期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
Machine Learning-Based Advertisement Banner Identification Technique for Effective Piracy Website Detection Process
1
作者 Lelisa Adeba Jilcha Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2022年第5期2883-2899,共17页
In the contemporary world, digital content that is subject to copyright is facing significant challenges against the act of copyright infringement.Billions of dollars are lost annually because of this illegal act. The... In the contemporary world, digital content that is subject to copyright is facing significant challenges against the act of copyright infringement.Billions of dollars are lost annually because of this illegal act. The currentmost effective trend to tackle this problem is believed to be blocking thosewebsites, particularly through affiliated government bodies. To do so, aneffective detection mechanism is a necessary first step. Some researchers haveused various approaches to analyze the possible common features of suspectedpiracy websites. For instance, most of these websites serve online advertisement, which is considered as their main source of revenue. In addition, theseadvertisements have some common attributes that make them unique ascompared to advertisements posted on normal or legitimate websites. Theyusually encompass keywords such as click-words (words that redirect to installmalicious software) and frequently used words in illegal gambling, illegal sexual acts, and so on. This makes them ideal to be used as one of the key featuresin the process of successfully detecting websites involved in the act of copyrightinfringement. Research has been conducted to identify advertisements servedon suspected piracy websites. However, these studies use a static approachthat relies mainly on manual scanning for the aforementioned keywords. Thisbrings with it some limitations, particularly in coping with the dynamic andever-changing behavior of advertisements posted on these websites. Therefore,we propose a technique that can continuously fine-tune itself and is intelligentenough to effectively identify advertisement (Ad) banners extracted fromsuspected piracy websites. We have done this by leveraging the power ofmachine learning algorithms, particularly the support vector machine with theword2vec word-embedding model. After applying the proposed technique to1015 Ad banners collected from 98 suspected piracy websites and 90 normal orlegitimate websites, we were able to successfully identify Ad banners extractedfrom suspected piracy websites with an accuracy of 97%. We present thistechnique with the hope that it will be a useful tool for various effective piracywebsite detection approaches. To our knowledge, this is the first approachthat uses machine learning to identify Ad banners served on suspected piracywebsites. 展开更多
关键词 Copyright infringement piracy website detection online advertisement advertisement banners machine learning support vector machine word embedding word2vec
下载PDF
China Cracks Down Internet Piracy
2
《China's Foreign Trade》 2006年第6期25-,共1页
  National Copyright Administration of China carried out a special operation to crack down on behaviors involving network infringement and piracy from September to December in 2005 ,according to the speech of Yan Xi...   National Copyright Administration of China carried out a special operation to crack down on behaviors involving network infringement and piracy from September to December in 2005 ,according to the speech of Yan Xiaohong,Deputy Commissioner of National Copyright Administration on the Press Conference of the State Council.Now the relevant conditions are as follows:…… 展开更多
关键词 In DOWN China Cracks Down Internet piracy DOWN
下载PDF
Spatial Analysis of Maritime Piracy in the Gulf of Guinea
3
作者 Okpuvwie Ejuvweyere Jonathan 《Journal of Marine Science》 2021年第4期36-45,共10页
Humans rely on the sea for food and mineral resources;hence it is vital to their economic survival.Nations all throughout the world rely on the water for trade and commerce.This article looks at the present condition ... Humans rely on the sea for food and mineral resources;hence it is vital to their economic survival.Nations all throughout the world rely on the water for trade and commerce.This article looks at the present condition of marine security in the Gulf of Guinea.The Gulf of Guinea has a total shoreline of about 5,000 nautical miles and several natural harbours with dangerous weather.It has a significant crude oil reservoir,as well as fish and other natural resources.These traits provide huge prospects for marine trade and transportation,but the Gulf of Guinea is also riddled with maritime crimes of all types,including piracy and smuggling.Maritime piracy has presented a threat to coastal states’stability and economic viability all across the world,not only in Africa.The study examines sea piracy in general,the Geographic Information System,and the impact of maritime piracy on the world socioeconomic development using secondary data.It then goes on to provide a number of recommendations aimed at addressing the problems caused by maritime piracy in the Gulf of Guinea in order to improve maritime security. 展开更多
关键词 GIS GULF NAVIGATION piracy SEA
下载PDF
Suffering Piracy
4
作者 Hou Weili 《ChinAfrica》 2012年第6期16-17,共2页
WHEN new films are released, Li Heng, a col- lege student in Beijing, usually goes to a ped- dler to buy DVDs at the gate of his college. And usually, he can get the film DVDs at the prices he expected, at about 10 yu... WHEN new films are released, Li Heng, a col- lege student in Beijing, usually goes to a ped- dler to buy DVDs at the gate of his college. And usually, he can get the film DVDs at the prices he expected, at about 10 yuan ($1.59) apiece. 展开更多
关键词 LI Suffering piracy
下载PDF
Sedimentological evidence of the piracy of fossil Zoige Lake by the Yellow River 被引量:8
5
作者 王云飞 王苏民 +6 位作者 薛滨 吉磊 吴敬禄 夏威岚 潘红玺 张平中 陈发虎 《Chinese Science Bulletin》 SCIE EI CAS 1995年第18期1539-1544,共6页
The Yellow River, the birthplace of China’s culture, is well known over the world forits huge sediment yield and unruly temper. The origin of the river was considered bymany foreign and domestic scholars through long... The Yellow River, the birthplace of China’s culture, is well known over the world forits huge sediment yield and unruly temper. The origin of the river was considered bymany foreign and domestic scholars through long-term studies as: the Yellow River turnedgradually to the present features through the way that the river was eroded headwards 展开更多
关键词 SEDIMENTARY RECORD 35-38ka B.P. piracy by the YELLOW River FOSSIL Zoige Lake.
