期刊文献+
共找到1,086篇文章
< 1 2 55 >
每页显示 20 50 100
Computation Tree Logic Model Checking of Multi-Agent Systems Based on Fuzzy Epistemic Interpreted Systems
1
作者 Xia Li Zhanyou Ma +3 位作者 Zhibao Mian Ziyuan Liu Ruiqi Huang Nana He 《Computers, Materials & Continua》 SCIE EI 2024年第3期4129-4152,共24页
Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as s... Model checking is an automated formal verification method to verify whether epistemic multi-agent systems adhere to property specifications.Although there is an extensive literature on qualitative properties such as safety and liveness,there is still a lack of quantitative and uncertain property verifications for these systems.In uncertain environments,agents must make judicious decisions based on subjective epistemic.To verify epistemic and measurable properties in multi-agent systems,this paper extends fuzzy computation tree logic by introducing epistemic modalities and proposing a new Fuzzy Computation Tree Logic of Knowledge(FCTLK).We represent fuzzy multi-agent systems as distributed knowledge bases with fuzzy epistemic interpreted systems.In addition,we provide a transformation algorithm from fuzzy epistemic interpreted systems to fuzzy Kripke structures,as well as transformation rules from FCTLK formulas to Fuzzy Computation Tree Logic(FCTL)formulas.Accordingly,we transform the FCTLK model checking problem into the FCTL model checking.This enables the verification of FCTLK formulas by using the fuzzy model checking algorithm of FCTL without additional computational overheads.Finally,we present correctness proofs and complexity analyses of the proposed algorithms.Additionally,we further illustrate the practical application of our approach through an example of a train control system. 展开更多
关键词 Model checking multi-agent systems fuzzy epistemic interpreted systems fuzzy computation tree logic transformation algorithm
下载PDF
Identifying Counterexamples Without Variability in Software Product Line Model Checking 被引量:1
2
作者 Ling Ding Hongyan Wan +1 位作者 Luokai Hu Yu Chen 《Computers, Materials & Continua》 SCIE EI 2023年第5期2655-2670,共16页
Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be v... Product detection based on state abstraction technologies in the software product line(SPL)is more complex when compared to a single system.This variability constitutes a new complexity,and the counterexample may be valid for some products but spurious for others.In this paper,we found that spurious products are primarily due to the failure states,which correspond to the spurious counterexamples.The violated products correspond to the real counterexamples.Hence,identifying counterexamples is a critical problem in detecting violated products.In our approach,we obtain the violated products through the genuine counterexamples,which have no failure state,to avoid the tedious computation of identifying spurious products dealt with by the existing algorithm.This can be executed in parallel to improve the efficiency further.Experimental results showthat our approach performswell,varying with the growth of the system scale.By analyzing counterexamples in the abstract model,we observed that spurious products occur in the failure state.The approach helps in identifying whether a counterexample is spurious or genuine.The approach also helps to check whether a failure state exists in the counterexample.The performance evaluation shows that the proposed approach helps significantly in improving the efficiency of abstraction-based SPL model checking. 展开更多
关键词 Software product line model checking parallel algorithm
下载PDF
A Spatialization-based Method for Checking and Updating Metadata
3
作者 ZHAO Ren-liang WANG Dong-hua +3 位作者 SHI Li-hong ZHANG Bei-fei SHANG Yao-ling WANG Zhong-xiang 《Journal of China University of Mining and Technology》 2005年第3期183-186,共4页
In this paper the application of spatialization technology on metadata quality check and updating was dis-cussed. A new method based on spatialization was proposed for checking and updating metadata to overcome the de... In this paper the application of spatialization technology on metadata quality check and updating was dis-cussed. A new method based on spatialization was proposed for checking and updating metadata to overcome the defi-ciency of text based methods with the powerful functions of spatial query and analysis provided by GIS software. Thismethod employs the technology of spatialization to transform metadata into a coordinate space and the functions ofspatial analysis in GIS to check and update spatial metadata in a visual environment. The basic principle and technicalflow of this method were explained in detail, and an example of implementation using ArcMap of GIS software wasillustrated with a metadata set of digital raster maps. The result shows the new method with the support of interactionof graph and text is much more intuitive and convenient than the ordinary text based method, and can fully utilize thefunctions of GIS spatial query and analysis with more accuracy and efficiency. 展开更多
