期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Modeling robotic operations controlled by natural language
1
《Control Theory and Technology》 EI CSCD 2017年第4期258-266,共9页
There are multiple ways to control a robotic system. Most of them require the users to have prior knowledge about robots or get trained before using them. Natural language based control attracts increasing attention d... There are multiple ways to control a robotic system. Most of them require the users to have prior knowledge about robots or get trained before using them. Natural language based control attracts increasing attention due to its versatility and less requirements for users. Since natural language instructions from users cannot be understood by the robots directly, the linguistic input has to be processed into a formal representation which captures the task specification and removes the ambiguity inherent in natural language. For most of existing natural language controlled robotic system, they assume the given language instructions are already in correct orders. However, it is very likely for untrained users to give commands in a mixed order based on their direct observation and intuitive thinking. Simply following the order of the commands can lead to failures of tasks. To provide a remedy for the problem, we propose a novel framework named dependency relation matrix (DRM) to model and organize the semantic information extracted from language input, in order to figure out an executable sequence of subtasks for later execution. In addition, the proposed approach projects abstract language input and detailed sensory information into the same space, and uses the difference between the goal specification and temporal status of the task under implementation to monitor the progress of task execution. In this paper, we describe the DRM framework in detail, and illustrate the utility of this approach with experiment results. 展开更多
关键词 Natural language control task planning human-machine interaction
原文传递
A Cross-Domain Access Control Model Based on Trust Measurement
2
作者 YANG Xiaohui WANG Hong 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期21-28,共8页
Based on trust measurement, a new cross-domain access control model is proposed to improve the security performance of the cross-domain access control processes. This model integrates the trust management and trusted ... Based on trust measurement, a new cross-domain access control model is proposed to improve the security performance of the cross-domain access control processes. This model integrates the trust management and trusted platform measurement, defines several concepts (user trust degree, platform configuration integrity and intra/inter-domain trust degree) and calculates them with users' uniform identity authentication and historical access behavior analysis. Then this model expands the extensible access control markup language (XACML) model by adding inside trust manager point (ITMP) and outside trust manager point (OTMP), and describes the architectures and workflows of ITMP and OTMP in details. The experimental results show that this model can achieve more fine-grained access control, implement dynamic authorization in a simple way, and improve the security degrees of the cross-domain access control. 展开更多
关键词 access control cross-domain access extensible access control markup language (XACML) trust degree
原文传递
A Review of Automatic Pre-editing Approaches in Machine Translation
3
作者 WANG Jun-song MENG Ya-qi WANG Ai-qing 《Journal of Literature and Art Studies》 2025年第6期483-489,共7页
With the development of machine translation technology,automatic pre-editing has attracted increasing research attention for its important role in improving translation quality and efficiency.This study utilizes UAM C... With the development of machine translation technology,automatic pre-editing has attracted increasing research attention for its important role in improving translation quality and efficiency.This study utilizes UAM Corpus Tool 3.0 to annotate and categorize 99 key publications between 1992 and 2024,tracing the research paths and technological evolution of automatic pre-translation editing.The study finds that current approaches can be classified into four categories:controlled language-based approaches,text simplification approaches,interlingua-based approaches,and large language model-driven approaches.By critically examining their technical features and applicability in various contexts,this review aims to provide valuable insights to guide the future optimization and expansion of pre-translation editing systems. 展开更多
关键词 automatic pre-editing machine translation controlled language text simplification large language models
在线阅读 下载PDF
A Review of Research on Pre-editing of Machine Translation
4
作者 ZHANG Xue-yao 《Journal of Literature and Art Studies》 2025年第1期36-43,共8页
In the process of machine translation,pre-editing is a crucial step,which can help reduce the cost of post-translation editing and improve the quality of machine translation.By sorting out and reviewing the relevant l... In the process of machine translation,pre-editing is a crucial step,which can help reduce the cost of post-translation editing and improve the quality of machine translation.By sorting out and reviewing the relevant literature about pre-editing of machine translation,this paper summarizes the previous researches on pre-editing of machine translation from three aspects:the theoretical framework,automated and semi-automated pre-translation editing and evaluation of pre-translation editing effect.The possible development direction of pre-translation edting is also put forward. 展开更多
关键词 Machine Translation(MT) pre-editing controlled language automatic pre-translation editing
在线阅读 下载PDF
