期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
一种船舶作业中原始数据质量的实用评估方法
1
作者 Gang Chen Jie Cai +1 位作者 Niels Gorm Maly Rytter Marie Lützen 《哈尔滨工程大学学报(英文版)》 CSCD 2023年第2期370-380,共11页
With the current revolution in Shipping 4.0, a tremendous amount of data is accumulated during vessel operations. Dataquality (DQ) is becoming more and more important for the further digitalization and effective decis... With the current revolution in Shipping 4.0, a tremendous amount of data is accumulated during vessel operations. Dataquality (DQ) is becoming more and more important for the further digitalization and effective decision-making in shippingindustry. In this study, a practical DQ assessment method for raw data in vessel operations is proposed. In this method,specific data categories and data dimensions are developed based on engineering practice and existing literature. Concretevalidation rules are then formed, which can be used to properly divide raw datasets. Afterwards, a scoring method is usedfor the assessment of the data quality. Three levels, namely good, warning and alarm, are adopted to reflect the final dataquality. The root causes of bad data quality could be revealed once the internal dependency among rules has been built,which will facilitate the further improvement of DQ in practice. A case study based on the datasets from a Danish shippingcompany is conducted, where the DQ variation is monitored, assessed and compared. The results indicate that theproposed method is effective to help shipping industry improve the quality of raw data in practice. This innovationresearch can facilitate shipping industry to set a solid foundation at the early stage of their digitalization journeys. 展开更多
关键词 Data quality Vessel operations SHIPPING Validation rules Noon reports
下载PDF
SVR-Miner:Mining Security Validation Rules and Detecting Violations in Large Software 被引量:1
2
作者 梁彬 谢素斌 +2 位作者 石文昌 梁朝晖 陈红 《China Communications》 SCIE CSCD 2011年第4期84-98,共15页
For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p... For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently. 展开更多
关键词 static analysis data mining automated validation rules extraction automated violation detection
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部