaces. In order to do this, we developed a classification model of pixels by aggregating information using the DSmT theory based on the PCR5 rule using the &cap;NDVI, &cap;MNDWI and &cap;NDBaI spectral indices obtained from the ASTER satellite images. On the qualitative level, the model produced three simple classes for certain knowledge (E, V, M) and eight composite classes including two union classes characterizing partial ignorance ({E,V}, {M,V}) and six classes of intersection of which three classes of simple intersection (E&cap;V, M&cap;V, E&cap;M) and three classes of composite intersection (E&cap;{M,V}, M&cap;{E,V}, V&cap;{E,M}), which represent paradoxes. This model was validated with an average rate of 93.34% for the well-classified pixels and a compliance rate of the entities in the field of 96.37%. Thus, the model 1 retained provides 84.98% for the simple classes against 15.02% for the composite classes. 展开更多
关键词 Theory of Plausible and PARADOXICAL REASONING PCR5 Rule ASTER Satellite Images NDVI MNDWI NDBaI MODELING Classification
下载PDF
To Tell A “Plausible Story” through Constructing Different Narrative Point of Views in “Wide Sargasso Sea”
13
作者 杜心怡 《海外英语》 2017年第14期164-166,共3页
"Wide Sargasso Sea"is one of Jean Rhys' novella which appealed enormous research. Although many studies touched on different meanings from its narrative perspective, most of them illustrated from the asp... "Wide Sargasso Sea"is one of Jean Rhys' novella which appealed enormous research. Although many studies touched on different meanings from its narrative perspective, most of them illustrated from the aspect which mixed narrator and point of view. This study researched this novella from the perspective of point of view suggested by Prof. Shen Dan to decode author's method of telling a"plausible story". 展开更多
关键词 Wide Sargasso Sea narrative techniques point of view plausible story
下载PDF
Flavidanolides A and B from Isodon flavidus
14
作者 Jiang-Hai Ye Guo-Yong Luo +8 位作者 Chen-Liang Zhao Zheng-Ming Liang Jin-Huai Wei Ya-Hua Liu Kang He Lu-Tai Pan Jing-Jie Zhang Juan Zou Hong-Jie Zhang 《Chinese Chemical Letters》 SCIE CAS CSCD 2023年第9期160-164,共5页
A phytochemical investigation on Isodon flavidus led to the isolation of flavidanolide A(1),a rearranged diterpenoid featuring a six/seven/five-membered tricyclic skeleton,together with flavidanolide B(2),an uncommon ... A phytochemical investigation on Isodon flavidus led to the isolation of flavidanolide A(1),a rearranged diterpenoid featuring a six/seven/five-membered tricyclic skeleton,together with flavidanolide B(2),an uncommon heterodimeric diterpenoid consisting of a norabietane and a seco-isopimarane monomeric units.Their structures were elucidated by extensive spectroscopic data and single-crystal X-ray diffraction analyses.Their plausible biosynthetic routes were also proposed.In the bioassay,flavidanolide B was found to exhibit good inhibitory effect against lipopolysaccharide(LPS)-induced nitric oxide(NO)production in RAW264.7 cells comparable to positive control pyrrolidinedithiocarbamate ammonium(PDTC),which provided evidence for the medicinal value of I.flavidus as a folk medicine for treating inflammatory diseases. 展开更多
关键词 Isodon flavidus Rearranged six/seven/five-membered SKELETON Heterodimeric diterpenoid Plausible biosynthetic pathway Antiinflammatory effects
原文传递
Quantitative evaluation of the results of digital forensic investigations:a review of progress
15
作者 Richard E.Overill Jan Collie 《Forensic Sciences Research》 CSCD 2021年第1期13-18,共6页
Unlike conventional forensics,digital forensics does not at present generally quantify the results of its investigations.It is suggested that digital forensics should aim to catch up with other forensic disciplines by... Unlike conventional forensics,digital forensics does not at present generally quantify the results of its investigations.It is suggested that digital forensics should aim to catch up with other forensic disciplines by using Bayesian and other numerical methodologies to quantify its investigations’results.Assessing the plausibility of alternative hypotheses(or propositions,or claims)which explain how recovered digital evidence came to exist on a device could assist both the prosecution and the defence sides in criminal proceedings:helping the prosecution to decide whether to proceed to trial and helping defence lawyers to advise a defendant how to plead.This paper reviews some numerical approaches to the goal of quantifying the relative weights of individual items of digital evidence and the plausibility of hypotheses based on that evidence.The potential advantages enabling the construction of cost-effective digital forensic triage schemas are also outlined. 展开更多
关键词 Forensic sciences digital forensic metrics measures of plausibility Bayesian networks probability theory statistical theory complexity theory information theory
原文传递
Ensuring data confidentiality via plausibly deniable encryption and secure deletion-a survey 被引量:1
16
作者 Qionglu Zhang Shijie Jia +1 位作者 Bing Chang Bo Chen 《Cybersecurity》 2018年第1期106-125,共20页
Ensuring confidentiality of sensitive data is of paramount importance,since data leakage may not only endanger data owners’privacy,but also ruin reputation of businesses as well as violate various regulations like HI... Ensuring confidentiality of sensitive data is of paramount importance,since data leakage may not only endanger data owners’privacy,but also ruin reputation of businesses as well as violate various regulations like HIPPA and Sarbanes-Oxley Act.To provide confidentiality guarantee,the data should be protected when they are preserved in the personal computing devices(i.e.,confidentiality during their lifetime);and also,they should be rendered irrecoverable after they are removed from the devices(i.e.,confidentiality after their lifetime).Encryption and secure deletion are used to ensure data confidentiality during and after their lifetime,respectively.This work aims to perform a thorough literature review on the techniques being used to protect confidentiality of the data in personal computing devices,including both encryption and secure deletion.Especially for encryption,we mainly focus on the novel plausibly deniable encryption(PDE),which can ensure data confidentiality against both a coercive(i.e.,the attacker can coerce the data owner for the decryption key)and a non-coercive attacker. 展开更多
关键词 Data confidentiality Plausibly deniable encryption Secure deletion
原文传递
Macleayine,a new alkaloid from Madeaya cordata 被引量:1
17
作者 Chun-Mei Sai Ning-Bo Qin +6 位作者 Cui-Cui Jia Da-Hong Li Kai-Bo Wang Yue-Hu Pei Jiao Bai Zhan-Lin Li Hui-Ming Hua 《Chinese Chemical Letters》 SCIE CAS CSCD 2016年第11期1717-1720,共4页
Macleayine (1), a new natural occurring alkaloid with a unique spiro [furanone-piperidinedione] framework, was isolated from the aerial parts ofMacleaya cordata. Its unusual structure was established by extensive sp... Macleayine (1), a new natural occurring alkaloid with a unique spiro [furanone-piperidinedione] framework, was isolated from the aerial parts ofMacleaya cordata. Its unusual structure was established by extensive spectroscopic analyses, computer-assisted structure elucidation software (ACD/Structure Elucidator), quantum chemistry calculations and ECD calculation. The result of virtual molecular docking predicted the compound can enhance the effects of insulin, and may be used to treat tvpe II diabetes. 展开更多
关键词 Macleayine A natural occurring alkaloid Quantum chemistry calculations ECD calculation Plausible biogenetic pathway Macleaya cordata
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部