期刊文献+
共找到312篇文章
< 1 2 16 >
每页显示 20 50 100
Experimentation with Personal Identifiable Information 被引量:3
1
作者 Sabah Al-Fedaghi Abdul Aziz Rashid Al-Azmi 《Intelligent Information Management》 2012年第4期123-133,共11页
In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individua... In this paper, actual personal identifiable information (PII) texts are analyzed to capture different types of PII sensitivities. The sensitivity of PII is one of the most important factors in determining an individual’s perception of privacy. A “gradation” of sensitivity of PII can be used in many applications, such as deciding the security level that controls access to data and developing a measure of trust when self-disclosing PII. This paper experiments with a theoretical analysis of PII sensitivity, defines its scope, and puts forward possible methodologies of gradation. A technique is proposed that can be used to develop a classification scheme of personal information depending on types of PII. Some PII expresses relationships among persons, some specifies aspects and features of a person, and some describes relationships with nonhuman objects. Results suggest that decomposing PII into privacy-based portions helps in factoring out non-PII information and focusing on a proprietor’s related information. The results also produce a visual map of the privacy sphere that can be used in approximating the sensitivity of different territories of privacy-related text. Such a map uncovers aspects of the proprietor, the proprietor’s relationship to social and physical entities, and the relationships he or she has with others. 展开更多
关键词 PERSONAL identifiable INFORMATION PUBLIC POLICY Issues PRIVACY Sensitivity
下载PDF
TPII:tracking personally identifiable information via user behaviors in HTTP traffic 被引量:1
2
作者 Yi LIU Tian SONG Lejian LIAO 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第3期175-187,共13页
It is widely common that mobile applications collect non-critical personally identifiable information(PII)from users'devices to the cloud by application service providers(ASPs)in a positive manner to provide preci... It is widely common that mobile applications collect non-critical personally identifiable information(PII)from users'devices to the cloud by application service providers(ASPs)in a positive manner to provide precise and recommending services.Meanwhile,Internet service providers(ISPs)or local network providers also have strong requirements to collect PIIs for finer-grained traffic control and security services.However,it is a challenge to locate PIIs accurately in the massive data of network traffic just like looking a needle in a haystack.In this paper,we address this challenge by presenting an efficient and light-weight approach,namely TPII,which can locate and track PIIs from the HTTP layer rebuilt from raw network traffics.This approach only collects three features from HTTP fields as users'behaviors and then establishes a tree-based decision model to dig PIIs efficiently and accurately.Without any priori knowledge,TPII can identify any types of PIIs from any mobile applications,which has a broad vision of applications.We evaluate the proposed approach on a real dataset collected from a campus network with more than 13k users.The experimental results show that the precision and recall of TPII are 91.72%and 94.51%respectively and a parallel implementation of TPII can achieve 213 million records digging and labelling within one hour,reaching near to support 1Gbps wirespeed inspection in practice.Our approach provides network service providers a practical way to collect PIIs for better services. 展开更多
关键词 network traffic analysis personally identifiable information privacy leakage mobile applications HTTP
原文传递
Fully distributed identity-based threshold signatures with identifiable aborts
3
作者 Yan JIANG Youwen ZHU +1 位作者 Jian WANG Xingxin LI 《Frontiers of Computer Science》 SCIE EI CSCD 2023年第5期179-195,共17页
Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Neverthel... Identity-based threshold signature(IDTS)is a forceful primitive to protect identity and data privacy,in which parties can collaboratively sign a given message as a signer without reconstructing a signing key.Nevertheless,most IDTS schemes rely on a trusted key generation center(KGC).Recently,some IDTS schemes can achieve escrow-free security against corrupted KGC,but all of them are vulnerable to denial-of-service attacks in the dishonest majority setting,where cheaters may force the protocol to abort without providing any feedback.In this work,we present a fully decentralized IDTS scheme to resist corrupted KGC and denialof-service attacks.To this end,we design threshold protocols to achieve distributed key generation,private key extraction,and signing generation which can withstand the collusion between KGCs and signers,and then we propose an identification mechanism that can detect the identity of cheaters during key generation,private key extraction and signing generation.Finally,we formally prove that the proposed scheme is threshold unforgeability against chosen message attacks.The experimental results show that the computation time of both key generation and signing generation is<1 s,and private key extraction is about 3 s,which is practical in the distributed environment. 展开更多
