期刊文献+
共找到2,803篇文章
< 1 2 141 >
每页显示 20 50 100
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
1
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 Cross-domain authentication trust evaluation autoencoder
下载PDF
Research on and implementation of a knowledge-reasoning based evaluation support system
2
作者 JIANG Hua, GAO Guo-an (Advanced Manufacturing Technology Center, Harbin Institute of Technology, Harbin 150001, China) 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2000年第S1期101-103,共3页
An evaluation support system involving complicated decision making problems during engineering design of products is introduced by first describng and modeling complicated decision making problems, and then constructi... An evaluation support system involving complicated decision making problems during engineering design of products is introduced by first describng and modeling complicated decision making problems, and then constructing and describing the architecture and functional structure of an evaluation support system, based on knowledge-based reasoning. Knowledge contains important experience of field-expert and can be classified and stored in knowledge bases, and therefore, the system suggests information-processing tools based on information resources including data knowledge bases and methods bases, which can be used to evaluate the designs against the multi-criteria decision framework thereby providing decision-makers with rational and scientific information. 展开更多
关键词 knowledge-BASED REASONING MULTI-CRITERIA DECISION evaluation support system
下载PDF
Trust evaluation model of power terminal based on equipment portrait 被引量:1
3
作者 Erxia Li Zilong Han +2 位作者 Chaoqun Kang Tao Yu Yupeng Huang 《Global Energy Interconnection》 EI CSCD 2023年第6期758-771,共14页
As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for term... As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for terminals,we propose a trust evaluation model based on equipment portraits for power terminals.First,we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic.Second,we propose an exception evaluation method based on syntax and semantics.The key fields of each message are extracted,and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal.Thus,by combining the network flow order,syntax,and semantic analysis,an equipment portrait can be constructed to guarantee security of the power network terminals.We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time.Finally,the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate,as well as a higher real-time performance,which is more suitable for power terminals. 展开更多
关键词 Power terminal Equipment portrait trust evaluation
下载PDF
Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection
4
作者 S.Soundararajan B.R.Tapas Bapu +3 位作者 C.Kotteeswaran S.Venkatasubramanian P.J.Sathish Kumar Ahmed Mudassar Ali 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1227-1240,共14页
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,abse... Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,absence of physical protectivity,and accumulated traffic,WSN is highly vulner-able to security concerns.Therefore,this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis.It is challenging to determine if packet loss is caused by a collision in the medium access path,poor channel quality,or a selective forwarding assault.Identifying misbehaving nodes at the earliest opportunity is an acceptable solution for performing secure routing in such networks.As a result,in this study effort,we present a unique Modified Ad Hoc On-Demand Distance Vector(AODV)Routing protocol depending upon the One time password(OTP)method that employs the RSA algorithm.Finally,a trust evaluation process determines which approach is the most optimal.Accord-ing to the simulationfindings of the suggested routing protocol and comparison with existing routing protocols provided in this article,the proposed work is both efficient and cost-effective. 展开更多
关键词 Wireless sensor network selective forward attack one time password trust evaluation RSA algorithm
下载PDF
Research Status and Trends of Science and Technology Evaluation in China—Visual Analysis Based on Knowledge Mapping
5
作者 Honggang Yang Haijing Zhang 《Intelligent Information Management》 2020年第6期199-210,共12页
