期刊文献+
共找到591篇文章
< 1 2 30 >
每页显示 20 50 100
A Novel Multi-Level Trust Algorithm for Mobile Ad Hoc Networks
1
作者 YU Genjian ZHENG Baoyu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1789-1792,共4页
Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the m... Firstly, a multilevel trust algorithm for MANET (mobile ad hoe networks) is presented in this paper and the trust level is defined as a three-tuple type in this multilevel trust algorithm. The paper introduces the multilevel trust into MANET, thereby controlling restricted classified information flows among nodes that have different trust levels. Secondly, the infrastructure of MANET that suit to our multi-level trust is presented, Some conclusions are given at lastly. 展开更多
关键词 MANET(mobile ad hoe networks) MULTILEVEL trust algorithm
在线阅读 下载PDF
A Superlinerly Convergent ODE-type Trust Region Algorithm for LC^1 Optimization Problems 被引量:5
2
作者 OUYi-gui HOUDing-pi 《Chinese Quarterly Journal of Mathematics》 CSCD 2003年第2期140-145,共6页
In this paper, a new trust region algorithm for unconstrained LC1 optimization problems is given. Compare with those existing trust regiion methods, this algorithm has a different feature: it obtains a stepsize at eac... In this paper, a new trust region algorithm for unconstrained LC1 optimization problems is given. Compare with those existing trust regiion methods, this algorithm has a different feature: it obtains a stepsize at each iteration not by soloving a quadratic subproblem with a trust region bound, but by solving a system of linear equations. Thus it reduces computational complexity and improves computation efficiency. It is proven that this algorithm is globally convergent and locally superlinear under some conditions. 展开更多
关键词 LC1 optimization ODE methods trust region algorithm superlinear convergence
在线阅读 下载PDF
An Improved Line Search and Trust Region Algorithm 被引量:1
3
作者 Qinghua Zhou Yarui Zhang Xiaoli Zhang 《Journal of Software Engineering and Applications》 2013年第5期49-52,共4页
In this paper, we present a new line search and trust region algorithm for unconstrained optimization problems. The trust region center locates at somewhere in the negative gradient direction with the current best ite... In this paper, we present a new line search and trust region algorithm for unconstrained optimization problems. The trust region center locates at somewhere in the negative gradient direction with the current best iterative point being on the boundary. By doing these, the trust region subproblems are constructed at a new way different with the traditional ones. Then, we test the efficiency of the new line search and trust region algorithm on some standard benchmarking. The computational results reveal that, for most test problems, the number of function and gradient calculations are reduced significantly. 展开更多
关键词 trust REGION algorithmS trust REGION Subproblem LINE SEARCH UNCONSTRAINED Optimization
在线阅读 下载PDF
Time-Based Dynamic Trust Model Using Ant Colony Algorithm 被引量:1
4
作者 TANG Zhuo LU Zhengding LI Kai 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1462-1466,共5页
The trust in distributed environment is uncertain, which is variation for various factors. This paper introduces TDTM, a model for time-based dynamic trust. Every entity in the distribute environment is endowed with a... The trust in distributed environment is uncertain, which is variation for various factors. This paper introduces TDTM, a model for time-based dynamic trust. Every entity in the distribute environment is endowed with a trust-vector, which figures the trust intensity between this entity and the others. The trust intensity is dynamic due to the time and the inter-operation between two entities, a method is proposed to quantify this change based on the mind of ant colony algorithm and then an algorithm for the transfer of trust relation is also proposed. Furthermore, this paper analyses the influence to the trust intensity among all entities that is aroused by the change of trust intensity between the two entities, and presents an algorithm to resolve the problem. Finally, we show the process of the trusts' change that is aroused by the time's lapse and the inter-operation through an instance. 展开更多
关键词 dynamic trust ant colony algorithm Inter-operation time-based
在线阅读 下载PDF
GLOBAL CONVERGENCE OF NONMONOTONIC TRUST REGION ALGORITHM FOR NONLINEAR OPTIMIZATION 被引量:1
5
作者 Tong Xiaojiao 1,2 \ Zhou Shuzi 1 1 Dept. of Appl.Math.,Hunan Univ.,Changsha 41 0 0 82 .2 Dept.of Math.,Changsha Univ.of Electric Power,Changsha41 0 0 77 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2000年第2期201-210,共10页
A trust region algorithm for equality constrained optimization is given in this paper.The algorithm does not enforce strict monotonicity of the merit function for every iteration.Global convergence of the algorithm i... A trust region algorithm for equality constrained optimization is given in this paper.The algorithm does not enforce strict monotonicity of the merit function for every iteration.Global convergence of the algorithm is proved under the same conditions of usual trust region method. 展开更多
关键词 Nonmonotone algorithm equality constrains trust region method global convergence.