关键词 METADATA data quality checking SPATIALIZATION spatial analysis
下载PDF
The Design of Circuit for Checking Short in HT-7U Superconducting Tokamak Device
4
作者 刘大海 陈灼民 武松涛 《Plasma Science and Technology》 SCIE EI CAS CSCD 2000年第3期323-327,共5页
The tokamak HT-7U project has been funded as a Chinese national project since 1998. The main object of the project is to build a nuclear fusion experimental device with divertor configuration, which is designed by the... The tokamak HT-7U project has been funded as a Chinese national project since 1998. The main object of the project is to build a nuclear fusion experimental device with divertor configuration, which is designed by the Institute of Plasma Physics, the Chinese Academy of Sciences (ASIPP). It is a full superconducting device, consisting of superconducting toroidal field (TF) coils and superconducting poloidal field (PF) coil. During the operation of the device, the operational parameter of device should be checked by technical diagnosis. This paper describes the design of circuit for checldng short between every two parts of the HT7U device. The main contents of design include circuit of data acquisition and data processing of computer. 展开更多
关键词 The Design of Circuit for checking Short in HT-7U Superconducting Tokamak Device
下载PDF
Credit Checking Market Setting up Gradually in China
5
作者 Faqi Jin Yingzi Wu Rong Xiao 《Chinese Business Review》 2005年第8期14-21,共8页
This paper describes the present condition of credit checking industry and the market of Chinese, elaborates what has restricted Chinese credit development, presents the possible credit products of current Chinese cre... This paper describes the present condition of credit checking industry and the market of Chinese, elaborates what has restricted Chinese credit development, presents the possible credit products of current Chinese credit checking market, forecasts the profits of credit checking service in China, and indicates the strategic steps of operation on credit checking service in China. "Credit" is one of the most popular words in the last two years in China, every thing related to credit will heat up, and the credit management is also becoming a burgeoning industry and comes to front. The development of economy has called for construction of the social credit system, which brings great business opportunities to the credit management agency. Therefore, the government, the industry and the private focus on this wealth dinner. Once deeming it as a great opportunity some far-sighted men bravely begin to take tough practice in the huge market. From then on, some credit management companies have come into being a part of the credit checking agent industry. 展开更多
关键词 credit checking present condition development strategy
下载PDF
Review of Software Model-Checking Techniques for Dealing with Error Detection in Program Codes
6
作者 Ednah Olubunmi Aliyu 《Journal of Software Engineering and Applications》 2023年第6期170-192,共23页
Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is f... Debugging software code has been a challenge for software developers since the early days of computer programming. A simple need, because the world is run by software. So perhaps the biggest engineering challenge is finding ways to make software more reliable. This review provides an overview of techniques developed over time in the field of software model checking to solve the problem of detecting errors in program code. In addition, the challenges posed by this technology are discussed and ways to mitigate them in future research and applications are proposed. A comprehensive examination of the various model verification methods used to detect program code errors is intended to lay the foundation for future research in this area. 展开更多
关键词 Software Model checking Symbolic Execution State Explosion ABSTRACTION Test Case Generations
下载PDF
Influence of initial check, information exchange, final accuracy check, reaction information nursing on the psychology of elderly with lung cancer 被引量:1
7
作者 Cui Jiang Jing Ma +1 位作者 Wen He Hai-Ying Zhang 《World Journal of Clinical Cases》 SCIE 2024年第4期737-745,共9页
BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychologi... BACKGROUND As one of the fatal diseases with high incidence,lung cancer has seriously endangered public health and safety.Elderly patients usually have poor self-care and are more likely to show a series of psychological problems.AIM To investigate the effectiveness of the initial check,information exchange,final accuracy check,reaction(IIFAR)information care model on the mental health status of elderly patients with lung cancer.METHODS This study is a single-centre study.We randomly recruited 60 elderly patients with lung cancer who attended our hospital from January 2021 to January 2022.These elderly patients with lung cancer were randomly divided into two groups,with the control group taking the conventional propaganda and education and the observation group taking the IIFAR information care model based on the conventional care protocol.The differences in psychological distress,anxiety and depression,life quality,fatigue,and the locus of control in psychology were compared between these two groups,and the causes of psychological distress were analyzed.RESULTS After the intervention,Distress Thermometer,Hospital Anxiety and Depression Scale(HADS)for anxiety and the HADS for depression,Revised Piper’s Fatigue Scale,and Chance Health Locus of Control scores were lower in the observation group compared to the pre-intervention period in the same group and were significantly lower in the observation group compared to those of the control group(P<0.05).After the intervention,Quality of Life Questionnaire Core 30(QLQ-C30),Internal Health Locus of Control,and Powerful Others Health Locus of Control scores were significantly higher in the observation and the control groups compared to the pre-intervention period in their same group,and QLQ-C30 scores were significantly higher in the observation group compared to those of the control group(P<0.05).CONCLUSION The IIFAR information care model can help elderly patients with lung cancer by reducing their anxiety and depression,psychological distress,and fatigue,improving their tendencies on the locus of control in psychology,and enhancing their life qualities. 展开更多
关键词 Initial check information exchange final accuracy check reaction information care model Lung cancer Mental health
下载PDF
An Improved Machine Learning Model for Pure Component Property Estimation
8
作者 Xinyu Cao Ming Gong +3 位作者 Anjan Tula Xi Chen Rafiqul Gani Venkat Venkatasubramanian 《Engineering》 SCIE EI CAS CSCD 2024年第8期61-73,共13页
Information on the physicochemical properties of chemical species is an important prerequisite when performing tasks such as process design and product design.However,the lack of extensive data and high experimental c... Information on the physicochemical properties of chemical species is an important prerequisite when performing tasks such as process design and product design.However,the lack of extensive data and high experimental costs hinder the development of prediction techniques for these properties.Moreover,accuracy and predictive capabilities still limit the scope and applicability of most property estimation methods.This paper proposes a new Gaussian process-based modeling framework that aims to manage a discrete and high-dimensional input space related to molecular structure representation with the group-contribution approach.A warping function is used to map discrete input into a continuous domain in order to adjust the correlation between different compounds.Prior selection techniques,including prior elicitation and prior predictive checking,are also applied during the building procedure to provide the model with more information from previous research findings.The framework is assessed using datasets of varying sizes for 20 pure component properties.For 18 out of the 20 pure component properties,the new models are found to give improved accuracy and predictive power in comparison with other published models,with and without machine learning. 展开更多
关键词 Group contribution Gaussian process Warping function Prior predictive checking
下载PDF
Completeness of bounded model checking temporal logic of knowledge
9
作者 刘志锋 葛云 +1 位作者 章东 周从华 《Journal of Southeast University(English Edition)》 EI CAS 2010年第3期399-405,共7页
In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge... In order to find the completeness threshold which offers a practical method of making bounded model checking complete, the over-approximation for the complete threshold is presented. First, a linear logic of knowledge is introduced into the past tense operator, and then a new temporal epistemic logic LTLKP is obtained, so that LTLKP can naturally and precisely describe the system's reliability. Secondly, a set of prior algorithms are designed to calculate the maximal reachable depth and the length of the longest of loop free paths in the structure based on the graph structure theory. Finally, some theorems are proposed to show how to approximate the complete threshold with the diameter and recurrence diameter. The proposed work resolves the completeness threshold problem so that the completeness of bounded model checking can be guaranteed. 展开更多
关键词 bounded model checking temporal logics of knowledge multi-agent system
下载PDF
A Survey on Sensor-and Communication-Based Issues of Autonomous UAVs
10
作者 Pavlo Mykytyn Marcin Brzozowski +1 位作者 Zoya Dyka Peter Langendoerfer 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1019-1050,共32页