<div style="text-align:justify;"> <span style="font-family:Verdana;">In order to understand the current status and future trends of China’s science and technology evaluation research, ... <div style="text-align:justify;"> <span style="font-family:Verdana;">In order to understand the current status and future trends of China’s science and technology evaluation research, we use the visual analysis tool CiteSpace to use the source journals included in the Chinese social science citations from 1998-2019 as the data source, and evaluate the domestic science and technology evaluation papers from the number of publications, the co-occurrence of authors, Institutional co-occurrence and subject clustering are analyzed. The study found that: the total amount of literature in the field of domestic science and technology evaluation is showing an overall upward trend;a relatively obvious author cooperation network has been formed, but the core author group has not yet been formed;institutional cooperation clusters have appeared, but the cooperation between institutions is still relatively scattered;The research topics focus on three aspects: science and technology evaluation index system, evaluation method and evaluation system.</span> </div> 展开更多
关键词 S&T evaluation BIBLIOMETRICS knowledge mapping CITESPACE
下载PDF
Evaluation of the Knowledge and Perceptions of Patients towards Generic Medicines in UAE
6
作者 Suleiman I. Sharif Raneem J. Chaar +3 位作者 Zahraa Z. Albadrani Jameel S. Shahwan Mohamed N. Badreddin Mohamed A. K. Charbaji 《Pharmacology & Pharmacy》 2016年第9期369-378,共10页
Objectives: The objective of this study was to evaluate the knowledge and perceptions of patients towards generic medicines in some Emirates of the United Arab Emirates. Methods: A cross-sectional survey involving pat... Objectives: The objective of this study was to evaluate the knowledge and perceptions of patients towards generic medicines in some Emirates of the United Arab Emirates. Methods: A cross-sectional survey involving patients in three Emirates was undertaken. A 23-item questionnaire was designed, pre-validated and administered. Results: The questionnaire was fully answered by 96 patients out of 120 producing a response rate of 80%. The majority of patients were young Arab females with a university degree. Slightly less than 50% of patients were having a monthly income of less than ED 10,000. Results of the patient’s survey indicate that they have poor knowledge and perception of generic medicines. They did not know the meaning of generic or brand medicines and this negatively influenced their responses to consequent questions. Conclusion: Patients’ knowledge and perception of generic drugs were poor. Efforts are needed to increase public awareness of generic drugs and possible brand substitution. Both the prescribing physician and the dispensing pharmacists have an essential role to play in educating their patients of generic drugs. 展开更多
关键词 evaluation PATIENTS Generic Medicines Brand Medicines knowledge Perception
下载PDF
What to test and how to test: An evaluation of the Academic version of the International English Language Testing System
7
作者 孙由之 《海外英语》 2014年第15期103-104,106,共3页
An attempt was made to evaluate what is tested and how it is tested in the IELTS academic test from a thinking-based perspective. The analysis framework is an incorporation of Bloom's taxonomy of educational objec... An attempt was made to evaluate what is tested and how it is tested in the IELTS academic test from a thinking-based perspective. The analysis framework is an incorporation of Bloom's taxonomy of educational objectives and Bachman's classification of language knowledge. It is found that the IELTS test exemplifies an assessment of test-takers' language knowledge and cognitive processes. 展开更多
关键词 TEST evaluation thinking-based TAXONOMY of educati
下载PDF
A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification
8
作者 Yao Wang Yubo Wang +2 位作者 Zhenhu Ning Sadaqat ur Rehman Muhammad Waqas 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期981-996,共16页