在线阅读 下载PDF
Collusion detector based on G-N algorithm for trust model
6
作者 Lin Zhang Na Yin +1 位作者 Jingwen Liu Ruchuan Wang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期926-935,共10页
In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a co... In the open network environment, malicious attacks to the trust model have become increasingly serious. Compared with single node attacks, collusion attacks do more harm to the trust model. To solve this problem, a collusion detector based on the GN algorithm for the trust evaluation model is proposed in the open Internet environment. By analyzing the behavioral characteristics of collusion groups, the concept of flatting is defined and the G-N community mining algorithm is used to divide suspicious communities. On this basis, a collusion community detector method is proposed based on the breaking strength of suspicious communities. Simulation results show that the model has high recognition accuracy in identifying collusion nodes, so as to effectively defend against malicious attacks of collusion nodes. 展开更多
关键词 trust model collusion detector G-N algorithm
在线阅读 下载PDF
Design and Implementation of Trusted-Router Based on Trust Management System
7
作者 孙斌 毛元奎 《China Communications》 SCIE CSCD 2011年第5期63-69,共7页
This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its... This paper presents a scheme to perform QoS management and assure network security by using the trusted-router based on the Trust Management System.In this trusted-router,every IP packet is forwarded and queued by its trust value,which is the quantification of the network's expectation for this packet's and its owner's behavior in the network.We outline the algorithms to calculate the trust value of the trusted-router and the IP packet.We also introduce the trust-based QoS management algorithm and the deployment of the trusted-routers which carry out this algorithm.The simulation results show that the least trusted IP packets will be dropped to save resources for those highly trusted IP packets.This will ecourage all the elements in the network to keep a good trust record. 展开更多
关键词 network security trust management trust algorithm trusted router QOS
在线阅读 下载PDF
生成式人工智能的信任危机与重构
8
作者 朱婉菁 《天津行政学院学报》 北大核心 2026年第1期41-53,共13页