关键词 threshold signatures single points of failure identifiable aborts
原文传递
Rainbow:reliable personally identifiable information retrieval across multi-cloud
4
作者 Zishuai Song Hui Ma +2 位作者 Shuzhou Sun Yansen Xin Rui Zhang 《Cybersecurity》 EI CSCD 2023年第4期88-108,共21页
Personally identifiable information(PII)refers to any information that links to an individual.Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.Buildin... Personally identifiable information(PII)refers to any information that links to an individual.Sharing PII is extremely useful in public affairs yet hard to implement due to the worries about privacy violations.Building a PII retrieval service over multi-cloud,which is a modern strategy to make services stable where multiple servers are deployed,seems to be a promising solution.However,three major technical challenges remain to be solved.The first is the privacy and access control of PII.In fact,each entry in PII can be shared to different users with different access rights.Hence,flexible and fine-grained access control is needed.Second,a reliable user revocation mechanism is required to ensure that users can be revoked efficiently,even if few cloud servers are compromised or collapse,to avoid data leakage.Third,verifying the correctness of received PII and locating a misbehaved server when wrong data are returned is crucial to guarantee user’s privacy,but challenging to realize.In this paper,we propose Rainbow,a secure and practical PII retrieval scheme to solve the above issues.In particular,we design an important cryptographic tool,called Reliable Outsourced Attribute Based Encryption(ROABE)which provides data privacy,flexible and fine-grained access control,reliable immediate user revocation and verification for multiple servers simultaneously,to support Rainbow.Moreover,we present how to build Rainbow with ROABE and several necessary cloud techniques in real world.To evaluate the performance,we deploy Rainbow on multiple mainstream clouds,namely,AWS,GCP and Microsoft Azure,and experiment in browsers on mobile phones and computers.Both theoretical analysis and experimental results indicate that Rainbow is secure and practical. 展开更多
关键词 Personally identifiable information Data privacy Flexible access control Reliable user revocation Verification
原文传递
Ad Blockers & Online Privacy: A Comparative Analysis of Privacy Enhancing Technologies (PET)
5
作者 Siddharth M. Madikeri Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第5期378-395,共18页
Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, renderin... Online tracking mechanisms employed by internet companies for user profiling and targeted advertising raise major privacy concerns. Despite efforts to defend against these mechanisms, they continue to evolve, rendering many existing defences ineffective. This study performs a large-scale measurement of online tracking mechanisms across a large pool of websites using the OpenWPM (Open Web Privacy Measurement) platform. It systematically evaluates the effectiveness of several ad blockers and underlying Privacy Enhancing Technologies (PET) that are primarily used to mitigate different tracking techniques. By quantifying the strengths and limitations of these tools against modern tracking methods, the findings highlight gaps in existing privacy protections. Actionable recommendations are provided to enhance user privacy defences, guide tool developers and inform policymakers on addressing invasive online tracking practices. 展开更多
关键词 Privacy Enhancing Technology (PET) Personally identifiable Information (PII) OpenWPM Web Privacy
下载PDF
Re-identifying beef cattle using improved AlignedReID++
6
作者 YING Xiaoyi ZHAO Jizheng +7 位作者 YANG Lingling ZHOU Xinyi WANG Lei GAO Yannian ZAN Linsen YANG Wucai LIU Han SONG Huaibo 《农业工程学报》 EI CAS CSCD 北大核心 2024年第18期132-146,共15页
