期刊文献+
共找到11,464篇文章
< 1 2 250 >
每页显示 20 50 100
The Analysis and Research Based on DEA Model and Super Efficiency DEA Model for Assessment of Classified Protection of Information Systems Security
1
作者 Jing Gao Yongiun Shen Guidong Zhang Qi Zhou 《计算机科学与技术汇刊(中英文版)》 2014年第4期140-145,共6页
关键词 安全等级保护 DEA模型 信息系统 评估模型 系统安全管理 决策单元 数据包络分析 DEA方法
下载PDF
A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era
2
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Zaharaddeen Karami Lawal 《Computers, Materials & Continua》 SCIE EI 2024年第9期3917-3943,共27页
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect... The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0. 展开更多
关键词 Cyber-physical systems CPS Industry 5.0 security data privacy human-machine collaboration data protection
下载PDF
Research on Network Security Level Protection Measurement Strategy in the Context of Cloud Platforms
3
作者 Lin Ma 《Journal of Electronic Research and Application》 2024年第3期221-229,共9页
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak... Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them. 展开更多
关键词 Cloud platform Cyber security Level protection measurement
下载PDF
Construction Technology of Lightning Protection Devices in Building Electrical Installation Engineering
4
作者 Xuhong Du 《Journal of Electronic Research and Application》 2024年第1期22-27,共6页
To better improve the electrical safety of buildings and fulfill the role of lightning protection and grounding,this article combines cases and discusses seven aspects of lightning protection devices’construction tec... To better improve the electrical safety of buildings and fulfill the role of lightning protection and grounding,this article combines cases and discusses seven aspects of lightning protection devices’construction technology.These aspects include the lightning protection classification of buildings,air terminals,down conductors,grounding devices,division of lightning protection zones,and lightning electromagnetic pulse shielding.Through the introduction of this article,readers can gain a comprehensive understanding of the application and value of lightning protection grounding construction technology in building electrical installation projects. 展开更多
关键词 Building electrical Installation engineering Lightning protection grounding
下载PDF
Study on the Priority and Interaction of Food Security,Food Safety and Environmental Protection 被引量:1
5
作者 Tang Bulong 《学术界》 CSSCI 北大核心 2017年第11期294-303,共10页
Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relation... Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems. 展开更多
关键词 FOOD security FOOD safety ENVIRONMENTAL protection PRIORITY INTERACTIVE RELATIONSHIP
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
6
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(Database security and protection system)
下载PDF
Research of the Farmland Protection Based on Food Security——A Case Study of Anshan City in Liaoning Province, China 被引量:1
7
作者 YANG Rong-li 《Asian Agricultural Research》 2011年第1期93-96,共4页
The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the stu... The quantity and quality of farmland is the key factor determining grain production capacity, so protecting farmland has become the key to guaranteeing food security. I take Anshan City in Liaoning Province as the study area which has its own particularity in terms of protecting farmland. Based on the prediction of population, coupled with the relevant data concerning farmland area, the per unit area yield of grain, the prediction and analysis of the balance of supply and demand of farmland in Anshan City are conducted. The results show that in the year 2010, the maximum supply amount of farmland that the city can offer is 239 000 hm2, and in the year 2020 the maximum supply amount of farmland that the city can offer will be 238 000 hm2; in the year 2010, the maximum demand amount of farmland is 204 186.02 hm2, and in the year 2020 the maximum supply amount of farmland will be 226 409.61 hm2. So the supply amount of farmland that the city can offer can meet the need of grain production objective. Some problems concerning farmland protection are pointed out in order to provide beneficial exploration of the farmland protection based on the model of food security. 展开更多
关键词 Food security Farmland protection Production capacity Anshan City China
下载PDF
Urban Market-Gardening in Parakou (Republic of Benin): Spatial Dynamics, Food Security, Protection of the Environment and Creation of Employments 被引量:1
8
作者 Abdoul-Ramane Abdoulaye Aboudou Yacoubou Mama Aboudou Ramanou 《Journal of Geoscience and Environment Protection》 2015年第5期93-103,共11页
Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of tho... Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments. 展开更多
关键词 URBAN Agriculture Food security Market-Gardening Channel Land Dynamics protection of the Environment Employment Parakou
下载PDF
Research and Practice on Security Protection and Disaster Recovery Strategy of Oracle Database in Colleges and Universities 被引量:1
9
作者 Man Liu Lei Yu 《Intelligent Information Management》 2022年第2期71-79,共9页
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm... Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities. 展开更多
关键词 Oracle Database security protection Database Backup Disaster Recovery Colleges and Universities
下载PDF
Protection Model of Security Systems Based on Neyman-Person Criterion
10
作者 Haitao Lv Ruimin Hu +1 位作者 Jun Chen Zheng He 《Communications and Network》 2013年第3期578-583,共6页
In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the pr... In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network. We present the weakest breach path problem formulation, which is defined by the breach protection probability of an unauthorized target passing through a guard field, and provide a solution for this problem by using the Dijkstra’s shortest path algorithm. Finally we study the variation of the breach protection probability with the change of the parameters of the model. 展开更多