以ChatGPT为代表的生成式人工智能具有强大的机器理性与知识生产能力,在提升人类认知、增进社会福祉的同时,也引发了“因智而信”还是“因智生疑”的信任迷思。走出信任迷思的第一步需要从数据、算法和算力三要素出发,解构由数据狭隘、... 以ChatGPT为代表的生成式人工智能具有强大的机器理性与知识生产能力,在提升人类认知、增进社会福祉的同时,也引发了“因智而信”还是“因智生疑”的信任迷思。走出信任迷思的第一步需要从数据、算法和算力三要素出发,解构由数据狭隘、算法偏见以及算力鸿沟所导致的生成式人工智能信任危机。在此基础上,需审思化解信任危机的可能性,并从中抽象出人机关系新范式的伦理基础与理论靶向。最终,应基于解构生成式人工智能信任危机的理论实践,走向重构信任范式的实践理论,跳出将机器视为纯粹工具的“工具论”陷阱,构建从“人机共生”演进至“共生同构”的信任新范式,以推动生成式人工智能始终朝着向上向善的方向发展。 展开更多
关键词 生成式人工智能 信任危机 算法 人机关系 共生同构
在线阅读 下载PDF
A FILTER-TRUST-REGION METHOD FOR LC^1 UNCONSTRAINED OPTIMIZATION AND ITS GLOBAL CONVERGENCE 被引量:1
9
作者 ZhenghaoYang Wenyu Sun Chuangyin Dang 《Analysis in Theory and Applications》 2008年第1期55-66,共12页
In this paper we present a filter-trust-region algorithm for solving LC1 unconstrained optimization problems which uses the second Dini upper directional derivative. We establish the global convergence of the algorith... In this paper we present a filter-trust-region algorithm for solving LC1 unconstrained optimization problems which uses the second Dini upper directional derivative. We establish the global convergence of the algorithm under reasonable assumptions. 展开更多
关键词 nonsmooth optimization filter method trust region algorithm global conver- gence LC1 optimization
在线阅读 下载PDF
A trust region algorithm for bilevel programing problems
10
作者 LIU Guoshan HAN Jiye WANG Shouyang 《Chinese Science Bulletin》 SCIE EI CAS 1998年第10期820-824,共5页
A trust region algorithm is proposed for solving bilevel programming problems where the lower level programming problem is a strongly convex programming problem with linear constraints.This algorithm is based on a tru... A trust region algorithm is proposed for solving bilevel programming problems where the lower level programming problem is a strongly convex programming problem with linear constraints.This algorithm is based on a trust region algorithm for nonsmooth unconstrained optimization problems,and its global convergence is also proved. 展开更多
关键词 bilevel programming problem trust region algorithm global convergence
在线阅读 下载PDF
人工智能成为新闻基础设施:技术动因、权力转移与信任重塑 被引量:16
11
作者 陈昌凤 王金鹏 《新闻界》 北大核心 2025年第4期4-13,52,共11页
