期刊文献+
共找到20篇文章
< 1 >
每页显示 20 50 100
信息可信度测量的内容与途径 被引量:9
1
作者 邓发云 《管理观察》 2009年第3期176-177,共2页
自有信息的概念以来,信息与决策就密不可分。但只有可信的信息才可能产生正确的决策,本文建立应用于信息服务领域,尤其是适用于信息检索与提供的信息可信度评价指标。包括客观性、准确性、权威性、可证实性,论文中还对每个指标的概念、... 自有信息的概念以来,信息与决策就密不可分。但只有可信的信息才可能产生正确的决策,本文建立应用于信息服务领域,尤其是适用于信息检索与提供的信息可信度评价指标。包括客观性、准确性、权威性、可证实性,论文中还对每个指标的概念、含义、使用与检验方式给出详细的说明;并设计出基于这些指标的整体评价、测量图表。 展开更多
关键词 信息可信 信息提供 可信度指标 可信测量
下载PDF
测试不确定度比与测量结果可信度的关系以及实践中的要求 被引量:4
2
作者 陈怀艳 王国华 李志强 《电子测量与仪器学报》 CSCD 2005年第1期14-20,共7页
本文对"测试不确定度比"的内涵以及它与测量结果可信度之间的关系进行了探讨。测试不确定度比是定量描述测量标准或检测设备的准确度超过被校件或被测件的程度的术语 ,在给定的技术指标分布和置信区间的情况下 ,它是影响测量... 本文对"测试不确定度比"的内涵以及它与测量结果可信度之间的关系进行了探讨。测试不确定度比是定量描述测量标准或检测设备的准确度超过被校件或被测件的程度的术语 ,在给定的技术指标分布和置信区间的情况下 ,它是影响测量结果可信度的决定性因素。本文还介绍了军事计量保障中使用的相关术语和定义、对测试不确定度比的要求以及国内外标准有关要求的异同 ,同时给出了实践中TUR不能满足要求时的警戒段对策。 展开更多
关键词 测试不确定度比 测量结果可信 合格判定 警戒段对策
下载PDF
基于UEFI的可信BIOS研究与实现 被引量:8
3
作者 周振柳 李铭 +1 位作者 翟伟斌 许榕生 《计算机工程》 CAS CSCD 北大核心 2008年第8期174-176,共3页
分析固件基本输入输出系统(BIOS)的安全需求,定义了可信BIOS概念。基于UEFI规范和可信计算机制设计UTBIOS体系结构。UTBIOS的实现以新一代符合UEFI规范的BIOS产品为基础,使用可信测量根核对BIOS运行和系统引导过程中各部件进行可信测量... 分析固件基本输入输出系统(BIOS)的安全需求,定义了可信BIOS概念。基于UEFI规范和可信计算机制设计UTBIOS体系结构。UTBIOS的实现以新一代符合UEFI规范的BIOS产品为基础,使用可信测量根核对BIOS运行和系统引导过程中各部件进行可信测量,构建操作系统运行前的可信链,讨论可信测量对BIOS引导过程的性能影响。 展开更多
关键词 可信计算 可信测量 基本输入输出系统
下载PDF
基于可信计算平台的信任链传递研究进展 被引量:27
4
作者 谭良 徐志伟 《计算机科学》 CSCD 北大核心 2008年第10期15-18,共4页
信任链传递问题是可信计算的基本问题。阐述了信任链传递在技术与理论方面的最新研究进展。通过分析信任链传递的技术方案、可信测量技术、信任链理论和信任链的可信度度量理论,提出了值得研究的理论与技术方向,包括:以可信静态测量、... 信任链传递问题是可信计算的基本问题。阐述了信任链传递在技术与理论方面的最新研究进展。通过分析信任链传递的技术方案、可信测量技术、信任链理论和信任链的可信度度量理论,提出了值得研究的理论与技术方向,包括:以可信静态测量、可信动态测量技术等为代表的信任链传递关键技术,以信任链层次理论模型、信任链传递中的信任损失度量理论和软件的动态可信度度量理论等为代表的基础理论。 展开更多
关键词 可信计算 信任链 可信测量 可信传递
下载PDF
太行安全BIOS可信体系结构与实现研究 被引量:1
5
作者 周振柳 李铭 +1 位作者 许榕生 宋东生 《计算机工程与应用》 CSCD 北大核心 2008年第18期76-79,共4页
分析了可信BIOS的安全需求,提出一种可信BIOS体系结构。使用消息摘要和数字签名技术验证系统引导阶段实体的完整性和真实性,构建了操作系统运行前的信任链。介绍了太行安全BIOS的可信部件、执行流程及其实现方法,讨论了可信测量对BIOS... 分析了可信BIOS的安全需求,提出一种可信BIOS体系结构。使用消息摘要和数字签名技术验证系统引导阶段实体的完整性和真实性,构建了操作系统运行前的信任链。介绍了太行安全BIOS的可信部件、执行流程及其实现方法,讨论了可信测量对BIOS引导过程的性能影响。 展开更多
关键词 可信BIOS 可信测量 安全需求 信任链
下载PDF
基于可信度的决策信息评价与选择 被引量:5
6
作者 邓发云 《商场现代化》 2009年第7期68-69,共2页
自有信息的概念以来,信息与决策就密不可分,信息是维持决策活动的依据。本文从决策信息的客观性、准确性、权威性、可证实性等方面建立的信息可信度评价指标与考察内容,并设计出基于这些指标的整体评价、测量图表。
关键词 决策信息 信息可信 可信度指标 可信测量
下载PDF
铁路信号计算机联锁全电子模块改进性研究 被引量:3
7
作者 刘庆 李宏伟 《铁道标准设计》 北大核心 2010年第11期104-106,共3页
深入分析计算机联锁重力继电器式执行电路在应用过程中暴露出的问题,并分析目前既有全电子制式模块的不足,针对提出问题,从电路结构、可信测量、自检测以及功能角度提出了一种改进方案,使全电子模块的设计不断趋于完善。
关键词 全电子 逻辑防护 可信测量 自检测
下载PDF
基于扩展ROM的信任根设备设计与实现
8
作者 鲁青远 郝福珍 牛峰 《计算机工程与设计》 CSCD 北大核心 2012年第6期2178-2181,2276,共5页
针对目前仍在大量使用的PC机上没有可信模块芯片,无法部署可信安全机制的现状,提出了基于扩展ROM的信任根设备。该设备将国产可信模块芯片TCM与PCI扩展ROM部署在同一块PCI板卡上,以BIOS插件的形式,在扩展ROM中完成对BIOS和OS Loader的... 针对目前仍在大量使用的PC机上没有可信模块芯片,无法部署可信安全机制的现状,提出了基于扩展ROM的信任根设备。该设备将国产可信模块芯片TCM与PCI扩展ROM部署在同一块PCI板卡上,以BIOS插件的形式,在扩展ROM中完成对BIOS和OS Loader的完整性认证。在分析了PCI/PNP扩展ROM机制、BIOS的引导流程、哈希值软硬件相结合的二级计算方式等的基础上,设计和实现了信任根设备,为可信计算技术在传统计算机上的部署提供了一种新的技术途径。 展开更多