关键词 security system protection PROBABILITY security Network Breach protection PROBABILITY Breach Path
下载PDF
The Role of Nuclear Power from a System Engineering Standpoint
11
作者 Luciano Ondir Freire Delvonei Alves de Andrade 《World Journal of Nuclear Science and Technology》 2017年第3期167-188,共22页
This work proposed the application of system engineering methods to identify organizations vital for society, seeking development and well-being. System engineering requires the identification of blocks (or systems), ... This work proposed the application of system engineering methods to identify organizations vital for society, seeking development and well-being. System engineering requires the identification of blocks (or systems), identification of their service functions, identification of states, identification of required quality and identification of constraints. Analyzing modern societies, vital functions were identified and countries behavior was modeled, identifying their states. In this context, nuclear power was found to be fundamental for development and defense because of its inherent advantages for military naval purposes at war. Another striking conclusion is that nuclear power is the best solution for country energy security, more than to avoid climate changes, but to help the nation to resist climate changes. A solution to mitigate the high overnight costs of nuclear power was also proposed. It was demonstrated qualitatively that the adoption of dual purpose mobile nuclear power plants military performances, economic development and risks management. 展开更多
关键词 system engineering Nuclear ENERGY ENERGY security CLIMATE Changes CONSTRUCTAL LAW PWR
下载PDF
Interpretation of Information Security and Data Privacy Protection According to the Data Use During the Epidemic
12
作者 Liu Yang Zhang Jiahui Sun Kaiyang 《通讯和计算机(中英文版)》 2022年第1期9-15,共7页
COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since Januar... COVID-19 has swept the whole our country and the world in the beginning of 2020.31 provinces and municipalities across the country have launched the first-level response to major public health emergencies since January 24,and China has carried out intensive epidemic control.It is critical for effectively responding to COVID-19 to collect,collate and analyze people’s personal data.What’s more,obtaining identity information,travel records and health information of confirmed cases,suspected cases and close contacts has become a crucial step in epidemic investigation.All regions have made full use of big data to carry out personnel screening,travel records analysis and other related work in epidemic prevention and control,effectively improving the efficiency of epidemic prevention and control.However,data leakage,personnel privacy data exposure,and personal attack frequently occurred in the process of personnel travel records analysis and epidemic prevention and control.It even happened in the WeChat group to forward a person’s name,phone number,address,ID number and other sensitive information.It brought discrimination,telephone and SMS harassment to the parties,which caused great harm to individuals.Based on these,lack of information security and data security awareness and other issues were exposed.Therefore,while big data has been widely concerned and applied,attention should be paid to protecting personal privacy.It is urgent to pay more attention to data privacy and information security in order to effectively protect the legitimate rights of the people.Therefore,measures can be taken to achieve this goal,such as improving the relevant legal system,strengthening technical means to enhance the supervision and management of information security and data protection. 展开更多
关键词 Information security data privacy epidemic prevention and control personal privacy protection
下载PDF
The Role of Social Engineering in Cybersecurity and Its Impact
13
作者 Bandar S. Almutairi Abdurahman Alghamdi 《Journal of Information Security》 2022年第4期363-379,共17页
An attacker has several options for breaking through an organization’s information security protections. Human factors are determined to be the source of some of the worst cyber-attacks every day in every business. T... An attacker has several options for breaking through an organization’s information security protections. Human factors are determined to be the source of some of the worst cyber-attacks every day in every business. The human method, often known as “social engineering”, is the hardest to cope with. This paper examines many types of social engineering. The aim of this study was to ascertain the level of awareness of social engineering, provide appropriate solutions to problems to reduce those engineering risks, and avoid obstacles that could prevent increasing awareness of the dangers of social engineering—Shaqra University (Kingdom of Saudi Arabia). A questionnaire was developed and surveyed 508 employees working at different organizations. The overall Cronbach’s alpha was 0.756, which very good value, the correlation coefficient between each of the items is statistically significant at 0.01 level. The study showed that 63.4% of the surveyed sample had no idea about social engineering. 67.3% of the total samples had no idea about social engineering threats. 42.1% have a weak knowledge of social engineering and only 7.5% of the sample had a good knowledge of social engineering. 64.7% of the male did not know what social engineering is. 68.0% of the administrators did not know what social engineering is. Employees who did not take courses showed statistically significant differences. 展开更多
关键词 CYBERsecurity ATTACKS Social engineering security Awareness of Cybersecurity
下载PDF
The COVID-19 and the“European Solution”of Data-based Approach to Governance:Public Security or Data Protection?