原文传递
Access Pricing to An Operating System Platform when Piracy Matters 被引量:1
6
作者 Asma Brahem Khaireddine Jebsi 《Journal of Systems Science and Systems Engineering》 SCIE EI CSCD 2020年第2期184-202,共19页
This paper examines the impact of piracy on access pricing strategy of an operating system platform.We study the behavior of users and developers due to an increase in software protection when positive network externa... This paper examines the impact of piracy on access pricing strategy of an operating system platform.We study the behavior of users and developers due to an increase in software protection when positive network externalities matter.We show that when piracy cost increases,access demands to the platform vary in the same direction and the magnitude of this variation depends on both the marginal network benefit that a developer derives and a certain threshold of piracy cost.Taking into account the behavior of these two sides when piracy matters,the monopoly platform changes its pricing strategy.We show that,it tends to reduce or to increase access fees.Finally,we show that under certain conditions,the divide-and-conquer pricing strategy can be reversed. 展开更多
关键词 Platform software DEVELOPERS piracy two-sided MARKET single-homing
原文传递
Is the Shanzhai Style of Parodying Popular Culture Innovation or Piracy?
7
《Beijing Review》 2009年第13期46-47,共2页
What started off as a term to describe copies of electronic brand products has now moved along the evolutionary road of duplication.
关键词 Is the Shanzhai Style of Parodying Popular Culture Innovation or piracy INNOVATION
原文传递
Curbing Piracy
8
作者 DING YING 《Beijing Review》 2011年第8期14-15,共2页
Strategies differ widely in dealing with Somali pirates Hijacking,detaining hostages and ransom are the core of Somali pirates’ "business model." Up until recently, it has largely been unchallenged,as most ... Strategies differ widely in dealing with Somali pirates Hijacking,detaining hostages and ransom are the core of Somali pirates’ "business model." Up until recently, it has largely been unchallenged,as most countries have paid ransom to secure the release of hostages. 展开更多
关键词 Curbing piracy
原文传递
Piracy Crackdow
9
作者 HE WENPING 《Beijing Review》 2009年第1期12-13,共2页
Piracy CrackdownThe international community is working together to nabpirates off the Somali
关键词 piracy Crackdow
原文传递
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part 1
10
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2019年第11期539-547,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability―theoretical reasonableness of deception,which destroys the system of contracts as a condition of the world order,leaped as a report at the University of London(Birkbeck)on Feb.9,2018,which the relevance of its problems beat real events in because the state of modern“utopianism”―the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence―“occupy”(seizure of the“alien”)―has never changed.As in the case of Marks’s“capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:The norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society―such are the“difficulties to the stars”:Without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra TERROR TROJAN TERRORISM TIMOR piracy technology of lies Myth
下载PDF
The Three Gorges Area and the Linking of the Upper and Middle Reaches of the Yangtze River
11
作者 Jietao Wang N’dji dit Jacques Dembele 《Journal of Geographic Information System》 2018年第3期301-322,共22页
The history of the Yangtze River is constituted by numerous river piracies that enabled the river to extend its drainage system. Two river captures are well recognized: the piracy of the Jinsha River (Jinshajiang) for... The history of the Yangtze River is constituted by numerous river piracies that enabled the river to extend its drainage system. Two river captures are well recognized: the piracy of the Jinsha River (Jinshajiang) formerly tributary of the Red River at Shigu in Yunnan Province and the Three Gorges area that linked the upper and the middle Yangtze river reaches in Hubei province. The first one is well documented, while the second, because of difficulties to retrieve datable materials and the complexity of the area geomorphology, is still quite unknown. Numerous conflicting hypotheses have been formulated to explain the pattern of river piracy, no agreement exists on the location of the drainage divide and of the point of capture;chronologies extending from the Eocene to the late Quaternary are given. Geomorphic indices can be used to examine the geomorphological and tectonic processes responsible for the development of the drainage basins. In this paper, we analyzed drainage pattern, basin shape, basin asymmetry, stream junction angle to infer the drainage of the paleorivers that were pirated, and to propose a model of the pattern of river capture based on the importance of structure, tectonic and lithological controls in the area. We showed that the Three Gorges area has been very important to the history of the Yangtze river as the piracy of the upper and middle reaches enabled the river to reach its current extend. 展开更多
关键词 YANGTZE RIVER Three Gorges RIVER piracy DEM
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part Ⅱ
12