关键词 可信计算 核心可信测量 信任链 可信计算模块 扩展只读存储器 基本输入输出系统 外围组件扩展接口/即插即用
下载PDF
汽轮机运行热耗的偏差算法 被引量:3
9
作者 金生祥 杜霄龙 《华北电力技术》 CAS 北大核心 1997年第12期14-17,共4页
热耗是衡量汽轮机组综合技术指标的主要参数,对电厂的安全经济运行具有重要的指导和参考作用。但由于测量装置精度以及现场客观条件的限制,使测量热耗的常规热力试验具有较高的不确定度。偏差算法可解决这一问题。用偏差算法求机组热... 热耗是衡量汽轮机组综合技术指标的主要参数,对电厂的安全经济运行具有重要的指导和参考作用。但由于测量装置精度以及现场客观条件的限制,使测量热耗的常规热力试验具有较高的不确定度。偏差算法可解决这一问题。用偏差算法求机组热耗不仅减少了需要测量的参数,更重要的是不需要测量流量——在热力试验中对热耗测量值影响最大的这一参数,因而提高了测量结果的置信度。 展开更多
关键词 汽轮机组 运行热耗 偏差算法 测量可信
下载PDF
WLR-60D温度表检定装置不确定度的评定 被引量:1
10
作者 李秋平 《吉林农业(下半月)》 2014年第12期28-29,共2页
用A类和B类评定方法对WLR-60D温度表检定装置进行不确定度评定,给出该装置的不确定度,依照其取值范围确保被检温度表测量值的可信度。
关键词 不确定度 标准偏差 测量可信
下载PDF
Behavior Measurement Model Based on Prediction and Control of Trusted Network 被引量:5
11
作者 Gong Bei Zhang Jianbiao +1 位作者 Shen Changxiang Zhang Xing 《China Communications》 SCIE CSCD 2012年第5期117-128,共12页
In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation... In order to construct the trusted network and realize the trust of network behavior,a new multi-dimensional behavior measurement model based on prediction and control is presented.By using behavior predictive equation,individual similarity function,group similarity function,direct trust assessment function,and generalized predictive control,this model can guarantee the trust of an end user and users in its network.Compared with traditional measurement model,the model considers different characteristics of various networks.The trusted measurement policies established according to different network environments have better adaptability.By constructing trusted group,the threats to trusted group will be reduced greatly.Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group.The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 展开更多
关键词 trusted network behavioral predic-tive control SIMILARITY trust measurement
下载PDF
An indoor positioning system for mobile target tracking based on VLC and IMU fusion 被引量:1
12
作者 Zou Qian Xia Weiwei +3 位作者 Zhang Jing Huang Bonan Yan Feng Shen Lianfeng 《Journal of Southeast University(English Edition)》 EI CAS 2018年第4期451-458,共8页
An indoor positioning system( IPS) is designed to realize positioning and tracking of mobile targets,by taking advantages of both the visible light communication( VLC) and inertial measurement unit( IMU). The platform... An indoor positioning system( IPS) is designed to realize positioning and tracking of mobile targets,by taking advantages of both the visible light communication( VLC) and inertial measurement unit( IMU). The platform of the IPS is designed,which consists of the light-emitting diode( LED)based transmitter,the receiver and the positioning server. To reduce the impact caused by measurement errors,both inertial sensing data and the received signal strength( RSS) from the VLC are calibrated. Then,a practical propagation model is established to obtain the distance between the transmitter and the receiver from