The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader th... The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasingsteadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader thanever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack ofimplemented securitymeasures and raise new security and safety concerns. For instance, the issue of implausible ortampered UAV sensor measurements is barely addressed in the current research literature and thus, requires moreattention from the research community. The goal of this survey is to extensively review state-of-the-art literatureregarding common sensor- and communication-based vulnerabilities, existing threats, and active or passive cyberattacksagainst UAVs, as well as shed light on the research gaps in the literature. In this work, we describe theUnmanned Aerial System (UAS) architecture to point out the origination sources for security and safety issues.Weevaluate the coverage and completeness of each related research work in a comprehensive comparison table as wellas classify the threats, vulnerabilities and cyber-attacks into sensor-based and communication-based categories.Additionally, for each individual cyber-attack, we describe existing countermeasures or detectionmechanisms andprovide a list of requirements to ensureUAV’s security and safety.We also address the problem of implausible sensormeasurements and introduce the idea of a plausibility check for sensor data. By doing so, we discover additionalmeasures to improve security and safety and report on a research niche that is not well represented in the currentresearch literature. 展开更多
关键词 Unmanned aerial vehicle unmanned aerial system cyber security and privacy drone swarm security vulnerabilities cyber-threats cyber-attacks plausibility check
下载PDF
Recent trends in bone metastasis treatments:A historical comparison using the new Katagiri score system
11
作者 Kenji Matsuda Kazuhiro Shimazu +5 位作者 Hanae Shinozaki Koji Fukuda Taichi Yoshida Daiki Taguchi Kyoko Nomura Hiroyuki Shibata 《World Journal of Clinical Cases》 SCIE 2024年第15期2499-2505,共7页
BACKGROUND Bone metastasis has various negative impacts.Activities of daily living(ADL)and quality of life(QOL)can be significantly decreased,survival may be impacted,and medical expenses may increase.It is estimated ... BACKGROUND Bone metastasis has various negative impacts.Activities of daily living(ADL)and quality of life(QOL)can be significantly decreased,survival may be impacted,and medical expenses may increase.It is estimated that at least 5%cancer patients might be suffering from bone metastases.In 2016,we published the Comprehensive Guidelines for the Diagnosis and Treatment of Bone Metastasis.Since then,the therapeutic outcomes for patients have gradually improved.As life expectancy is a major determinant of surgical intervention,the strategy should be modified if the prolongation of survival is to be achieved.AIM To monitor how bone metastasis treatment has changed before and after launch of our guidelines for bone metastasis.METHODS For advanced cancer patients with bone metastasis who visited the Department of Clinical Oncology at Akita University hospital between 2012 and 2023,parameters including the site and number of bone metastases,laboratory data,and survival time,were extracted from electronic medical records and the Katagiri score was calculated.The association with survival was determined for each factor.RESULTS Data from 136 patients were obtained.The 1-year survival rate for the poor prognosis group with a higher Katagiri score was 20.0%in this study,which was 6%and an apparent improvement from 2014 when the scoring system was developed.Other factors significantly affecting survival included five or more bone metastases than less(P=0.0080),and treatment with chemotherapy(P<0.001),bone modifying agents(P=0.0175)and immune checkpoint inhibitors(P=0.0128).In recent years,advances in various treatment methods have extended the survival period for patients with advanced cancer.It is necessary not only to simply extend survival time,but also to maintain ADL and improve QOL.CONCLUSION Various therapeutic interventions including surgical approach for bone metastasis,which is a disorder of locomotor organs,are increasingly required.Guidelines and scoring system for prognosis need to be revised promptly. 展开更多
关键词 Bone metastasis New Katagiri scoring system Prognosis Immune check point inhibitors SURVIVAL
下载PDF
DIAGNOSTIC CHECKING FOR TIME SERIES MODELS USING NONPARAMETRIC APPROACH
12
作者 钟登华 尼伯伦丁 《Transactions of Tianjin University》 EI CAS 1997年第1期45-49,共5页
In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparame... In time series modeling, the residuals are often checked for white noise and normality. In practice, the useful tests are Ljung Box test. Mcleod Li test and Lin Mudholkar test. In this paper, we present a nonparametric approach for checking the residuals of time series models. This approach is based on the maximal correlation coefficient ρ 2 * between the residuals and time t . The basic idea is to use the bootstrap to form the null distribution of the statistic ρ 2 * under the null hypothesis H 0:ρ 2 * =0. For calculating ρ 2 * , we proposes a ρ algorithm, analogous to ACE procedure. Power study shows this approach is more powerful than Ljung Box test. Meanwhile, some numerical results and two examples are reported in this paper. 展开更多
