期刊文献+
共找到3,278篇文章
< 1 2 164 >
每页显示 20 50 100
基于Data Access规范的OPC Server的研究与实现 被引量:2
1
作者 周强 杨明极 +1 位作者 沈辉 郭剑虹 《哈尔滨理工大学学报》 CAS 2007年第2期107-109,113,共4页
为了实现OPC数据存取服务器,依据OPC数据存取2.05a技术规范,采用了ATL技术,建立了OPC数据存取服务器的结构模型,实现了OPC数据存取服务器的构建及OPC数据存取服务器的主要功能.
关键词 OPC 数据存取 ATL
在线阅读 下载PDF
Construction of a reusable data access layer based on .NET
2
作者 王远斌 《Journal of Chongqing University》 CAS 2005年第2期76-79,共4页
A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution util... A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution utilizes the reflection technology of .NET and design pattern. A typical application of the solution demonstrates that the new solution of data access layer performs better than the current N-tier architecture. More importantly, the application suggests that the new solution of data access layer can be reused effectively. 展开更多
关键词 N-tier architecture data access layer reflection technology REUSE
在线阅读 下载PDF
Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN 被引量:1
3
作者 Xiaoyan Hu Xuhui Liu +2 位作者 Lixia Zhao Jian Gong Guang Cheng 《China Communications》 SCIE CSCD 2019年第7期120-130,共11页
We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an... We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an upstream node due to its multipath forwarding. Furthermore, we propose NDRUDAF, a NACK based mechanism that enhances the Interest forwarding and enables Detection and fast Recovery from such Unanticipated Data Access Failure. In the NDN enhanced with NDRUDAF, the router that aggregates the Interest detects such unanticipated data access failure based on a negative acknowledgement from the upstream node that judges the Interest as a duplicate one. Then the router retransmits the Interest as soon as possible on behalf of the requester whose Interest is aggregated to fast recover from the data access failure. We qualitatively and quantitatively analyze the performance of the NDN enhanced with our proposed NDRUDAF and compare it with that of the present NDN. Our experimental results validate that NDRUDAF improves the system performance in case of such unanticipated data access failure in terms of data access delay and network resource utilization efficiency at routers. 展开更多
关键词 named data networking INTEREST aggregation multipath FORWARDING data access FAILURE negative ACKNOWLEDGEMENT
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
4
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD data STORAGE CLOUD Service PROVIDER Formula-Based CLOUD data access Control Multi-Agent System and Secure Java Agent Development Framework
在线阅读 下载PDF
Data Virtualization with SAP HANA Smart Data Access
5
作者 Abani Pattanayak 《Journal of Computer and Communications》 2017年第8期62-68,共7页
Digital transformation has been corner stone of business innovation in the last decade, and these innovations have dramatically changed the definition and boundaries of enterprise business applications. Introduction o... Digital transformation has been corner stone of business innovation in the last decade, and these innovations have dramatically changed the definition and boundaries of enterprise business applications. Introduction of new products/ services, version management of existing products/ services, management of customer/partner connections, management of multi-channel service delivery (web, social media, web etc.), merger/acquisitions of new businesses and adoption of new innovations/technologies will drive data growth in business applications. These datasets exist in different sharing nothing business applications at different locations and in various forms. So, to make sense of this information and derive insight, it is essential to break the data silos, streamline data retrieval and simplify information access across the entire organization. The information access framework must support just-in-time processing capabilities to bring data from multiple sources, be fast and powerful enough to transform and process huge amounts of data quickly, and be agile enough to accommodate new data sources per user needs. This paper discusses the SAP HANA Smart Data Access data-virtualization technology to enable unified access to heterogenous data across the organization and analysis of huge volume of data in real-time using SAP HANA in-memory platform. 展开更多