the RSS measurements. Furthermore,a hybrid positioning algorithm is proposed by using the adaptive Kalman filter( AKF) and the weighted least squares( WLS)trilateration to estimate the positions of the mobile targets.Experimental results show that the developed IPS using the proposed hybrid positioning algorithm can extend the localization area of VLC,mitigate the IMU drifts and improve the positioning accuracy of mobile targets. 展开更多
关键词 indoor positioning system (IPS) visible light communication (VLC) inertial measurement unit (IMU) hybrid positioning algorithm
下载PDF
Numerical Characteristics of Fuzzy Numbers Based on Credibility Measure
13
作者 曾玲 《Journal of Donghua University(English Edition)》 EI CAS 2007年第2期240-243,247,共5页
The numerical characteristics of fuzzy numbers include the optimistic value, pessimistic value, expected value, and the variance. We mainly provide the calculation formulae of several numerical characteristics of fuzz... The numerical characteristics of fuzzy numbers include the optimistic value, pessimistic value, expected value, and the variance. We mainly provide the calculation formulae of several numerical characteristics of fuzzy numbers based on credibility measure. Especially, the variance of symmetric fuzzy numbers is formulated, and a super bound for the variance of fuzzy numbers is presented. Meanwhile, some conclusions relative to credibility measure, optimistic and pessimistic values are also given. 展开更多
关键词 fuzzy number credibility measure optimisticvalue pessimistic value expected value variance
下载PDF
Determinants of invasive strategy in elderly patients with non-ST elevation myocardial infarction 被引量:1
14
作者 Antonin Negers Jacques Boddaert +5 位作者 Lucie Mora Jean-Louis Golmard Laura Moisi Ariel Cohen Jean-Philippe Collet Alice Breining 《Journal of Geriatric Cardiology》 SCIE CAS CSCD 2017年第7期465-472,共8页
Background Knowledge gaps across literature prevent current guidelines from providing the profile of elderly patients most likely to derive benefit fi^om invasive strategy (IS) in non ST-elevation myocardial infarct... Background Knowledge gaps across literature prevent current guidelines from providing the profile of elderly patients most likely to derive benefit fi^om invasive strategy (IS) in non ST-elevation myocardial infarction (NSTEMI). Furthermore, the benefit of IS in a real-world elderly population with NSTEMI remains unclear. The aims of this study were to determine factors that lead the cardiologist to opt for an IS in elderly patients with NSTEMI, and to assess the impact of IS on the 6-month all-cause mortality. Methods This multicenter prospective study enrolled all consecutive patients aged 〉 75 years old who presented a NSTEMI and were hospitalized in cardiology intensive care unit between February 2014 and February 2015. Patients were compared on the basis of reperfusion strategy (invasive or conservative) and living status at six months, in order to determine multivariate predictors of the realization of an IS and multivariate predictors of 6-month mor- tality. Results A total of 141 patients were included; 87 (62%) underwent an IS. The strongest independent determinants of IS were younger age [odds ratio (OR): 0.85, 95%-confidence interval (CI): 0.78-0.92; P 〈 0.001) and lower "Cumulative Illness Rating Scale-Geriatric" number of categories score (OR: 0.83, 95%CI: 0.73-0.95; P = 0.002). IS was not significantly associated with 6-month survival (OR: 0.80, 95%CI: 0.27-2.38; P = 0.69). Conclusions In real-world elderly patients with NSTEMI, younger patients with fewer comorbidities profited more often from an IS. However, IS did not modify 6-month all-cause mortality. 展开更多
关键词 COMORBIDITY Coronary angiography Decision making MORTALITY Myocardial infarction
下载PDF
A Trusted Measurement Scheme Suitable for the Clients in the Trusted Network 被引量:3
15
作者 GONG Bei ZHANG Jianbiao +1 位作者 YE Xiaolie SHEN Changxiang 《China Communications》 SCIE CSCD 2014年第4期143-153,共11页
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network... The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 展开更多
关键词 trusted computing trusted network AUTHENTICATION state measurement real-time measurement
下载PDF
基于监测传感器的新型智能测控装备研发与应用
16
作者 赵杰 黄会宝 +1 位作者 李诺东 张涵轲 《四川水力发电》 2021年第4期5-8,12,共5页
国内外水电工程安全监测自动化测控装置多以单片机研制,普遍存在采集速度慢、传输层级多、功能扩展受限、设备状态不详等问题,制约了大坝安全的高效管控。基于此,首次提出将PLC技术引进到大坝安全监测领域,自主研发了基于监测传感器的... 国内外水电工程安全监测自动化测控装置多以单片机研制,普遍存在采集速度慢、传输层级多、功能扩展受限、设备状态不详等问题,制约了大坝安全的高效管控。基于此,首次提出将PLC技术引进到大坝安全监测领域,自主研发了基于监测传感器的新型工程安全智能测控装备,可适应振弦式、差阻式、电容式和数字式等多类型传感器并获取变形、渗流渗压、应力应变、环境量以及设备监控等多参数物理量,实现了传感器监测数据采集频次自适应、异常数据自预警、设备状态自诊断等多项技术突破,有效提升了大坝安全管控能力。 展开更多
关键词 可信测量 频次自适应 主动监测 设备状态诊断 分级预警
下载PDF
On Measuring the Privacy of Anonymized Data in Multiparty Network Data Sharing 被引量:1
17
作者 陈晓云 苏玉洁 +2 位作者 唐晓晟 黄小红 马严 《China Communications》 SCIE CSCD 2013年第5期120-127,共8页
This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the sce... This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the scenario involving multiparty network data sharing with Trusted Third Party (TTP) is proposed. Simulations are then conducted using network data from different sources, and show that the measurement indicators defined in this paper can adequately quantify the privacy of the network. In particular, it can indicate the effect of the auxiliary information of the adversary on privacy. 展开更多
关键词 privacy network data anonymization multiparty network data sharing
下载PDF
Dynamic Visualization Approach of the Multiphase Flow Using Electrical Capacitance Tomography 被引量:1
18
作者 王泽璞 陈琪 +2 位作者 王雪瑶 李志宏 韩振兴 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2012年第2期380-388,共9页