关键词 BOOTSTRAP diagnostic checking nonparametric approach time series white noise ρ algorithm
下载PDF
Enable Excel-Based Basic Cybersecurity Features for End Users by Using Python-Excel Integration
13
作者 Mohamed Breik Osama Magdy +2 位作者 Essam Amin Tarek Aly Mervat Gheith 《Journal of Software Engineering and Applications》 2024年第6期522-529,共8页
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int... In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden. 展开更多
关键词 Python End-User Approach EXCEL Excel Add-In CYBERSECURITY URL Check API Virustotal API Encryption Decryption Vigenère Cipher Python-Excel Integration
下载PDF
Patient Safety in the Use of Mechanical Restraints: Regulatory Compliance among Hospitals in the City of Buenos Aires and Proposal for Its Improvement
14
作者 Martín Javier Mazzoglio y Nabar Sergio Giordano +3 位作者 Edgardo Knopoff Lorena Onofrio Oscar Agustín Porta Romina Rodríguez 《Open Journal of Emergency Medicine》 2024年第2期33-39,共7页
Introduction: Mechanical or physical restraint is an exceptional therapeutic resource to immobilize a subject and thus guarantee the safety of the patient and/or third parties in the face of high-risk behaviors, but i... Introduction: Mechanical or physical restraint is an exceptional therapeutic resource to immobilize a subject and thus guarantee the safety of the patient and/or third parties in the face of high-risk behaviors, but it entails multiple crossings (bioethical, philosophical, medical, psychological, legal). Framed in the so-called “safety culture” developed by the WHO, based on the Protocol for its implementation of the CABA and attentive to its frequent use in CABA by different hospital services (medical clinic, geriatrics, intensive care and medical guards) we consider it necessary its study in terms of compliance with the risks it entails and its management. Objectives: Identify regulatory compliance with the GCABA Mechanical restraint (MR) Protocol from a patient safety perspective, as well as describe the clinical and medicolegal aspects, and propose the usefulness of a tool for its management and control. Methodology: Observational, descriptive, transversal and prospective work through the analysis of Clinical Records with indication of MR using a rubric-type form. 177 cases were analyzed between September-November 2023 from three hospitals of the Government of the City of Buenos Aires, statistical parameters were applied and graphs were made. Results: Only 12.99% complied with the Protocol. In the mental health specialized hospital compliance was almost 5 times greater than in the general one, and in the emergency services compliance was 12 times greater than in Inpatient services. We found that the start or end time of MR was not recorded and only 43% described the causes/justifications for the indication (mostly in Emergency and Specialized hospitals), with the MR average time being shorter in Emergency. Conclusions: Only 1.3 out of 10 patients reliably completed the Protocol and it was mostly in the mental health specialized hospital and the emergency services. The results show non-compliance behavior in the application and management of the risk that the use of mechanical restraints entails, being causes for criminal litigation. We consider that the checklists are useful to complete the Protocol and thus provide security to patients and professionals. 展开更多
关键词 Mechanical Containment Patient Safety Injuries in Custody Buenos Aires City Check List
下载PDF
Stop H5N1 influenza in US cattle now
15
作者 Nicola Lewis 《四川生理科学杂志》 2024年第7期1639-1639,共1页
The relentless march of a highly pathogenic avian influenza virus(HPAIV)strain,known as H5N1,to become an unprecedented panzootic continues unchecked.The leap of H5N1 clade 2.3.4.4b from Eurasia and Africa to North Am... The relentless march of a highly pathogenic avian influenza virus(HPAIV)strain,known as H5N1,to become an unprecedented panzootic continues unchecked.The leap of H5N1 clade 2.3.4.4b from Eurasia and Africa to North America in 2021 and its further spread to South America and the Antarctic have exposed new avian and mammalian populations to the virus and led to outbreaks on an unrivaled scale.The virus has infected wild birds across vast geographic regions and caused wildlife deaths in some of the world's most biodiverse ecosystems. 展开更多
关键词 H5N1 checked INFLUENZA
下载PDF
基于Model Checking的系统脆弱性分析 被引量:4
16
作者 黄光华 段川 蒋凡 《计算机工程》 EI CAS CSCD 北大核心 2005年第4期148-151,共4页
基于规则的脆弱性分析技术依赖于对系统组件间关系的经验知识,系统复杂性、竞态条件、隐含假设等因素,使规则的生成异常困难。该文提出了采用NuSMV作为Model Checking执行机验证系统安全行为模型的脆弱性分析方法,并详细描述了对两个模... 基于规则的脆弱性分析技术依赖于对系统组件间关系的经验知识,系统复杂性、竞态条件、隐含假设等因素,使规则的生成异常困难。该文提出了采用NuSMV作为Model Checking执行机验证系统安全行为模型的脆弱性分析方法,并详细描述了对两个模型实例进行验证的过程。结果显示,这种方法具有识别已知和未知脆弱性的能力。 展开更多