14
作者 刘洋 李益斌 NIU Huizi(Translated) 《The Journal of Human Rights》 2022年第3期483-503,共21页
To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussio... To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection. 展开更多
关键词 European solution data-based approach to governance data protection public security
下载PDF
Interface Engineering of NixSy@MnOxHy Nanorods to Efficiently Enhance Overall-Water-Splitting Activity and Stability 被引量:11
15
作者 Pan Wang Yuanzhi Luo +4 位作者 Gaixia Zhang Zhangsen Chen Hariprasad Ranganathan Shuhui Sun Zhicong Shi 《Nano-Micro Letters》 SCIE EI CAS CSCD 2022年第7期246-262,共17页
Exploring highly active and stable transition metal-based bifunctional electrocatalysts has recently attracted extensive research interests for achieving high inherent activity, abundant exposed active sites, rapid ma... Exploring highly active and stable transition metal-based bifunctional electrocatalysts has recently attracted extensive research interests for achieving high inherent activity, abundant exposed active sites, rapid mass transfer, and strong structure stability for overall water splitting. Herein, an interface engineering coupled with shell-protection strategy was applied to construct three-dimensional(3D) core-shell NixSy@MnOxHy heterostructure nanorods grown on nickel foam(NixSy@MnOxHy/NF) as a bifunctional electrocatalyst. NixSy@MnOxHy/NF was synthesized via a facile hydrothermal reaction followed by an electrodeposition process. The X-ray absorption fine structure spectra reveal that abundant Mn-S bonds connect the heterostructure interfaces of N ixSy@MnOxHy, leading to a strong electronic interaction, which improves the intrinsic activities of hydrogen evolution reaction and oxygen evolution reaction(OER). Besides, as an efficient protective shell, the MnOxHy dramatically inhibits the electrochemical corrosion of the electrocatalyst at high current densities, which remarkably enhances the stability at high potentials. Furthermore, the 3D nanorod structure not only exposes enriched active sites, but also accelerates the electrolyte diffusion and bubble desorption. Therefore, NixSy@MnOxHy/NF exhibits exceptional bifunctional activity and stability for overall water splitting, with low overpotentials of 326 and 356 mV for OER at 100 and 500 mA cm^(–2), respectively, along with high stability of 150 h at 100 mA cm^(–2). Furthermore, for overall water splitting, it presents a low cell voltage of 1.529 V at 10 mA cm^(–2), accompanied by excellent stability at 100 mA cm^(–2) for 100 h. This work sheds a light on exploring highly active and stable bifunctional electrocatalysts by the interface engineering coupled with shell-protection strategy. 展开更多
关键词 Interface engineering Protective shell Manganese compound Nickel sulfides BIFUNCTIONAL Water splitting
下载PDF
Principle and engineering application of pressure relief gas drainage in low permeability outburst coal seam 被引量:15
16
作者 LIU lin CHENG Yuan-ping +2 位作者 WANG Hai-feng WANG Liang MA Xian-qin 《Mining Science and Technology》 EI CAS 2009年第3期342-345,351,共5页
With the increase in mining depth, the danger of coal and gas outbursts increases.In order to drain coal gas effectively and to eliminate the risk of coal and gas outbursts, we used a specific number of penetration bo... With the increase in mining depth, the danger of coal and gas outbursts increases.In order to drain coal gas effectively and to eliminate the risk of coal and gas outbursts, we used a specific number of penetration boreholes for draining of pressure relief gas.Based on the principle of overlying strata movement, deformation and pressure relief, a good effect of gas drainage was obtained.The practice in the Panyi coal mine has shown that, after mining the C11coal seam as the protective layer, the relative expansion deformation value of the protected layer C13 reached 2.63%, The permeability coefficient increased 2880 times, the gas drainage rate of the C13 coal seam increased to more than 60%, the amount of gas was reduced from 13.0 to 5.2 m3/t and the gas pressure declined from 4.4 to 0.4 MPa, which caused the danger the outbursts in the coal seams to be eliminated.The result was that we achieved a safe and highly efficient mining operation of the C13 coal seam. 展开更多
关键词 protective layer mining technology principle drainage of pressure relief gas engineering application
下载PDF
Effects of Social Security Spending on Income Distribution and Poverty Reduction in China 被引量:23
17
作者 Yue Ximing Zhong Cong 《China Economist》 2020年第4期100-131,共32页
Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reducti... Reasonable income distribution and eradication of rural poverty are vital for building a moderately prosperous society in all respects in China.This paper primarily examines the income distribution and poverty reduction effects of social security spending.Market income and redistribution policies are two determinants of income gaps.Based on CHIP2018 household survey data,we find that inadequate income redistribution policies have contributed to yawning income gaps,and that social security spending is more redistributive than personal income tax and social security contributions.After estimating the redistribution effects of social security spending and itemized incomes,we find that pension payments have contributed the most to household income gaps,and that subsistence protection and rural pension payments help improve income distribution.With respect to the poverty reduction effects of social security spending,we have estimated China’s current poverty incidence and the poverty reduction effects of pension payments,healthcare,and educational allowances with CHIP2018 data,and discover that an increase in social security spending may effectively reduce rural poverty.In building a moderately prosperous society in all respects,China should increase social security spending,focusing on specific target groups,and promote the role of social security spending in regulating income distribution and offering social protection to rural residents. 展开更多
关键词 income distribution market income personal income tax social security spending poverty reduction through social protection
下载PDF
Changes and Adjustments:The Rule of Law Response to Medical Institution Data Compliance
18
作者 Long Keyu 《科技与法律(中英文)》 CSSCI 2024年第5期110-122,共13页
Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual int... Medical institution data compliance is an exogenous product of the digital society,serving as a crucial means to maintain and balance the relationship between data protection and data sharing,as well as individual interests and public interests.The implementation of the Healthy China Initiative greatly benefits from its practical significance.In practice,data from medical institutions takes varied forms,including personally identifiable data collected before diagnosis and treatment,clinical medical data generated during diagnosis and treatment,medical data collected in public health management,and potential medical data generated in daily life.In the new journey of comprehensively promoting the Chinese path to modernization,it is necessary to clarify the shift from an individual-oriented to a societal-oriented value system,highlighting the reinforcing role of the trust concept.Guided by the principle of minimizing data utilization,the focus is on the new developments and changes in medical institution data in the postpandemic era.This involves a series of measures such as fulfilling the obligation of notification and consent,specifying the scope of data collection and usage,strengthening the standardized use of relevant technical measures,and establishing a sound legal responsibility system for data compliance.Through these measures,a flexible and efficient medical institution data compliance system can be constructed. 展开更多
关键词 medical institution data privacy protection data security compliance governance
下载PDF
Trust Model Based on Structured Protection for High Level Security System 被引量:1
19
作者 Liao Jianhua Zhao Yong Zhan Jing 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 展开更多
关键词 trusted computing security assurance structured protection
下载PDF
Research on Copyright Protection Method of Material Genome Engineering Data Based on Zero-Watermarking 被引量:2
20
作者 Lulu Cui Yabin Xu 《Journal on Big Data》 2020年第2期53-62,共10页
In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermark... In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology.First,the important attribute values are selected from the materials genome engineering database;then,use the method of remainder to group the selected attribute values and extract eigenvalues;then,the eigenvalues sequence is obtained by the majority election method;finally,XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center.When a copyright dispute requires copyright authentication for the database to be detected.First,the zero-watermarking construction algorithm is used to obtain an eigenvalues sequence;then,this sequence is XORed with the watermarking information stored in the third-party authentication center to obtain copyright information to-be-detected.Finally,the ownership is determined by calculating the similarity between copyright information to-be-detected and copyright information that has practical significance.The experimental result shows that the zero-watermarking method proposed in this paper can effectively resist various common attacks,and can well achieve the copyright protection of material genome engineering database. 展开更多
关键词 Material genome engineering copyright protection ZERO-WATERMARKING majority voting
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部