Accurate and continuous identification of individual cattle is crucial to precision farming in recent years.It is also the prerequisite to monitor the individual feed intake and feeding time of beef cattle at medium t... Accurate and continuous identification of individual cattle is crucial to precision farming in recent years.It is also the prerequisite to monitor the individual feed intake and feeding time of beef cattle at medium to long distances over different cameras.However,beef cattle can tend to frequently move and change their feeding position during feeding.Furthermore,the great variations in their head direction and complex environments(light,occlusion,and background)can also lead to some difficulties in the recognition,particularly for the bio-similarities among individual cattle.Among them,AlignedReID++model is characterized by both global and local information for image matching.In particular,the dynamically matching local information(DMLI)algorithm has been introduced into the local branch to automatically align the horizontal local information.In this research,the AlignedReID++model was utilized and improved to achieve the better performance in cattle re-identification(ReID).Initially,triplet attention(TA)modules were integrated into the BottleNecks of ResNet50 Backbone.The feature extraction was then enhanced through cross-dimensional interactions with the minimal computational overhead.Since the TA modules in AlignedReID++baseline model increased the model size and floating point operations(FLOPs)by 0.005 M and 0.05 G,the rank-1 accuracy and mean average precision(mAP)were improved by 1.0 percentage points and 2.94 percentage points,respectively.Specifically,the rank-1 accuracies were outperformed by 0.86 percentage points and 0.12 percentage points,respectively,compared with the convolution block attention module(CBAM)and efficient channel attention(ECA)modules,although 0.94 percentage points were lower than that of squeeze-and-excitation(SE)modules.The mAP metric values were exceeded by 0.22,0.86 and 0.12 percentage points,respectively,compared with the SE,CBAM,and ECA modules.Additionally,the Cross-Entropy Loss function was replaced with the CosFace Loss function in the global branch of baseline model.CosFace Loss and Hard Triplet Loss were jointly employed to train the baseline model for the better identification on the similar individuals.AlignedReID++with CosFace Loss was outperformed the baseline model by 0.24 and 0.92 percentage points in the rank-1 accuracy and mAP,respectively,whereas,AlignedReID++with ArcFace Loss was exceeded by 0.36 and 0.56 percentage points,respectively.The improved model with the TA modules and CosFace Loss was achieved in a rank-1 accuracy of 94.42%,rank-5 accuracy of 98.78%,rank-10 accuracy of 99.34%,mAP of 63.90%,FLOPs of 5.45 G,frames per second(FPS)of 5.64,and model size of 23.78 M.The rank-1 accuracies were exceeded by 1.84,4.72,0.76 and 5.36 percentage points,respectively,compared with the baseline model,part-based convolutional baseline(PCB),multiple granularity network(MGN),and relation-aware global attention(RGA),while the mAP metrics were surpassed 6.42,5.86,4.30 and 7.38 percentage points,respectively.Meanwhile,the rank-1 accuracy was 0.98 percentage points lower than TransReID,but the mAP metric was exceeded by 3.90 percentage points.Moreover,the FLOPs of improved model were only 0.05 G larger than that of baseline model,while smaller than those of PCB,MGN,RGA,and TransReID by 0.68,6.51,25.4,and 16.55 G,respectively.The model size of improved model was 23.78 M,which was smaller than those of the baseline model,PCB,MGN,RGA,and TransReID by 0.03,2.33,45.06,14.53 and 62.85 M,respectively.The inference speed of improved model on a CPU was lower than those of PCB,MGN,and baseline model,but higher than TransReID and RGA.The t-SNE feature embedding visualization demonstrated that the global and local features were achieve in the better intra-class compactness and inter-class variability.Therefore,the improved model can be expected to effectively re-identify the beef cattle in natural environments of breeding farm,in order to monitor the individual feed intake and feeding time. 展开更多
关键词 method IDENTIFY beef cattle precision livestock re-identification AlignedReID++ deep learning
下载PDF
Designing a Secure and Scalable Data Sharing Mechanism Using Decentralized Identifiers(DID)
7
作者 Iuon-Chang Lin I-Ling Yeh +2 位作者 Ching-Chun Chang Jui-Chuan Liu Chin-Chen Chang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期809-822,共14页
Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperabi... Centralized storage and identity identification methods pose many risks,including hacker attacks,data misuse,and single points of failure.Additionally,existing centralized identity management methods face interoperability issues and rely on a single identity provider,leaving users without control over their identities.Therefore,this paper proposes a mechanism for identity identification and data sharing based on decentralized identifiers.The scheme utilizes blockchain technology to store the identifiers and data hashed on the chain to ensure permanent identity recognition and data integrity.Data is stored on InterPlanetary File System(IPFS)to avoid the risk of single points of failure and to enhance data persistence and availability.At the same time,compliance with World Wide Web Consortium(W3C)standards for decentralized identifiers and verifiable credentials increases the mechanism’s scalability and interoperability. 展开更多