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo... Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneous and dynamic distributed Internet of things environment between different Internet of things.There is a wide demand for cooperation between equipment and management institutions in the smart city.Therefore,it is necessary to establish a trust mechanism to promote cooperation,and based on this,prevent data disorder caused by the interaction between honest terminals and malicious temminals.However,most of the existing research on trust mechanism is divorced from the Internet of things environment,and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of hings devices,resuling in the fact that the research on abstract trust trust mechanism cannot be directly applied to the Internet of things;On the other hand,various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not considered.Aiming at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals,a cross domain trust model(CDTM)based on self-authentication is proposed.Unlike most trust models,this model uses self-certified trust.The cross-domain process of internet of things(IoT)terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain interaction.At the same time,in order to alleviate the collision attack and improve the accuracy of trust evaluation,the overall trust value is calculated by comprehensively considering the quantity weight,time attenuation weight and similarity weight.Finally,the simulation results show that CDTM has good anti collusion attack ability.The success rate of malicious interaction will not increase significantly.Compared with other models,the resource consumption of our proposed model is significantly reduced. 展开更多
关键词 Smart city cross-domain trust model self-certification trust evaluation
下载PDF
Safety evaluation system for hydraulic metal structures based on knowledge engineering 被引量:2
9
作者 Yang Guangming Gu Chongshi 《Water Science and Engineering》 EI CAS 2008年第3期102-111,共10页
A comprehensive safety evaluation system taking the most influential factors into account has been developed to evaluate the reliability of hydraulic metal structures. Applying the techniques of AI and DB, the idea of... A comprehensive safety evaluation system taking the most influential factors into account has been developed to evaluate the reliability of hydraulic metal structures. Applying the techniques of AI and DB, the idea of a one-machine and three-base system is proposed. The framework of the three-base system has been designed and the structural framework constructed in turn. A practical example is given to illustrate the process of using this system and it can be used for comparison and analysis purposes. The key technology of the system is its ability to reorganize and improve the expert system's knowledge base by establishing the expert system. This system utilizes the computer technology inference process, making safety evaluation conclusions more reasonable and applicable to the actual situation. The system is not only advanced, but also feasible, reliable, artificially intelligent, and has the capacity to constantly grow. 展开更多
关键词 water conservancy and hydropower engineering safety evaluation one-machine and three-base system knowledge engineering hydraulic metal structure
下载PDF
A Dynamic Bayesian-Based Comprehensive Trust Evaluation Model for Dispersed Computing Environment
10
作者 Hongwen Hui Zhengxia Gong +1 位作者 Jianwei An Jianzhong Qi 《China Communications》 SCIE CSCD 2023年第2期278-288,共11页
Dispersed computing is a new resourcecentric computing paradigm.Due to its high degree of openness and decentralization,it is vulnerable to attacks,and security issues have become an important challenge hindering its ... Dispersed computing is a new resourcecentric computing paradigm.Due to its high degree of openness and decentralization,it is vulnerable to attacks,and security issues have become an important challenge hindering its development.The trust evaluation technology is of great significance to the reliable operation and security assurance of dispersed computing networks.In this paper,a dynamic Bayesian-based comprehensive trust evaluation model is proposed for dispersed computing environment.Specifically,in the calculation of direct trust,a logarithmic decay function and a sliding window are introduced to improve the timeliness.In the calculation of indirect trust,a random screening method based on sine function is designed,which excludes malicious nodes providing false reports and multiple malicious nodes colluding attacks.Finally,the comprehensive trust value is dynamically updated based on historical interactions,current interactions and momentary changes.Simulation experiments are introduced to verify the performance of the model.Compared with existing model,the proposed trust evaluation model performs better in terms of the detection rate of malicious nodes,the interaction success rate,and the computational cost. 展开更多