关键词 SAP HANA In-Memory Computing SMART data access (SDA) data VIRTUALIZATION & data FEDERATION Virtual data Model And Big data
暂未订购
A Constraint-Based Model for Virtual Machine Data Access Control in Cloud Platform
6
作者 Zhixin Li Lei Liu Kin Wang 《国际计算机前沿大会会议论文集》 2018年第1期33-33,共1页
在线阅读 下载PDF
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
7
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
在线阅读 下载PDF
KnowID:An Architecture for Efficient Knowledge-Driven Information and Data Access
8
作者 Pablo Rubén Fillottrani C.Maria Keet 《Data Intelligence》 2020年第4期487-512,共26页
Modern information systems require the orchestration of ontologies,conceptual data modeling techniques,and efficient data management so as to provide a means for better informed decision-making and to keep up with new... Modern information systems require the orchestration of ontologies,conceptual data modeling techniques,and efficient data management so as to provide a means for better informed decision-making and to keep up with new requirements in organizational needs.A major question in delivering such systems,is which components to design and put together to make up the required“knowledge to data”pipeline,as each component and process has trade-offs.In this paper,we introduce a new knowledge-to-data architecture,KnowID.It pulls together both recently proposed components and we add novel transformation rules between Enhanced Entity-Relationship(EER)and the Abstract Relational Model to complete the pipeline.KnowID’s main distinctive architectural features,compared to other ontology-based data access approaches,are that runtime use can avail of the closed world assumption commonly used in information systems and of full SQL augmented with path queries. 展开更多
关键词 Extended entity-relationship diagrams Abstract relational model Ontology-based data access
原文传递
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
9
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
在线阅读 下载PDF
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
10
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
在线阅读 下载PDF
应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法及其比较 被引量:1
11
作者 吴东宁 何丽云 +3 位作者 王鑫 艾艳柯 文天才 吕晓颖 《中国卫生产业》 2016年第19期18-20,共3页
目的介绍应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法并进行比较,以探讨其可行性、实用性。方法以胸痹心痛临床研究的病例报告表(CRF)为例,分别介绍应用Access,Epi Data软件建设数据库的步骤和流程,并进行比较。结果应用A... 目的介绍应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法并进行比较,以探讨其可行性、实用性。方法以胸痹心痛临床研究的病例报告表(CRF)为例,分别介绍应用Access,Epi Data软件建设数据库的步骤和流程,并进行比较。结果应用Access,Epi Data软件建设胸痹心痛临床研究数据库的共同特点为:占用空间较小,界面友好,直观性强,简单易学,操作方便,可以较好的服务于数据管理;区别主要在于费用、存储空间、自动保存、网络功能、管理权限和导出格式等方面。结论应用Access,Epi Data软件建设胸痹心痛临床研究数据库的方法简单、实用,对于我国现阶段一般的中医药临床研究比较适用,也很适合临床单位中以科室或医生个人为主体开展的研究使用,且对于数据管理的普及、规范和进步有重要意义。 展开更多
关键词 access EPI data 胸痹心痛 数据库
暂未订购
Database-oriented storage based on LMDB and linear octree for massive block model 被引量:6
12
作者 毕林 赵辉 贾明涛 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2016年第9期2462-2468,共7页
Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, incl... Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, including ACID-compliant, concurrency support, data sharing, and efficient access. Each block model is organized by linear octree, stored in LMDB(lightning memory-mapped database). Geological attribute can be queried at any point of 3D space by comparison algorithm of location code and conversion algorithm from address code of geometry space to location code of storage. The performance and robustness of querying geological attribute at 3D spatial region are enhanced greatly by the transformation from 3D to 2D and the method of 2D grid scanning to screen the inner and outer points. Experimental results showed that this method can access the massive data of block model, meeting the database characteristics. The method with LMDB is at least 3 times faster than that with etree, especially when it is used to read. In addition, the larger the amount of data is processed, the more efficient the method would be. 展开更多