关键词 Self-sovereign identity decentralized identifier blockchain
下载PDF
Analysis on Genetic Diversity of 40 Flowering Cherry Cultivars and Construction of Molecular ID Based on SSR Markers
8
作者 Chaoren Nie Xiaoguo Xu +3 位作者 Xiaoqin Zhang Hongbing Sun Jingya Yu Wensheng Xia 《Agricultural Sciences》 2024年第2期256-273,共18页
Studying on the genetic diversity and genetic relationship of flowering cherry cultivars is extremely important for germplasm conservation, cultivar identification and breeding. Flowering cherry is widely cultivated a... Studying on the genetic diversity and genetic relationship of flowering cherry cultivars is extremely important for germplasm conservation, cultivar identification and breeding. Flowering cherry is widely cultivated as an important woody ornamental plant in worldwide, especially Japan, China. However, owning to the morphological similarity, many cultivars are distinguished hardly in non-flowering season. Here, we evaluated the genetic diversity and genetic relationship of 40 flowering cherry cultivars, which are mainly cultivated in China. We selected 13 polymorphicprimers to amplify to allele fragments with fluorescent-labeled capillary electrophoresis technology. The population structure analysis results show that these cultivars could be divided into 4 subpopulations. At the population level, N<sub>a</sub> and N<sub>e</sub> were 6.062, 4.326, respectively. H<sub>o</sub> and H<sub>e</sub> were 0.458 and 0.670, respectively. The Shannon’s information index (I) was 1.417. The Pop3, which originated from P. serrulata, had the highest H<sub>o</sub>, H<sub>e</sub>, and I among the 4 subpopulations. AMOVA showed that only 4% of genetic variation came from populations, the 39% variation came from individuals and 57% (p < 0.05) came from intra-individuals. 5 polymorphic SSR primers were selected to construct molecular ID code system of these cultivars. This analysis on the genetic diversity and relationship of the 40 flowering cherry cultivars will help to insight into the genetic background, relationship of these flowering cherry cultivars and promote to identify similar cultivars. 展开更多
关键词 Flowering Cherry SSR Genetic Relationship Molecular ID Identifying Cultivars
下载PDF
Improved Euler method for the interpretation of potential data based on the ratio of the vertical fi rst derivative to analytic signal 被引量:2
9
作者 郭灿灿 熊盛青 +1 位作者 薛典军 王林飞 《Applied Geophysics》 SCIE CSCD 2014年第3期331-339,352,共10页
We propose a new automatic method for the interpretation of potential fi eld data, called the RDAS–Euler method, which is based on Euler's deconvolution and analytic signal methods. The proposed method can estimate ... We propose a new automatic method for the interpretation of potential fi eld data, called the RDAS–Euler method, which is based on Euler's deconvolution and analytic signal methods. The proposed method can estimate the horizontal and vertical extent of geophysical anomalies without prior information of the nature of the anomalies(structural index). It also avoids inversion errors because of the erroneous choice of the structural index N in the conventional Euler deconvolution method. The method was tested using model gravity anomalies. In all cases, the misfi t between theoretical values and inversion results is less than 10%. Relative to the conventional Euler deconvolution method, the RDAS–Euler method produces inversion results that are more stable and accurate. Finally, we demonstrate the practicability of the method by applying it to Hulin Basin in Heilongjiang province, where the proposed method produced more accurate data regarding the distribution of faults. 展开更多
关键词 Euler deconvolution analytic signal edge identifi cation structural index
下载PDF
乙嘧酚磺酸酯中杂质的GC-MS分析 被引量:2
10
作者 宁艳利 张皋 赵效文 《分析测试学报》 CAS CSCD 北大核心 2008年第S1期263-265,269,共4页
The structure of bupirimate was identified by using MS and NMR.The structures of 10 impurities were identified by using GC-MS.The method provides a powerful tool for structure analysis special in complex samples.
关键词 bupirimate IMPURITIES structural IDENTIFY MS NMR GC-MS
下载PDF
蓝牙服务搜索的设计与实现 被引量:4
11
作者 马争 郝云飞 《电子学报》 EI CAS CSCD 北大核心 2003年第11期1758-1760,共3页
本文介绍蓝牙技术中服务搜索基本功能及其实现 .通过对蓝牙硬拷贝电缆替代课题研究中服务搜索的设计和实现 ,提供了一个在蓝牙环境下的服务搜索的方法和思路 .