关键词 dispersed computing trust evaluation model malicious node interaction success rate detection rate
下载PDF
Research Progress of Trust Evaluation Model
11
作者 ZHOU Guoqiang PAN Fangrui +1 位作者 ZHANG Weifeng GUO Jian 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期391-395,共5页
Software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such c... Software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such circumstance, trust evaluation model becomes focus of intense research at current time. Trust evaluation model establishes a management framework of trust relationship between entities, involving expression and measurement of trust, comprehensive calculation of direct trust value and recommended trust value, and recognition of malicious entities and recommendations. Based on the analysis of several typical trust evaluation models, the classification of trust evaluation ideas and modes is discussed, the questions existing in current research and the directions of future research are pointed out. 展开更多
关键词 distributed environment trust trust evaluation model trust path
下载PDF
Occupational exposures to blood and body fluids (BBF): Assessment of knowledge, attitude and practice among health care workers in general hospitals in Lebanon
12
作者 Ibtissam Sabbah Hala Sabbah +2 位作者 Sanaa Sabbah Hussein Akoum Nabil Droubi 《Health》 2013年第1期70-78,共9页
Healthcare workers (HCWs) who are employed in traditional health care workplaces face a serious danger that may threaten their life;it is their exposure to blood and body fluids (BBF). In Lebanon, the introduction of ... Healthcare workers (HCWs) who are employed in traditional health care workplaces face a serious danger that may threaten their life;it is their exposure to blood and body fluids (BBF). In Lebanon, the introduction of a hospital accreditation system has put a particular emphasis on staff safety, and on the evaluation of professional practice (EPP) programs. Methods: A cross-sectional survey was conducted amongst 277 HCWs working in 4 general hospitals in South Lebanon. Objective: 1) describe the prevalence and the risk factors for occupational exposure to BBF among HCWs;2) evaluate knowledge, attitude, and practices of HCW concerning blood-borne pathogens and adherence to universal safety precautions. Results: The mean age of the respondents was 32.14 years (SD = 10.33), 57.4% were females. 43.3% of HCWs expressed that they use gloves all the time for every activeity of care. 67.1% were aware that needles should not be recapped after use;registered nurses and nursing students were more aware than physicians and nursing assistants (nurse) in this subject. 30% of HCWs declared having had at least one occupational exposure to BBF;62.7% of all accidental exposure was reported to the department responsible for managing exposures. Percutaneous injuries were the most frequently reported. Vaccination coverage was 88.4% for hepatitis B, and 48.4% against influenza. The source patient was tested in 43.4% of reported BBF exposures. Accidental exposure to BBF was more frequent in older people (OR = 3.42;p = 0.03) and the more experienced. Subjects working in intensive care unit ward reported more exposure to BBF (OR = 3;p = 0.04). Participants incurring exposure to BBF resorted to different measures after the injury suggesting a lack of a uniform policy for post-exposure prophylaxis. Conclusion: Exposure to BBF represents an important and frequently preventable occupational hazard for HCWs in Lebanon that requires continuous EPP of HCWs, and a comprehensive approach for prevention and management. 展开更多
关键词 OCCUPATIONAL exposure to BLOOD and body fluids evaluation of the Professional PRACTICE knowledge ATTITUDE and Practices (KAP) Controlled Language Healthcare Workers
下载PDF
A Systemic Approach Integrating Genetic, Mining and Management Visions: The Geologic and Mining Knowledge System
13
作者 Nassareddine Azzouzi 《Journal of Geographic Information System》 2017年第3期390-401,共12页