关键词 脆弱性 MODEL checking NUSMV
下载PDF
基于PDCA的船舶设计质量管理
17
作者 战研 陈云 叶步永 《船舶标准化工程师》 2024年第4期55-59,共5页
为提高船舶设计质量管理水平,以某满足《协调共同结构规范》(Harmonized Common Structure Rule,HCSR)的巴拿马型散货船为研究对象,利用计划、执行、检查、处理(Plan,Do,Check,Act,PDCA)循环法基本原则对设计质量进行管控,并建立同一船... 为提高船舶设计质量管理水平,以某满足《协调共同结构规范》(Harmonized Common Structure Rule,HCSR)的巴拿马型散货船为研究对象,利用计划、执行、检查、处理(Plan,Do,Check,Act,PDCA)循环法基本原则对设计质量进行管控,并建立同一船型设计质量管理体系。此外,对船舶能效指数(Energy Efficiency Design Index,EEDI)提升和结构轻量化设计的研讨方法进行分析。研究成果可为船舶设计质量管理提供一定参考。 展开更多
关键词 协调共同规范(Harmonized Common Structure Rule HCSR) 计划、执行、检查、处理(Plan Do Check Act PDCA) 设计优化 管理体系
下载PDF
An Extended Ontology Model and Ontology Checking Based on Description Logics 被引量:8
18
作者 王洪伟 蒋馥 吴家春 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第1期34-41,共8页
Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term... Ontology is defined as an explicit specification of a conceptualization. In this paper, an extended ontology model was constructed using description logics, which is a 5-tuples including term set, individual set, term definition set, instantiation assertion set and term restriction set. Based on the extended model, the issue on ontology checking was studied with the conclusion that the four kinds of term checking, including term satisfiability checking, term subsumption checking, term equivalence checking and term disjointness checking, can be reduced to the satisfiability checking, and satisfiability checking can be transformed into instantiation consistence checking. 展开更多
关键词 ONTOLOGY description logics ontology checking term checking instantiation checking
下载PDF
Intrusion Detection Algorithm Based on Model Checking Interval Temporal Logic 被引量:5
19
作者 朱维军 王忠勇 张海宾 《China Communications》 SCIE CSCD 2011年第3期66-72,共7页
Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is ... Model checking based on linear temporal logic reduces the false negative rate of misuse detection.However,linear temporal logic formulae cannot be used to describe concurrent attacks and piecewise attacks.So there is still a high rate of false negatives in detecting these complex attack patterns.To solve this problem,we use interval temporal logic formulae to describe concurrent attacks and piecewise attacks.On this basis,we formalize a novel algorithm for intrusion detection based on model checking interval temporal logic.Compared with the method based on model checking linear temporal logic,the new algorithm can find unknown succinct attacks.The simulation results show that the new method can effectively reduce the false negative rate of concurrent attacks and piecewise attacks. 展开更多
关键词 network security intrusion detection misuse detection interval temporal logic model checking
下载PDF
Elite capture,the“follow-up checks”policy,and the targeted poverty alleviation program:Evidence from rural western China 被引量:4
20
作者 CHENG Xiao-yu WANG Jian-ying Kevin Z.CHEN 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2021年第4期880-890,共11页
Decentralized methods for targeting poverty are widely adopted in developing countries to improve the performance of various poverty alleviation programs.A common challenge for implementing successful decentralized ta... Decentralized methods for targeting poverty are widely adopted in developing countries to improve the performance of various poverty alleviation programs.A common challenge for implementing successful decentralized targeting is the existence of elite capture.China has recently implemented a nationwide decentralized poverty targeting program,the targeted poverty alleviation(TPA)policy,to achieve the national goal of eliminating absolute poverty by the end of 2020.As the largest decentralized poverty targeting program in the world,TPA's successful implementation was believed to be threatened by elite capture in some earlier reports.Since 2015,a targeting correction mechanism,called"follow-up checks"policy,has been introduced.With the"follow-up checks"policy,the elites and other ineligible households who receive benefits under TPA were removed from the program.This paper investigates the elite capture phenomenon in TPA using village census data from a poverty-stricken county in 2017-two years after implementing the"follow-up checks"policy.We find no evidence of elite capture in TPA.The elites are unlikely to become beneficiaries or receive more benefits than non-elites.Our results contradict earlier findings that reported elite capture in TPA.We argue that the reason is the accountability emphasized by the central government in the"follow-up checks"policy.Our findings imply that having proper accountability is critical for improving targeting performance by global antipoverty initiatives. 展开更多
关键词 elite capture decentralized poverty targeting targeted poverty alleviation the"follow-up checks"policy ACCOUNTABILITY
下载PDF
上一页 1 2 55 下一页 到第
使用帮助 返回顶部