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2020年第9期409-417,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability-theoretical reasonableness of Deception,which destroys the system of contracts as a condition of the world order.My report at the University of London(Birkbeck)on Feb.9,2018,which was read in English,still not the latest direct evidence of the use of this scandalous method of“Trojan terrorism”—the defamation of the whole country(Russia),plus violation of territorial integrity,including and military attack,another country that lies on the other side of the ocean(Syria),and which is accused of not living by the rules(the“Absolute”method by Caesar),the relevance of its problems beat real events in because the state of modern“utopianism”-the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence-“occupy”(seizure of the“alien”)-has never changed,and the March-April events in international politics are just another notch on this dead python,which is called“democratic values”.As in the case of Marks’s“Capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:the norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society-such are the“difficulties to the stars”:without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra TERROR “Trojan terrorism” piracy technology of lies Myth
下载PDF
Withered Peach Blossoms-A Discussion for the Phenomenon of a Poor Sense of Copyright in Chinese Youth Netizens and the Suggestion Contents
13
作者 Qingyang Xu 《Journal of Economic Science Research》 2019年第4期10-15,共6页
This proposal expresses a standpoint concerning a discussion for the phenomenon of a poor sense of copyright in Chinese youth netizens and the suggestion.The phenomenon of a poor sense of copyright in Chinese youth ne... This proposal expresses a standpoint concerning a discussion for the phenomenon of a poor sense of copyright in Chinese youth netizens and the suggestion.The phenomenon of a poor sense of copyright in Chinese youth netizens has disadvantages.By analyzing it,a clear status of Chinese youth netizens'problems on the poor sense of copyright will be shown.At the same time,when we consider a discussion for the phenomenon of a poor sense of copyright in Chinese youth netizens and the suggestion,we must address several main reasons that contribute to problem.These include cultural tradition restriction,incomprehensive market system,inappropriate price incentive,imperfective legal institutions and indifference education system.It is valuable for the originators feel free to create better works.Meanwhile,those factors are essential for Chinese youth netizens to consider the way to be cultivated the right spending habits.Only by analyzing all these factors together and then using these results to apply to intensity notional cultural competitiveness and form an innovative market.This paper is organized as follows:The first part will outline the poor sense of copyright in Chinese youth netizens'case studies and analyze.The second part is an introduction of the problems of the phenomenon of a poor sense of copyright in Chinese youth netizens.The reasons causing the problems are analyzed in part three.Some proposals to overcome copyright problem will be advocated in last part.This study found that enhancing copyright awareness is a very complex task for Chinese youth netizens.Cultural tradition restriction,incomprehensive market system,inappropriate price incentive,imperfective legal institutions and indifference education system are all factors which bring difficulties to promote copyright awareness in Chinese youth netizens.Combined those factors with four problems of the phenomenon in China,I offer appropriate suggestions to overcome problems and help youth netizens acquire the knowledge of copyright. 展开更多
关键词 Chinese YOUTH netizens COPYRIGHT awareness piracy
下载PDF
The impacts of base level and lithology on fluvial geomorphic evolution at the tectonically active Laohu and Hasi Mountains,northeastern Tibetan Plateau
14
作者 Zhengchen LI Xianyan WANG +4 位作者 Yang YU Huiping ZHANG Qi SU Xiaodong MIAO Huayu LU 《Science China Earth Sciences》 SCIE EI CSCD 2021年第6期906-919,共14页
Previous researches had emphasized tectonic impacts on the fluvial system at the tectonically active areas,while the effects of lithology and local base level change have received relatively rare attention.Here we inv... Previous researches had emphasized tectonic impacts on the fluvial system at the tectonically active areas,while the effects of lithology and local base level change have received relatively rare attention.Here we investigated fluvial landforms at different spatial scales,focusing on knickpoints and channel network reorganization from an area affected by the Haiyuan Fault in the northeastern Tibetan Plateau.The geomorphic indices,i.e.,drainage pattern andχanomalies,were calculated and investigated.The results show that two regional radial drainages formed around the Laohu and Hasi Mountains.Within the interior of the radial drainage,tributaries from the southeast side of the Laohu Mountain experienced near 180°direction change.We interpret this as the gradual drainage capture originating from the height difference(~190 m)of the local base level between the two catchments.Some tributaries from the Hasi Mountain show alternating gorges and broad valleys controlled by lithology.Besides,tectonic uplift and the lowering of base level(from the incision of the Yellow River)triggered an autogenic positivefeedback transition from parallel to dendritic drainage patterns.These observations suggest that base level change and lithology play a crucial role in landscape evolution,even in a tectonically active region. 展开更多
关键词 River piracy Base level LITHOLOGY Geomorphic index Haiyuan Fault Northeastern Tibetan Plateau
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部