本文从基础设施的物质性与社会性维度出发,分析人工智能基础设施化的技术动因,探讨其深度嵌入如何影响新闻业的权力结构与公众的新闻信任。在效率与效益的驱动下,人工智能正从传播环节走向新闻生产,从技术工具演化为新闻业的基础设施,... 本文从基础设施的物质性与社会性维度出发,分析人工智能基础设施化的技术动因,探讨其深度嵌入如何影响新闻业的权力结构与公众的新闻信任。在效率与效益的驱动下,人工智能正从传播环节走向新闻生产,从技术工具演化为新闻业的基础设施,推动着新闻业的系统性变革。人工智能的基础设施化加剧了新闻机构对平台型科技企业的结构性依赖,导致传播权力向后者转移;新闻生产内部劳动分工日益精细化,重塑了记者编辑与技术人员的权力关系;人机协作模式下,新闻生产的主体边界日益模糊,新闻定义权面临挑战。人工智能的基础设施化加剧了新闻生态的信息不对称,放大了公众的信任危机。重塑新闻信任,需要从提升技术透明度、构建制度规范和重塑文化价值维度协同发力。未来的新闻生态将从技术主导走向人机协同的价值共建,从平台依赖转向多元主体权力制衡,从流量竞逐回归公共服务的核心职能。 展开更多
关键词 人工智能 新闻基础设施 权力转移 信任 算法
原文传递
大数据中一种基于Trust-Walker的信任推荐方法
12
作者 李帅 李晓会 杜颖 《电子测试》 2020年第11期72-75,共4页
随着互联网的快速发展,大量数据也随之产生,并且数据量级甚至达到了PB,ZB 级。那么如何在大数据环境中改进传统推荐算法已成为当务之急。为了一定程度上缓解传统推荐算法所遇到的稀疏的数据等问题。首先构建一种传递信任的模型,在此基... 随着互联网的快速发展,大量数据也随之产生,并且数据量级甚至达到了PB,ZB 级。那么如何在大数据环境中改进传统推荐算法已成为当务之急。为了一定程度上缓解传统推荐算法所遇到的稀疏的数据等问题。首先构建一种传递信任的模型,在此基础之上,提出一种基于信任的协同过滤推荐模型。最后,在大数据的背景下,针对海量数据时的可扩展性和计算效率问题,模型在Map Reduce处理平台上进行并行化处理,并进行了一系列的对比实验。实验结果证明,并行化处理后,模型在解决冷启动问题,减轻数据稀疏性和提高推荐精度的同时,可扩展性和计算效率也表现出良好的效果。 展开更多
关键词 推荐算法 大数据 信任模型 可扩展性 并行化处理
在线阅读 下载PDF
A Simple Game for the Study of Trust in Distributed Systems
13
作者 Biography: Zoe Zoe Diamadi, Michael J. Fischer Department of Computer Science, Yale University, New Haven CT 06520 8285,USA 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期72-82,共11页
Trust is an important aspect of the design and analysis of secure distributed systems. It is often used informally to designate those portions of a system that must function correctly in order to achieve the desired o... Trust is an important aspect of the design and analysis of secure distributed systems. It is often used informally to designate those portions of a system that must function correctly in order to achieve the desired outcome. But it is a notoriously diffcult notion to formalize. What are the properties of trust? How is it learned, propagated, and utilized successfully? How can it be modeled? How can a trust model be used to derive protocols that are effcient and reliable when employed in today's expansive networks? Past work has been concerned with only a few of these issues, without concentrating on the need for a comprehensive approach to trust modeling. In this paper, we take a first step in that direction by studying an artificial community of agents that uses a notion of trust to succeed in a game against nature. The model is simple enough to analyze and simulate, but also rich enough to exhibit phenomena of real life interactive communities. The model requires agents to make decisions. To