关键词 服务端 客户端 HCRP(Hardeopy Cable REPLACEMENT Protocol) UUID(Universal UNIQUE Identifier) SDP(Service Discovery Protocol)
下载PDF
数字版权保护中DCI编码方案及数字证书研究 被引量:4
12
作者 杨树林 孙丽 胡洁萍 《北京印刷学院学报》 2012年第6期38-41,共4页
数字版权标志符为数字内容在互联网上提供唯一的版权身份标志,为确保在网络环境中能够精准定位和检索数字作品、确认版权主体提供了技术基础。建立数字版权标志符体系是我国数字版权管理发展的迫切要求。通过研究DCI(数字版权标志符)的... 数字版权标志符为数字内容在互联网上提供唯一的版权身份标志,为确保在网络环境中能够精准定位和检索数字作品、确认版权主体提供了技术基础。建立数字版权标志符体系是我国数字版权管理发展的迫切要求。通过研究DCI(数字版权标志符)的概念、设计原则,分析了国外相关研究的现状,提出了适合我国版权保护的DCI编码方案,并给出了应用于移动互联网的加密机制、数字证书及DCI嵌入方案。研究结果表明,采用上述方法,兼容性好,易于与国际上的DOI(digital object identifier)接轨,加密机制及数字证书的设计适合在移动互联网上应用。 展开更多
关键词 数字版权保护 DCI(digital COPYRIGHT identifier) 椭圆曲线密码 数字证书
下载PDF
The Research about A Regional Drought Identifying System Based on Dynamic Drought Index 被引量:1
13
作者 王俊 胡继超 +1 位作者 袁学所 吴有华 《Meteorological and Environmental Research》 CAS 2010年第9期94-96,共3页
With the data of daily precipitation and daily evaporation,dynamic drought index was calculated and compared with the identification standard of drought grade to qualify the severity of drought.According to the dynami... With the data of daily precipitation and daily evaporation,dynamic drought index was calculated and compared with the identification standard of drought grade to qualify the severity of drought.According to the dynamic drought index,a regional drought identifying system was developed for the watershed between the reach of the Yangtze River and Huaihe River in Anhui Province by using VC++ working platform and Access database.This drought identifying system would be very useful to forecast and early warn the happening of drought in this area. 展开更多
关键词 Drought Index Drought identifying system Daily precipitation China
下载PDF
Heterogeneity in the regenerative abilities of central nervous system axons within species: why do some neurons regenerate better than others? 被引量:1
14
作者 William Rodemer Jianli Hu +1 位作者 Michael E.Selzer Michael I.Shifman 《Neural Regeneration Research》 SCIE CAS CSCD 2020年第6期996-1005,共10页
Some neurons,especially in mammalian peripheral nervous system or in lower vertebrate or in vertebrate central nervous system(CNS)regenerate after axotomy,while most mammalian CNS neurons fail to regenerate.There is a... Some neurons,especially in mammalian peripheral nervous system or in lower vertebrate or in vertebrate central nervous system(CNS)regenerate after axotomy,while most mammalian CNS neurons fail to regenerate.There is an emerging consensus that neurons have different intrinsic regenerative capabilities,which theoretically could be manipulated therapeutically to improve regeneration.Population-based comparisons between"good regenerating"and"bad regenerating"neurons in the CNS and peripheral nervous system of most vertebrates yield results that are inconclusive or difficult to interpret.At least in part,this reflects the great diversity of cells in the mammalian CNS.Using mammalian nervous system imposes several methodical limitations.First,the small sizes and large numbers of neurons in