期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
基于贝叶斯方法的水文地质参数识别 被引量:22
1
作者 陆乐 吴吉春 陈景雅 《水文地质工程地质》 CAS CSCD 北大核心 2008年第5期58-63,共6页
文章基于马尔可夫链(MCMC)采样法,耦合地下水数值模拟的MODFLOW软件,提出了贝叶斯方法,用于水文地质参数识别这一复杂的非线性优化问题。采取单分量自适应Metropolis(SCAM)采样算法并加入了权重因子,从而大大提高了该方法解决高维参数... 文章基于马尔可夫链(MCMC)采样法,耦合地下水数值模拟的MODFLOW软件,提出了贝叶斯方法,用于水文地质参数识别这一复杂的非线性优化问题。采取单分量自适应Metropolis(SCAM)采样算法并加入了权重因子,从而大大提高了该方法解决高维参数问题的效率。通过两个实例研究,验证了该方法具有独特的寻优性能和效率。结果表明,贝叶斯方法适用于复杂地下水问题的参数识别,并体现出了出色的全局寻优性。 展开更多
关键词 贝叶斯方法 MCMC方法 SCAM算法 水文地质参数 优化 参数识别
下载PDF
SCAM絮凝剂的合成及其在石油废水处理中的应用 被引量:3
2
作者 马希晨 曹亚峰 +2 位作者 崔励 徐秋 刘兆莉 《大连轻工业学院学报》 1998年第2期6-9,共4页
以淀粉为基材,进行接枝共聚反应,再经羟甲基化、叔胺化、季胺化制得SCAM系列产品。文中介绍了SCAM的合成工艺及反应原理,并对含油污水进行了澄清试验、沉降试验,考查了含油污水处理前后的COD值、浊度等,并对用SCAM... 以淀粉为基材,进行接枝共聚反应,再经羟甲基化、叔胺化、季胺化制得SCAM系列产品。文中介绍了SCAM的合成工艺及反应原理,并对含油污水进行了澄清试验、沉降试验,考查了含油污水处理前后的COD值、浊度等,并对用SCAM处理含油污水(乳化油水混合体系)的机理进行了探讨,比较了SCAM系列产品及聚丙烯酰胺600万用于含油污水的处理情况。 展开更多
关键词 石油工业 油田 废水处理 SCAM 絮凝剂
下载PDF
可溶性粘附分子与缺血性卒中 被引量:8
3
作者 夏斌 邵福源 《国外医学(脑血管疾病分册)》 1999年第3期131-133,共3页
细胞粘附分子在动脉粥样硬化形成和缺血/再灌注损伤中起重要作用,在有缺血性卒中危险因素的人群和缺血性卒中病人中均发现有可溶性粘附分子含量的变化,定量检测其血清含量对于探讨缺血性卒中发病机制和指导临床治疗有潜在的价值。
关键词 粘附分子 缺血性卒中 脑缺血 SCAM
下载PDF
基于sif和SCAM结合的复制检测算法
4
作者 熊志勇 梁颖红 《苏州市职业大学学报》 2013年第4期7-10,共4页
复制检测在知识产权保护等许多领域都有重要的应用.构建一个数据库,该数据库可以用来存储注册文档和预处理,提出一种基于sif和SCAM结合的文本检测改进算法.对该改进算法进行描述并分析改进后算法的优势.
关键词 复制检测 sif工具 SCAM 词频 相似度
下载PDF
Forensic Accounting: A Checkmate for Corporate Fraud
5
作者 Lakshmi P Ganesh Menon 《Journal of Modern Accounting and Auditing》 2016年第9期453-460,共8页
Forensic accounting gained importance due to increasing number of financial frauds and scams. This new area in accounting encompasses accounting, auditing, and investigative skills, thus emerged to detect frauds. They... Forensic accounting gained importance due to increasing number of financial frauds and scams. This new area in accounting encompasses accounting, auditing, and investigative skills, thus emerged to detect frauds. They involve themselves in different areas like employee-related frauds, settlement and arbitrations, etc.. A forensic accountant has a financial sixth sense. Despite the fact that forensic accounting can bridge the gap between conventional accounting and auditing, this profession has not been able to gain the needed momentum due to some hassles. This paper tries to shed light on the theoretical concept, nature, practice, need, role of forensic accounting in preventing fraud, and the practical difficulties faced by forensic accountants. The study is based on information collected from interviewing practicing forensic accounting in India during 2011-12. The paper was able to assess the importance and rising scope of forensic accounting as a job. It also understood the practical difficulties they faced like lack of organized databases in Indian scenario which makes it difficult to access all needed information. Expectation level of the clients is very high and at times even unreasonable. This paper fulfills an identified need to study the important rising field of forensic accounting in India. 展开更多
关键词 forensic accounting accounting frauds AUDITING internal audit accounting scams
下载PDF
Hacked by Bits and Pieces: What Can We Learn from an Example of Corporate Espionage?