Following the example of other industrial activities, mining evaluation is now exposed to socio-economical and technological constraints which are unstable in quick evolution. The keys to its success are increasingly ... Following the example of other industrial activities, mining evaluation is now exposed to socio-economical and technological constraints which are unstable in quick evolution. The keys to its success are increasingly related to a methodology of work more scientific than ever. The Systemic Approach has broadly showed its effectiveness in numerous disciplinary fields, both scientific and engineering ones: Biology, Economy, Social and Management Sciences, Quality Management, Information Systems… Helped by technological progress, this approach has especially excelled in the management of spatial information (e.g. GIS). It constitutes therefore an excellent solution to the problems of mining evaluation by the integration of genetic, mining and managerial data within an Information System, thus optimizing scientific and economic valuation of mineral resources. 展开更多
关键词 MINING evaluation Scientific APPROACH systemIC APPROACH GEOLOGIC and MINING knowledge system MOROCCAN Context
下载PDF
A Knowledge-based Stampability Evaluation System
14
作者 唐敦兵 Zheng +2 位作者 Li Li Zhizhong 《High Technology Letters》 EI CAS 2002年第3期78-82,共5页
The aim, characteristics and requirements of stampability evaluation are identified. As sampability evaluation is highly skill intensive and requires a wide variety of design expertise and knowledge, a knowledge based... The aim, characteristics and requirements of stampability evaluation are identified. As sampability evaluation is highly skill intensive and requires a wide variety of design expertise and knowledge, a knowledge based system is proposed for implementing the stampability evaluation. The stampability evaluation knowledge representation, and processing phases are illustrated. A case study demonstrates the feasibility of the knowledge based approach to stampability evaluation. 展开更多
关键词 design for stamping stampability evaluation knowledge based approach
下载PDF
The entropy weight fuzzy comprehension evaluation of enterprise knowledge competitiveness
15
作者 YU Lei WANG Shu-zhen 《Chinese Business Review》 2010年第2期46-50,共5页
With the constant development of knowledge-based economy, knowledge has become the core competitiveness of enterprise, which plays a vital role in the development of enterprise and market competition. It will be helpf... With the constant development of knowledge-based economy, knowledge has become the core competitiveness of enterprise, which plays a vital role in the development of enterprise and market competition. It will be helpful for enterprise managers to improve their knowledge competitiveness, if they can judge the advantage and disadvantage of knowledge competitiveness reasonably. According to the nature and the characteristic of knowledge competitiveness of enterprise, a system of evaluation index has been designed about the knowledge competitiveness of enterprise. Taking the enterprise A as an example, it is appraised by using fuzzy comprehension evaluation based on entropy weight, and has provided a new idea for the knowledge competitiveness of enterprise. 展开更多
关键词 knowledge competitiveness entropy weight fuzzy comprehension evaluation
下载PDF
人工智能聊天机器人对科研成果与人才评价的影响研究——基于ChatGPT、Microsoft Bing视角分析 被引量:40
16
作者 蒋华林 《重庆大学学报(社会科学版)》 CSSCI 北大核心 2023年第2期97-110,共14页
美国开放人工智能研究中心(OpenAI)研发的人工智能聊天机器人ChatGPT,基于“生成预训练转换器”(GPT)语言模型能够理解和响应自然语言输入,于2022年11月30日正式发布,短时间内在全球互联网界、学术界及产业界引发热议和关注。以ChatGPT... 美国开放人工智能研究中心(OpenAI)研发的人工智能聊天机器人ChatGPT,基于“生成预训练转换器”(GPT)语言模型能够理解和响应自然语言输入,于2022年11月30日正式发布,短时间内在全球互联网界、学术界及产业界引发热议和关注。以ChatGPT、Microsoft Bing为代表的人工智能聊天机器人基于超大海量数据,采用“从人类反馈中强化学习”(RLHF)进行训练,主要具有三大功能:智能交互对话、智能文本生成、智能文献爬取。人工智能聊天机器人的核心竞争力是采用人工智能生成内容技术(AIGC)而具有强大的内容生成或文本生成能力,除能够生成一般应用性文稿外,还能够从事科学写作,从而引领和推动知识生产方式和学术研究范式变革,知识生产和学术研究进程将显著提速,知识生产者将从非创造性劳动中获得解放,知识生产方式将由“手动式”“半自动式”迈向“自动化”“智能化”。这种变革对传统的科研成果评价机制将产生重大影响,更进一步将对通过科研成果进行人才评价产生重大影响。大体上说,以ChatGPT为代表的人工智能聊天机器人应用于学术研究中,将遮蔽成果演化学术史,影响科研成果创新性评价;挑战知识产权保护制度,影响科研成果权属认定;带来学术伦理风险,影响科研成果评价生态;冲击人才评价基本标准,影响人才评价客观性。鉴于人工智能的渗透性、扩散性和颠覆性,首先要在思想认识上积极面对而不是消极应对,用其所长、避其所短,审慎使用,着力发挥其促进知识生产、推动学术进步的积极作用;其次,要抓住现行相关法规制度与快速进步的人工智能技术之间发展不平衡的矛盾,进一步完善制度、设置“护栏”,规范使用;第三,要推动技术开源,公开其智能生成逻辑,增强人工智能聊天机器人的技术可信度;第四,要建立人机协作机制,既发挥技术的数据处理优势,又发挥人的理性思维优势,最终由人把关知识生产、科研成果及人才评价。 展开更多
关键词 人工智能 人工智能聊天机器人 人工智能生成内容 ChatGPT 微软必应 科研成果评价 人才评价 知识生产方式
下载PDF
Fuzzy Model for Trust Evaluation 被引量:7
17
作者 张仕斌 何大可 《Journal of Southwest Jiaotong University(English Edition)》 2006年第1期23-28,共6页