the CNS make it very difficult to distinguish regenerating neurons from non-regenerating ones.Second,the lack of identifiable neurons makes it impossible to correlate biochemical changes in a neuron with axonal damage of the same neuron,and therefore,to dissect the molecular mechanisms of regeneration on the level of single neurons.This review will survey the reported responses to axon injury and the determinants of axon regeneration,emphasizing non-mammalian model organisms,which are often under-utilized,but in which the data are especially easy to interpret. 展开更多
关键词 AXONAL regeneration identifiable NEURONS intrinsic factors LAMPREY Mauthner CELL Müller CELL neuronal death non-mammalian model organisms spinal cord injury zebrafish
下载PDF
贵州汉族人群15个STR基因座遗传多态性研究 被引量:3
15
作者 胡锡阶 刘祖林 +1 位作者 余丽梅 万卫红 《遵义医学院学报》 2017年第6期599-602,608,共5页
目的对贵州汉族人群在Identifiler体系中的15个短串连重复序列(STR)基因座进行遗传多态性调查。方法采用荧光标记STR-PCR复合扩增、毛细管电泳基因分型技术,对1 000名贵州汉族人群无关个体进行15个STR基因座的基因分型,计算其等位基因... 目的对贵州汉族人群在Identifiler体系中的15个短串连重复序列(STR)基因座进行遗传多态性调查。方法采用荧光标记STR-PCR复合扩增、毛细管电泳基因分型技术,对1 000名贵州汉族人群无关个体进行15个STR基因座的基因分型,计算其等位基因频率、杂合度(H)、匹配概率(PM)、个人识别力(DP)、非父排除率(PE)、多态信息总量(PIC)、父权指数(PI)等多态性参数,并进行统计学分析。结果在贵州汉族人群1 000名无关个体中共检出178个等位基因,其频率分布为0.000 5~0.531 5。15个STR基因座的基因型分布进行χ~2检验符合Hardy-Weinberg平衡定律(P>0.05)。杂合度为0.603 0~0.880 0;个人识别力为0.786 1~0.966 6,累积DP>0.999 999 999;匹配概率为0.033 4~0.213 9,累积PM=1.198×10^(-17);三联体非父排除率为0.294 5~0.754 8,累积CPE=0.999 998 925;二联体非父排除率为0.195 9~0.571 6,累积CPE=0.999 760 600;多态信息含量为0.545 1~0.849 2,累积PIC=0.999 999 999;亲权指数为1.2 594~4.1 667。结论贵州汉族人群检测的15个STR基因座具有高度多态性,是较理想的遗传标记,统计的等位基因频率等基础数据可为本地区的个人识别、三联体亲子鉴定及群体遗传学研究提供依据,但在二联体亲子鉴定中运用存在一定风险。 展开更多
关键词 IDENTIFIER 贵州汉族人群 短串联重复序列 遗传多态性
下载PDF
Office Word文档溯源方法研究 被引量:5
16
作者 罗文华 孙道宁 《警察技术》 2015年第4期45-47,共3页
基于最广泛使用的Microsoft Office Word文件结构格式分析,集中关注编辑过程还原主题,立足document.xml与core.xml文件内容,挖掘OOXML格式中独特的RI值变化规则,进而完成文件来源的取证分析,并通过自主研发的软件使得分析工作智能化工... 基于最广泛使用的Microsoft Office Word文件结构格式分析,集中关注编辑过程还原主题,立足document.xml与core.xml文件内容,挖掘OOXML格式中独特的RI值变化规则,进而完成文件来源的取证分析,并通过自主研发的软件使得分析工作智能化工具化。电子数据取证实践证明,所述方法准确高效。 展开更多
关键词 OFFICE Word 溯源分析 document.xml core.xml REVISION IDENTIFIER
下载PDF
教师绩效评估中的评估者目标对评估结果的影响研究
17
作者 林绚晖 扈岩 +1 位作者 朱睿 车宏生 《河南大学学报(社会科学版)》 CSSCI 北大核心 2008年第6期153-158,共6页
目前,在绩效评估研究中缺乏评估者目标理论的实证研究。本研究在"假设对象"(Paper People)的实验情境下,通过509名大学生被试对教师绩效的评估,探讨了评估者目标对评估结果的影响,并验证了Murphy等人开发的评估者目标问卷的... 目前,在绩效评估研究中缺乏评估者目标理论的实证研究。本研究在"假设对象"(Paper People)的实验情境下,通过509名大学生被试对教师绩效的评估,探讨了评估者目标对评估结果的影响,并验证了Murphy等人开发的评估者目标问卷的信效度。研究表明:绩效评估中确定不足目标对总体评估结果有负向影响,确定优势目标对总体评估结果有正向影响;确定优势目标越高,总体准确度越低;确定不足目标对区分被评个体有正向影响。 展开更多
关键词 评估者目标 确定不足(Identify Weaknesses) 确定优势(Identify strengths)
下载PDF
NON-UNIFORM LINEAR ARRAY CONFIGURATION FOR MIMO RADAR
18
作者 彭珍妮 贲德 +1 位作者 张弓 顾海光 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2011年第2期152-156,共5页
