期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Ensuring Readability of Electronic Records Based on Virtualization Technology in Cloud Storage
1
作者 Qirun Wang Fujian Zhu +2 位作者 Yan Leng Yongjun Ren Jinyue Xia 《Journal on Internet of Things》 2019年第1期33-39,共7页
With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electron... With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electronic records center isdifficult to cope with the current fast growth requirements of electronic records storageand management. Therefore, it is imperative to use cloud storage technology to buildelectronic record centers. However, electronic records also have weaknesses in the cloudstorage environment, and one of them is that once electronic record owners or managerslose physical control of them, the electronic records are more likely to be tampered withand destroyed. So, the paper builds a reliable electronic records preservation systembased on coding theory. It can effectively guarantee the reliability of record storage whenthe electronic record is damaged, and the original electronic record can be restored byredundant coding, thus ensuring the reliable storage of electronic records. 展开更多
关键词 Electronic record cloud storage preservation mechanism coding theory
下载PDF
Construction of New Codes from Given Ones in an Additive Channel
2
作者 Garib Movsisyan 《Journal of Information Security》 2016年第3期165-171,共7页
In the present work, a construction making possible creation of an additive channel  of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code  correcting err... In the present work, a construction making possible creation of an additive channel  of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code  correcting errors of the channel A is presented. 展开更多
关键词 Additive Channel Golay Code Classical coding theory T-Order Neighborhood Correcting Code Binary Alphabet CARDINALITY
下载PDF
Effects of age on live streaming viewer engagement:a dual coding perspective
3
作者 Fei Liu Yijing Li +3 位作者 Xiaofei Song Zhao Cai Eric T.K.Lim Chee-Wee Tan 《Journal of Management Analytics》 EI 2022年第4期435-447,共13页
Though the emerging live streaming industry has attracted growing attention,the dominant yanzhi category where streamers mostly interact with the audience through amateur talent shows and casual chats has not been wid... Though the emerging live streaming industry has attracted growing attention,the dominant yanzhi category where streamers mostly interact with the audience through amateur talent shows and casual chats has not been widely investigated.To decode the mechanism behind the popularity of yanzhi streamers,this study draws on Dual Coding Theory(DCT)to posit that age estimated from a streamer’s face and voice can influence the level of viewer engagement.To validate our hypothesized relationships,274 one-minute video records ahead of a viewer commenting or/and gifting were collected and analyzed via deep learning algorithms.Analytical results attest to the negative effects of both facial and vocal age on viewer engagement,while their interaction has a positive impact on viewer engagement. 展开更多
关键词 live streaming age viewer engagement dual coding theory deep learning
原文传递
Problems and solutions regarding generalized functional safety in cyberspace 被引量:5
4
作者 JiangXing Wu 《Security and Safety》 2022年第1期90-102,共13页
The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical s... The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical system(CPS),functional safety and cyber security are increasingly intertwined and inseparable,which evolve into the generalized functional safety(S&S)problem.The conventional reliability and cybersecurity technologies are unable to provide security assurance with quanti able design and veri cation metrics in response to the cyberattacks in hardware and software with common endogenous security problems,and the functional safety of CPS facilities or device has become a frightening ghost.The dynamic heterogeneity redundancy(DHR)architecture and coding channel theory(CCT)proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner,and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation.As a generalized functional safety enabling structure,DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary elds of cyberspace. 展开更多
关键词 Common endogenous security problem Generalized functional safety(S&S) Dynamic heterogeneity redundancy(DHR)architecture General robust control mechanism coding channel theory Common cross-disciplinary eld problems
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部