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ... Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy synthetic evaluation. Considering the complicated and changeable relationships between various subjects, the multi-level mathematical model of fuzzy synthetic evaluation is introduced. An example of a two-level fuzzy synthetic evaluation model confirms the feasibility of the multi-level fuzzy synthesis evaluation model. The proposed fuzzy model for trust evaluation may provide a promising method for research of trust model in open networks. 展开更多
关键词 trust model trust vector trust class Synthetic evaluation Fuzzy set theory
下载PDF
New Knowledge Network Evaluation Method for Design Rationale Management 被引量:3
18
作者 JING Shikai ZHAN Hongfei +3 位作者 LIU Jihong WANG Kuan JIANG Hao ZHOU Jingtao 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2015年第1期173-186,共14页
Current design rationale (DR) systems have not demonstrated the value of the approach in practice since little attention is put to the evaluation method of DR knowledge. To systematize knowledge management process f... Current design rationale (DR) systems have not demonstrated the value of the approach in practice since little attention is put to the evaluation method of DR knowledge. To systematize knowledge management process for future computer-aided DR applications, a prerequisite is to provide the measure for the DR knowledge. In this paper, a new knowledge network evaluation method for DR management is presented. The method characterizes the DR knowledge value from four perspectives, namely, the design rationale structure scale, association knowledge and reasoning ability, degree of design justification support and degree of knowledge representation conciseness. The DR knowledge comprehensive value is also measured by the proposed method. To validate the proposed method, different style of DR knowledge network and the performance of the proposed measure are discussed. The evaluation method has been applied in two realistic design cases and compared with the structural measures. The research proposes the DR knowledge evaluation method which can provide object metric and selection basis for the DR knowledge reuse during the product design process. In addition, the method is proved to be more effective guidance and support for the application and management of DR knowledge. 展开更多
关键词 design rationale knowledge reasoning justification support decision support knowledge network evaluation
下载PDF
METrust: A Mutual Evaluation-based Trust Model for P2P Networks 被引量:2
19
作者 Chun-Ling Cheng Xiao-Long Xu Bing-Zhen Gao 《International Journal of Automation and computing》 EI 2012年第1期63-71,共9页
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only fo... It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers' evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers' malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers' own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors. 展开更多
关键词 Peer-to-peer (P2P) network REPUTATION trust model mutual evaluation similarity risk
下载PDF
Authorization Management Framework Based on Joint Trust-Risk Evaluation 被引量:1
20
作者 YANG Qiuwei WU Sunyong +1 位作者 HONG Fan LIAO Junguo 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期9-12,共4页
Authorization management is important precondition and foundation for coordinating and resource sharing in open networks. Recently, authorization based on trust is widely used whereby access rights to shared resource ... Authorization management is important precondition and foundation for coordinating and resource sharing in open networks. Recently, authorization based on trust is widely used whereby access rights to shared resource are granted on the basis of their trust relation in distributed environment. Nevertheless, dynamic change of the status of credential and chain of trust induces to uncertainty of trust relation. Considering uncertainty of authorization and analyzing deficiency of authorization model only based on trust, we proposes joint trust-risk evaluation and build the model based on fuzzy set theory, and make use of the membership grade of fuzzy set to express joint trust-risk relation. Finally, derivation principle and constraint principle of joint trust-risk relationships are presented. The authorization management model is defined based on joint trust-risk evaluation, proof of compliance and separation of duty are analyzed. The proposed model depicts not only trust relationship between principals, but also security problem of authorization. 展开更多
关键词 trust management authorization management risk evaluation proof of compliance fuzzy set
下载PDF
上一页 1 2 141 下一页 到第
使用帮助 返回顶部