Array configuration of multiple-input multiple-output (MIMO) radar with non-uniform linear array (NLA) is proposed. Unlike a standard phased-array radar where NLA is used to generate thinner beam patterns, in MIMO... Array configuration of multiple-input multiple-output (MIMO) radar with non-uniform linear array (NLA) is proposed. Unlike a standard phased-array radar where NLA is used to generate thinner beam patterns, in MIMO radar the property of NLA is exploited to get more distinct virtual array elements so as to improve pa- rameter identifiability, which means the maximum number of targets that can be uniquely identified by the radar. A class of NLA called minimum redundancy linear array (MRLA) is employed and a new method to construct large MRLAs is descrihed. The numerical results verify that compared to uniform linear array (ULA) MIMO radars, NLA MIMO radars can retain the same parameter identifiability with fewer physical antennas and achieve larger aperture length and lower Cramer-Rao bound with the same number of the physical antennas. 展开更多
关键词 MIMO radar parameter identifiability non-uniform linear array virtual array element array con-figuration
下载PDF
IDentifier DNA分型盒(炎黄34)的法医学验证及应用评估
19
作者 高林林 谢炜 +4 位作者 朱素娟 李达 王琴 洪亮 李佑英 《法医学杂志》 CAS CSCD 2023年第6期579-585,共7页
目的 测试IDentifier DNA分型盒(炎黄34)的技术性能指标,评估其法医学应用价值。方法 根据《法庭科学人类荧光标记STR复合扩增检测试剂质量基本要求》(GB/T 37226—2018),从种属特异性、分型准确性、灵敏度、适应性、耐受性、一致性、... 目的 测试IDentifier DNA分型盒(炎黄34)的技术性能指标,评估其法医学应用价值。方法 根据《法庭科学人类荧光标记STR复合扩增检测试剂质量基本要求》(GB/T 37226—2018),从种属特异性、分型准确性、灵敏度、适应性、耐受性、一致性、均衡性、反应条件验证、混合样本、稳定性、批间差11个方面对IDentifier DNA分型盒(炎黄34)进行测试。比较IDentifier DNA分型盒(炎黄34)与Power Plex~?Fusion 6C系统、Versa Plex~?27PY系统、Veri Filer~(TM) Plus PCR扩增试剂盒的系统效能。使用IDentifier DNA分型盒(炎黄34)检测日常案件中的拭子类生物检材,观察其STR检验结果 。结果 IDentifier DNA分型盒(炎黄34)具有良好的种属特异性、分型准确性、适应性、耐受性和均衡性,灵敏度可达0.062 5 ng,能检测案件中不同类型的检材、降解检材及混有抑制剂的检材,对混合比例为4∶1以内的样本均能获得完整分型。该试剂盒的系统效能非常高,TDP可达1-1.08×10~(-37),CPE_(trio)和CPE_(duo)分别可达1-5.47×10~(-14)和1-6.43×10~(-9)。针对案件中的接触类生物检材,其有效检出率可达21.05%。针对亲缘关系鉴定,单亲鉴定和全同胞鉴定的系统效能均得到了有效提高。结论 IDentifier DNA分型盒(炎黄34)的上述性能指标符合要求,可用于个体识别及亲权鉴定,适合在法庭科学领域应用。 展开更多
关键词 法医遗传学 短串联重复序列 IDentifier DNA分型盒(炎黄34) 性能验证 亲缘关系 个体识别
下载PDF
Analysis on the Landscape Image of Pingle Old Town in Chengdu City from the Perspective of City Image
20
作者 陈一 王霞 +1 位作者 周波 陈春华 《Journal of Landscape Research》 2009年第11期27-32,共6页
With Kevin Lynch's mode of analysis in The Image of the City,through field research and inductive analysis on the Pingle Old Town,the image of Chengdu Pingyuan Town represented by Pingle Town is summarized.Analysi... With Kevin Lynch's mode of analysis in The Image of the City,through field research and inductive analysis on the Pingle Old Town,the image of Chengdu Pingyuan Town represented by Pingle Town is summarized.Analysis and conclusion of the characteristics and identifiabilities of the traditional market town are made in five aspects,mainly including the path of the town,edge,district,central node and landmark,which provides a theoretical reference and example for preserving and shaping the traditional market town of region characteristic in Chengdu Plain. 展开更多
关键词 IMAGE Pingle TOWN IDENTIFIABILITY
下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部