Identifying the flow patterns is vital for understanding the complicated physical mechanisms in multiphase flows.For this purpose,electrical capacitance tomography(ECT) technique is considered as a promising visualiza... Identifying the flow patterns is vital for understanding the complicated physical mechanisms in multiphase flows.For this purpose,electrical capacitance tomography(ECT) technique is considered as a promising visualization method for the flow pattern identification,in which image reconstruction algorithms play an important role.In this paper,a generalized dynamic reconstruction model,which integrates ECT measurement information and physical evolution information of the objects of interest,was presented.A generalized objective functional that simultaneously considers the spatial constraints,temporal constraints and dynamic evolution information of the objects of interest was proposed.Numerical simulations and experiments were implemented to evaluate the feasibility and efficiency of the proposed algorithm.For the cases considered in this paper,the proposed algorithm can well reconstruct the flow patterns,and the quality of the reconstructed images is improved,which indicates that the proposed algorithm is competent to reconstruct the flow patterns in the visualization of multiphase flows. 展开更多
关键词 electrical capacitance tomography VISUALIZATION flow pattern identification dynamic reconstruction algorithm
下载PDF
关于计量溯源性和完整性的探索
19
作者 刘士超 赵继男 《中国品牌与防伪》 2023年第11期69-70,共2页
计量溯源性是确保测量结果可信度的关键因素之一,对于各种领域的实验室和合格评定机构都具有重要意义。本文深入研究了计量溯源性证据和完整性,以及它们如何影响测量结果的可信度。
关键词 计量溯源性 计量完整性 测量结果可信
原文传递
Separability criteria via some classes of measurements 被引量:1
20
作者 Lu Liu Ting Gao FengLi Yan 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2017年第10期1-6,共6页
Mutually unbiased bases (MUBs) and symmetric informationally complete (SIC) positive operator-valued measurements (POVMs) are two related topics in quantum information theory. They are generalized to mutually unbiased... Mutually unbiased bases (MUBs) and symmetric informationally complete (SIC) positive operator-valued measurements (POVMs) are two related topics in quantum information theory. They are generalized to mutually unbiased measurements (MUMs) and general symmetric informationally complete (GSIC) measurements, respectively, that are both not necessarily rank 1. We study the quantum separability problem by using these measurements and present separability criteria for bipartite systems with arbitrary dimensions and multipartite systems of multi-level subsystems. These criteria are proved to be more effective than previous criteria especially when the dimensions of the subsystems are different. Furthermore, full quantum state tomography is not needed when these criteria are implemented in experiment. 展开更多
关键词 entangled states mutually unbiased measurements mutually unbiased bases general symmetric informationally complete POVMs
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部