do well, the agents are informed by knowledge gained from their own past experience as well as from the experience of other agents. Communication among agents allows knowledge to propagate faster through the network, which in turn can allow for a more successful community. We analyze the model from both a theoretical and an experimental point of view. 展开更多
关键词 agent algorithm artificial society trust
在线阅读 下载PDF
AI辅助决策信任失准问题研究 被引量:2
14
作者 王高峰 刘佳霖 《自然辩证法研究》 北大核心 2025年第2期67-73,103,共8页
“可信任人工智能”的相关研究主要关注人与算法间的信任问题,且多数归因于透明性与可解释性等算法性质的欠缺。在辅助决策场景下,用户往往无法正确辨别人工智能辅助决策工具给出的意见或建议而对其加以摒弃或采纳,导致算法误用现象,进... “可信任人工智能”的相关研究主要关注人与算法间的信任问题,且多数归因于透明性与可解释性等算法性质的欠缺。在辅助决策场景下,用户往往无法正确辨别人工智能辅助决策工具给出的意见或建议而对其加以摒弃或采纳,导致算法误用现象,进而产生不良后果。其核心原因在于用户对使用算法的信任不足或过度信任状况需要通过校准以达到适当。外在客观因素影响可以从设计层面寻求约束或剔除,但用户内在选用态度则与其算法素养直接相关。因此,需要在人工智能产品设计上追求越来越充足的“算法信心”,同时要求用户提升自身的“算法自信”,确保人工智能辅助决策达到预期效果,建立人与算法间适当信任关系。 展开更多
关键词 AI辅助决策 算法信任 信任校准
原文传递
基于区块链的协作式车联网信任管理方案 被引量:1
15
作者 张海波 谭茂煌 +2 位作者 徐勇军 李方伟 王明月 《电子与信息学报》 北大核心 2025年第3期720-728,共9页
针对车联网(IoV)中传统信任管理方案对恶意车辆的识别假阳率高、无法满足多样化服务且传统共识算法不适用于当前车联网环境的问题,该文提出了基于区块链的协作式车联网信任管理方案。构建了基于狄利克雷分布的信任管理模型,将车辆信任... 针对车联网(IoV)中传统信任管理方案对恶意车辆的识别假阳率高、无法满足多样化服务且传统共识算法不适用于当前车联网环境的问题,该文提出了基于区块链的协作式车联网信任管理方案。构建了基于狄利克雷分布的信任管理模型,将车辆信任和协作服务划分为多个等级,针对不同服务调整信任等级阈值。设计了具有反馈机制的信任等级评价算法,考虑协作车辆当前状态、邻居推荐、历史信任信息、服务质量4方面因素,从协作前、后两阶段对协作车辆信任等级进行评价。改进了传统的工作量证明(PoW)共识算法,动态调整矿工节点出块难度。仿真结果表明,相比同类方案,所提方案在保证能够高效识别恶意节点的前提下,还能够进一步降低识别假阳率,提高协作成功率和共识效率。 展开更多
关键词 车联网 信任管理 区块链 车辆协作 共识算法
在线阅读 下载PDF
变温条件下纳米晶材料的Steinmetz损耗模型
16
作者 王宁 张鹏宁 +3 位作者 苗登吉 凌泽昆 程红 张荐 《高电压技术》 北大核心 2025年第11期5673-5682,I0031-I0034,共14页
为提高变温条件下纳米晶材质电磁设备的建模和设计精度,该文提出一种考虑温度影响的纳米晶材料Steinmetz损耗预测模型。首先,搭建了由恒温箱和BROCKHAUS软磁测量仪组成的变温磁特性测试系统,对纳米晶材料在1~20 kHz频率、25~125℃温度... 为提高变温条件下纳米晶材质电磁设备的建模和设计精度,该文提出一种考虑温度影响的纳米晶材料Steinmetz损耗预测模型。首先,搭建了由恒温箱和BROCKHAUS软磁测量仪组成的变温磁特性测试系统,对纳米晶材料在1~20 kHz频率、25~125℃温度下的磁特性进行测量。测量结果表明:纳米晶材料饱和磁通密度与温度呈线性负相关;不同频率段饱和磁通密度与温度之间的线性拟合方程具有相同的斜率−0.001,说明频率与温度不存在耦合关系;饱和磁通密度点对应的损耗与温度存在非线性关系,且损耗随温度上升而降低。其次,将经典Steinmetz公式中的磁通密度项由常量修正为随温度线性变化的变量,并推导出一种二次温度修正项来表征损耗与温度之间的非线性关系,建立了应用于纳米晶材料饱和阶段的Steinmetz损耗预测模型。最后,采用依赖域反射优化算法对改进Steinmetz损耗预测模型和经典Steinmetz公式的参数进行拟合,本文所提损耗预测模型平均预测误差为0.62%,最大预测误差为2.66%,经典Steinmetz损耗模型平均预测误差为5.26%,最大误差为14.85%,验证了所提模型在变温条件下高精度的预测能力,为电磁设备的饱和控制和设计优化提供了理论依据和数据支撑。 展开更多
关键词 纳米晶材料 变温 经典Steinmetz公式 饱和磁通密度 温度修正项 依赖域反射优化算法