6
作者 Jack Schafer Marvin Karlins 《Journal of Information Security》 2021年第3期224-231,共8页
Information security often involves the development and application of so</span><span style="font-family:Verdana;">phisticated software to protect sensitive information stored in corporate</sp... Information security often involves the development and application of so</span><span style="font-family:Verdana;">phisticated software to protect sensitive information stored in corporate</span><span style="font-family:Verdana;"> computers. Yet, in this example of corporate espionage, a clever person, a cellphone and some readily available software were all it took to crack through one company’s advanced security barriers. By reading this article it is hoped that employees at all levels of an organization’s hierarchy will become more aware of—and recognize—how: 1) bits and pieces of seemingly harmless and easy-to-acquire information can be used for sinister purposes;2) building rapport and trust with a person can make them more likely to become unknowing co-conspirators in a devious undertaking;and 3) how one must be constantly alert not to give out information without carefully considering the authenticity and justification of the source requesting it. 展开更多
关键词 Cyber Security HACKING Social Engineering scams Corporate Espionage
下载PDF
基于改进SCAM算法的结构物理参数识别贝叶斯方法
7
作者 赵一男 公茂盛 +1 位作者 左占宣 高艳滨 《振动与冲击》 EI CSCD 北大核心 2021年第6期121-126,共6页
针对贝叶斯估计中逐分量自适应Metropolis(single component adaptive Metropolis,SCAM)算法易生成重复性样本,导致抽样效率低、结果误差大等问题,重新定义了提议分布方差的表达式,提出了改进的SCAM算法,使得抽样样本序列构成的马尔可... 针对贝叶斯估计中逐分量自适应Metropolis(single component adaptive Metropolis,SCAM)算法易生成重复性样本,导致抽样效率低、结果误差大等问题,重新定义了提议分布方差的表达式,提出了改进的SCAM算法,使得抽样样本序列构成的马尔可夫链相对稳定。进而将贝叶斯理论与改进的SCAM算法相结合,求解结构物理参数的后验边缘概率分布、最优估计值以识别和估计结构损伤,通过理论分析和结构数值模拟算例验证了改进的SCAM算法的有效性。结果表明,改进的SCAM算法既提高了抽样效率,又提高了计算结果准确性,可应用于物理参数识别及损伤识别与评估等工作。 展开更多
关键词 结构物理参数识别 贝叶斯估计 马尔可夫蒙特卡罗(MCMC)抽样 提议分布 逐分量自适应Metropolis(SCAM)算法
下载PDF
SCSI接口的原理、发展及其应用
8
作者 粟皓 王健 +1 位作者 卜风方 黄嵩 《新疆工学院学报》 1999年第3期186-189,193,共5页
论述了SCSI接口的基本知识与电气特性,着重分析了其接口协议、发展及其SCSI硬盘在视音频实时采集存储领域的应用,最后对SCSI做了较全面的评估.
关键词 SCSI SCSIID SCAM 协议
下载PDF
Investment Scam
9
《海外英语》 2011年第6期37-37,共1页
俗话说,“商场如战场!”在这个没有硝烟的战场上,每一笔投资都至关紧要,一旦失败,轻则损失惨重。重则永远在“商场”上消失。历史上投资失败的例子还真不少呢……
关键词 《Investment Scam》 英语学习 学习方法 阅读
下载PDF
Aparecium:understanding and detecting scam behaviors on Ethereum via biased random Walk
10
作者 Chuyi Yan Chen Zhang +5 位作者 Meng Shen Ning Li Jinhao Liu Yinhao Qi Zhigang Lu Yuling Liu 《Cybersecurity》 EI CSCD 2024年第3期16-31,共16页
Ethereum's high attention,rich business,certain anonymity,and untraceability have attracted a group of attackers.Cybercrime on it has become increasingly rampant,among which scam behavior is convenient,cryptic,ant... Ethereum's high attention,rich business,certain anonymity,and untraceability have attracted a group of attackers.Cybercrime on it has become increasingly rampant,among which scam behavior is convenient,cryptic,antagonistic and resulting in large economic losses.So we consider the scam behavior on Ethereum and investigate it at the node interaction level.Based on the life cycle and risk identification points we found,we propose an automatic detection model named Aparecium.First,a graph generation method which focus on the scam life cycle is adopted to mitigate the sparsity of the scam behaviors.Second,the life cycle patterns are delicate modeled because of the crypticity and antagonism of Ethereum scam behaviors.Conducting experiments in the wild Ethereum datasets,we prove Aparecium is effective which the precision,recall and F1-score achieve at 0.977,0.957 and 0.967 respectively. 展开更多
关键词 Blockchain Network security Ethereum Scam detection Behavior understanding
原文传递
Investigating the impact of structural and temporal behaviors in Ethereum phishing users detection
11
作者 Medhasree Ghosh Dyuti Ghosh +1 位作者 Raju Halder Joydeep Chandra 《Blockchain(Research and Applications)》 EI 2023年第4期24-38,共15页