Automated extraction of attributes from natural language attribute-based access control(ABAC)Policies 被引量:4
5
作者 Manar Alohaly Hassan Takabi Eduardo Blanco 《Cybersecurity》 CSCD 2019年第1期38-62,共25页
The National Institute of Standards and Technology(NIST)has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access... The National Institute of Standards and Technology(NIST)has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access control policy(NLACP)to a machine-readable form.To study the automation process,we consider the hierarchical ABAC model as our reference model since it better reflects the requirements of real-world organizations.Therefore,this paper focuses on the questions of:how can we automatically infer the hierarchical structure of an ABAC model given NLACPs;and,how can we extract and define the set of authorization attributes based on the resulting structure.To address these questions,we propose an approach built upon recent advancements in natural language processing and machine learning techniques.For such a solution,the lack of appropriate data often poses a bottleneck.Therefore,we decouple the primary contributions of this work into:(1)developing a practical framework to extract authorization attributes of hierarchical ABAC system from natural language artifacts,and(2)generating a set of realistic synthetic natural language access control policies(NLACPs)to evaluate the proposed framework.Our experimental results are promising as we achieved-in average-an F1-score of 0.96 when extracting attributes values of subjects,and 0.91 when extracting the values of objects’attributes from natural language access control policies. 展开更多
关键词 Attribute-based access control(ABAC)policy authoring natural language processing relation extraction clustering deep learning
原文传递
Automated extraction of attributes from natural language attribute-based access control(ABAC)Policies
6
作者 Manar Alohaly Hassan Takabi Eduardo Blanco 《Cybersecurity》 2018年第1期313-337,共25页
The National Institute of Standards and Technology(NIST)has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access... The National Institute of Standards and Technology(NIST)has identified natural language policies as the preferred expression of policy and implicitly called for an automated translation of ABAC natural language access control policy(NLACP)to a machine-readable form.To study the automation process,we consider the hierarchical ABAC model as our reference model since it better reflects the requirements of real-world organizations.Therefore,this paper focuses on the questions of:how can we automatically infer the hierarchical structure of an ABAC model given NLACPs;and,how can we extract and define the set of authorization attributes based on the resulting structure.To address these questions,we propose an approach built upon recent advancements in natural language processing and machine learning techniques.For such a solution,the lack of appropriate data often poses a bottleneck.Therefore,we decouple the primary contributions of this work into:(1)developing a practical framework to extract authorization attributes of hierarchical ABAC system from natural language artifacts,and(2)generating a set of realistic synthetic natural language access control policies(NLACPs)to evaluate the proposed framework.Our experimental results are promising as we achieved-in average-an F1-score of 0.96 when extracting attributes values of subjects,and 0.91 when extracting the values of objects’attributes from natural language access control policies. 展开更多
关键词 Attribute-based access control(ABAC)policy authoring natural language processing relation extraction clustering deep learning
原文传递
Cloud authorization: exploring techniques and approach towards effective access control framework 被引量:3
7
作者 Rahat MASOOD Muhammad Awais SHIBLI Yumna GHAZI Ayesha KANWAL Arshad ALI 《Frontiers of Computer Science》 SCIE EI CSCD 2015年第2期297-321,共25页
Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main probl... Despite the various attractive features that Cloud has to offer, the rate of Cloud migration is rather slow, pri- marily due to the serious security and privacy issues that exist in the paradigm. One of the main problems in this regard is that of authorization in the Cloud environment, which is the focus of our research. In this paper, we present a systematic analysis of the existing authorization solutions in Cloud and evaluate their effectiveness against well-established industrial standards that conform to the unique access control require- ments in the domain. Our analysis can benefit organizations by helping them decide the best authorization technique for deployment in Cloud; a case study along with simulation re- sults is also presented to illustrate the procedure of using our qualitative analysis for the selection of an appropriate tech- nique, as per Cloud consumer requirements. From the results of this evaluation, we derive the general shortcomings of the extant access control techniques that are keeping them from providing successful authorization and, therefore, widely adopted by the Cloud community. To that end, we enumer- ate the features an ideal access control mechanisms for the Cloud should have, and combine them to suggest the ultimate solution to this major security challenge - access control as a service (ACaaS) for the software as a service (SaaS) layer. We conclude that a meticulous research is needed to incorpo- rate the identified authorization features into a generic ACaaS framework that should be adequate for providing high level of extensibility and security by integrating multiple accesscontrol models. 展开更多
关键词 AUTHORIZATION access control software as a ser-vice extensible access control markup language identity &access management cloud security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部