原文传递
面向隐私信息泄露的光纤网络加密安全防护研究
17
作者 袁智勇 钟章生 熊飞龙 《激光杂志》 北大核心 2025年第5期196-202,共7页
受各种类型的攻击,包括窃听、篡改、拒绝服务等影响,使得光纤网络抗攻击能力较弱,而海量数据量和复杂性不断上升,无法确保隐私数据的密钥,从而造成信息泄露、篡改等严重后果。为了保障信息的机密性,提出面向隐私信息泄露的光纤网络加密... 受各种类型的攻击,包括窃听、篡改、拒绝服务等影响,使得光纤网络抗攻击能力较弱,而海量数据量和复杂性不断上升,无法确保隐私数据的密钥,从而造成信息泄露、篡改等严重后果。为了保障信息的机密性,提出面向隐私信息泄露的光纤网络加密安全防护研究。通过收发节点采集大量信道状态信息,对信道状态展开评估,并将量化参数设定为比特序列,提取光纤网络海量隐私信息中的密钥。根据密钥提取结果,组建隐私信息分段和分组密钥组,利用密钥匹配算法为各个分段以及分组选取可信密钥展开加密处理,并将加密处理后的隐私信息保存至云端,以此实现光纤网络海量隐私信息加密存储。实验结果表明,所提方法的加密时间保持在2.5 ms内,存储开销低且吞吐量高,能够抵御各种攻击,可以有效实现隐私信息的加密存储。 展开更多
关键词 隐私信息 光纤网络 信息加密 多可信密钥 密钥匹配算法 加密存储
原文传递
区块链赋能的可信雾计算资源分配方法
18
作者 赵小虎 刘桁琳 王越 《计算机工程与设计》 北大核心 2025年第5期1318-1326,共9页
为解决雾环境中恶意节点的存在所造成系统资源分配整体收益低、节点间不可信问题,提出一种基于区块链技术的可信雾计算资源分配方法,保证可信节点的利益。将资源分配过程建模为区块链上的交易,对参与交易节点构建信任模型,采用节点信誉... 为解决雾环境中恶意节点的存在所造成系统资源分配整体收益低、节点间不可信问题,提出一种基于区块链技术的可信雾计算资源分配方法,保证可信节点的利益。将资源分配过程建模为区块链上的交易,对参与交易节点构建信任模型,采用节点信誉评估算法实现对不可信节点的筛选;考虑节点信誉度、需求和资源分配条件,以时延和能耗优化加权和作为系统整体增益,制定最大化系统增益优化问题;利用可信模拟退火算法对优化问题求解,得到最优分配策略。仿真结果验证了该方法的可靠性和有效性。 展开更多
关键词 雾计算 物联网 区块链 资源分配 任务卸载 信任计算 模拟退火优化算法
在线阅读 下载PDF
基于零信任的网络数据安全保护框架与实现 被引量:2
19
作者 王作广 李超 赵利 《计算机应用》 北大核心 2025年第4期1232-1240,共9页
为解决网络架构复杂化、动态化和碎片化演变导致的边界防护措施失效,应对非自主可控的系统、软硬件和密码算法不断呈现的脆弱性对网络数据安全造成的挑战,首先,基于零信任理念设计一个零信任网络架构实现模型;其次,提出一种零信任网络... 为解决网络架构复杂化、动态化和碎片化演变导致的边界防护措施失效,应对非自主可控的系统、软硬件和密码算法不断呈现的脆弱性对网络数据安全造成的挑战,首先,基于零信任理念设计一个零信任网络架构实现模型;其次,提出一种零信任网络安全保护框架,在身份管理与认证、授权与访问、数据处理与传输等环节融合利用零信任安全理念、国密算法体系和可信计算技术,设计国密证书申请与签发、业务数据安全处理与传输等框架流程,并设计与实现身份与访问管理模块、终端可信网络访问代理设备等功能组件;最后,构建基于安全保护框架的网络平台,从而为网络数据安全保护和零信任安全实践提供新框架、技术和工具。安全分析与性能测试的结果显示,所提平台对SM2的签名与验签性能分别平均达到了每秒1118.72次和每秒441.43次,对SM4的加密和解密性能分别平均达到了10.05 MB/s和9.96 MB/s,平台数据安全访问/响应性能为7.23 MB/s,表明所提框架可以提供稳定的数据安全支持。 展开更多
关键词 零信任 数据保护 安全框架 国密算法 可信计算
在线阅读 下载PDF
社会信任与基础设施如何影响城市金融资源集聚?——基于失信被执行人名单大数据的实证研究
20
作者 周耿 陈黎靖 王宇伟 《同济大学学报(社会科学版)》 北大核心 2025年第3期72-88,共17页
社会信任作为一项重要的非正式制度,深刻影响着城市的要素集聚效能。基于2016—2023年失信被执行人名单的大数据,运用PageRank算法对282个地级市的社会信任水平进行测度。同时,结合城市面板数据,对社会信任与城市基础设施对金融资源集... 社会信任作为一项重要的非正式制度,深刻影响着城市的要素集聚效能。基于2016—2023年失信被执行人名单的大数据,运用PageRank算法对282个地级市的社会信任水平进行测度。同时,结合城市面板数据,对社会信任与城市基础设施对金融资源集聚的影响展开研究。研究结果表明:第一,社会信任显著促进了金融资源集聚。第二,交通、数字及治理基础设施均对社会信任在促进金融资源集聚中的作用构成正向调节效应。第三,在大规模城市和信息共享的环境下,交通基础设施能发挥更大的正面作用。上述分析深入揭示了城市金融集聚的内在机制,为中国城市治理优化和政策体系完善提供了全新的理论视角。 展开更多
关键词 社会信任 城市基础设施 金融集聚 非正式制度 PAGERANK算法
在线阅读 下载PDF
上一页 1 2 30 下一页 到第
使用帮助 返回顶部