The recent surge of Ethereum in prominence has made it an attractive target for various kinds of crypto crimes.Phishing scams,for example,are an increasingly prevalent cybercrime in which malicious users attempt to st... The recent surge of Ethereum in prominence has made it an attractive target for various kinds of crypto crimes.Phishing scams,for example,are an increasingly prevalent cybercrime in which malicious users attempt to steal funds from a user’s crypto wallet.This research investigates the effects of network architectural features as well as the temporal aspects of user activities on the performance of detecting phishing users on the Ethereum transaction network.We employ traditional machine learning algorithms to evaluate our model on real-world Ethereum transaction data.The experimental results demonstrate that our proposed features identify phishing accounts efficiently and outperform the baseline models by 4%in Recall and 5%in F1-score. 展开更多
关键词 Blockchain Cryptocurrency Ethereum Phishing scam Machine learning
原文传递
The“Bitcoin Generator”Scam
12
作者 Emad Badawi Guy-Vincent Jourdan Iosif-Viorel Onut 《Blockchain(Research and Applications)》 2022年第3期70-88,共19页
The“Bitcoin Generator Scam”(BGS)is a cyberattack in which scammers promise to provide victims with free cryptocurrencies in exchange for a small mining fee.In this paper,we present a data-driven system to detect,tra... The“Bitcoin Generator Scam”(BGS)is a cyberattack in which scammers promise to provide victims with free cryptocurrencies in exchange for a small mining fee.In this paper,we present a data-driven system to detect,track,and analyze the BGS.It works as follows:we first formulate search queries related to BGS and use search engines to find potential instances of the scam.We then use a crawler to access these pages and a classifier to differentiate actual scam instances from benign pages.Last,we automatically monitor the BGS instances to extract the cryptocurrency addresses used in the scam.A unique feature of our system is that it proactively searches for and detects the scam pages.Thus,we can find addresses that have not yet received any transactions.Our data collection project spanned 16 months,from November 2019 to February 2021.We uncovered more than 8,000 cryptocurrency addresses directly associated with the scam,hosted on over 1,000 domains.Overall,these addresses have received around 8.7 million USD,with an average of 49.24 USD per transaction.Over 70%of the active addresses that we are capturing are detected before they receive any transactions,that is,before anyone is victimized.We also present some post-processing analysis of the dataset that we have captured to aggregate attacks that can be reasonably confidently linked to the same attacker or group.Our system is one of the first academic feeds to the APWG eCrime Exchange database.It has been actively and automatically feeding the database since November 2020. 展开更多
关键词 Cryptocurrency Scam analysis Cyberattack Fraud detection Bitcoin Blockchain analysis Data mining
原文传递
DYNASTY OF DUPES--CHINA'S IMPERIAL LEGACY OFFERS A LOCAL SPIN ON A CLASSIC SCAM
13
《The World of Chinese》 2019年第1期8-9,共2页
On June 19,2017,the Shenzhen Intermediate People's Court opened its second hearing on Liu Qjanzhen,an unemployed 57-year-old villager from Jiangsu province--or,as his victim Zheng Xueju knew him,the "Qjanlong... On June 19,2017,the Shenzhen Intermediate People's Court opened its second hearing on Liu Qjanzhen,an unemployed 57-year-old villager from Jiangsu province--or,as his victim Zheng Xueju knew him,the "Qjanlong Emperor," the still-surviving inheritor of multiple Qjng family fortunes and sound investment opportunity. 展开更多
关键词 DYNASTY OF DUPES LOCAL SPIN CLASSIC SCAM
原文传递
意大利贵宾视察在沪SCAM品牌专卖店
14
《中外鞋苑》 2002年第7期106-106,共1页
日前,意大利马切拉塔省省长PIGLIAPOCO SAURO一行视察了位于上海淮海中路138号上海广场底层的意大利SCAM皮鞋皮具直销专卖店,他对意大利著名皮具制造集团——SCAM成功进军中国市场表示赞赏。 众所周知。
关键词 SCAM 品牌专卖店 制造集团 淮海中路 君太 制造工厂 手制 专业技术人才 上盗 包袋
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部