关键词 block model linear octree lightning memory-mapped database mass data access digital mine etree
在线阅读 下载PDF
档案机构参与公共数据开放的实践进展与展望 被引量:1
13
作者 周文泓 熊小芳 代林序 《山西档案》 北大核心 2025年第5期70-79,共10页
聚焦我国档案机构参与公共数据开放的进程与发展方向,旨在从公共数据开放视角,挖掘其参与特点并提出优化策略。通过网络调研,明确了我国档案机构在政策法规、数据资源、利用成效等方面的参与现状,同时分析了档案机构已开展的部分有效实... 聚焦我国档案机构参与公共数据开放的进程与发展方向,旨在从公共数据开放视角,挖掘其参与特点并提出优化策略。通过网络调研,明确了我国档案机构在政策法规、数据资源、利用成效等方面的参与现状,同时分析了档案机构已开展的部分有效实践以及尚未充分融入公共数据开放体系的基本情况。在此基础上提出,在政策法规层面,应增强档案在公共数据开放中的显示度和档案机构的参与度;在数据资源层面,要求档案机构应加强对公共数据开放模式的借鉴与融合,并凸显自身独特的数据特质;在利用成效层面,应强调利用引导,发挥示范引领作用。 展开更多
关键词 公共数据开放 档案数据 档案利用 档案开放
在线阅读 下载PDF
Thermal stability and data retention of resistive random access memory with HfOx/ZnO double layers
14
作者 赖云锋 陈凡 +3 位作者 曾泽村 林培杰 程树英 俞金玲 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第8期411-416,共6页
As an industry accepted storage scheme, hafnium oxide(HfO_x) based resistive random access memory(RRAM)should further improve its thermal stability and data retention for practical applications. We therefore fabri... As an industry accepted storage scheme, hafnium oxide(HfO_x) based resistive random access memory(RRAM)should further improve its thermal stability and data retention for practical applications. We therefore fabricated RRAMs with HfO_x/ZnO double-layer as the storage medium to study their thermal stability as well as data retention. The HfO_x/ZnO double-layer is capable of reversible bipolar switching under ultralow switching current(〈 3 μA) with a Schottky emission dominant conduction for the high resistance state and a Poole–Frenkel emission governed conduction for the low resistance state. Compared with a drastically increased switching current at 120℃ for the single HfO_x layer RRAM, the HfO_x/ZnO double-layer exhibits excellent thermal stability and maintains neglectful fluctuations in switching current at high temperatures(up to 180℃), which might be attributed to the increased Schottky barrier height to suppress current at high temperatures. Additionally, the HfO_x/ZnO double-layer exhibits 10-year data retention @85℃ that is helpful for the practical applications in RRAMs. 展开更多
关键词 resistive random access memory (RRAM) thermal stability data retention double layer
原文传递
我国数据全流程合规与监管体系的构建 被引量:3
15
作者 郑佳宁 张毅 《西北工业大学学报(社会科学版)》 2025年第1期121-128,共8页
为实现数据流通中的风险防控,需要从四个方面构建数据全流程合规与监管体系:在数据流通准入方面,审查数据流通主体在数据提供和数据持有方面的资格,并建立数据流通客体负面清单。在数据分类分级方面,以生成主体为标准对公共数据、企业... 为实现数据流通中的风险防控,需要从四个方面构建数据全流程合规与监管体系:在数据流通准入方面,审查数据流通主体在数据提供和数据持有方面的资格,并建立数据流通客体负面清单。在数据分类分级方面,以生成主体为标准对公共数据、企业数据和个人数据进行确权授权,以影响对象、影响范围和影响程度为标准实现对重要数据的利用保护。在数据定价方面,基于数据价格的形成要素,确立协商定价、自动定价和第三方机构评估定价等三种定价模式并选择适用。在数据安全认证方面,分别完善移动互联网程序安全认证、数据安全管理认证和个人信息保护认证三种认证类型,兼顾数据流通的安全与效率。 展开更多
关键词 数据流通准入 数据分类分级 数据定价 数据安全认证 数据合规监管
在线阅读 下载PDF
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
16
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3GPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5G mobile communication
在线阅读 下载PDF
科学公共图书馆开放科学服务内容调研及启示 被引量:1
17
作者 匡登辉 李晓茜 《图书馆学研究》 北大核心 2025年第3期72-80,共9页
通过文本分析法和网络调研法,发掘美国科学公共图书馆(Public Library of Science,PLOS)开放科学服务的路径与运作模式,讨论PLOS开放科学服务的特点和发展模式。建议我国依据发展趋势、制定符合国情和科技发展水平的开放科学政策、实现... 通过文本分析法和网络调研法,发掘美国科学公共图书馆(Public Library of Science,PLOS)开放科学服务的路径与运作模式,讨论PLOS开放科学服务的特点和发展模式。建议我国依据发展趋势、制定符合国情和科技发展水平的开放科学政策、实现路径、机制、工作模式以及学术出版模式的创新,推动新兴技术、工具在开放科学的应用,提高出版平台对发布成果的及时评价反馈和宣传推广,为我国全面融入开放科学全过程、全方位提升服务能力提供保障。 展开更多
关键词 科学公共图书馆 开放科学 开放数据 开放方法 开放获取
原文传递
公共数据开放能否抑制机构投资者羊群行为
18
作者 张洪辉 林森城 《证券市场导报》 北大核心 2025年第3期68-79,共12页
本文以沪深A股上市公司为样本,实证检验了政府部门公共数据开放对机构投资者羊群行为的影响。研究发现,公共数据开放能够降低机构投资者的信息搜集成本,增加其信息资源,从而降低机构投资者的信息不对称程度,抑制其羊群行为。羊群行为分... 本文以沪深A股上市公司为样本,实证检验了政府部门公共数据开放对机构投资者羊群行为的影响。研究发现,公共数据开放能够降低机构投资者的信息搜集成本,增加其信息资源,从而降低机构投资者的信息不对称程度,抑制其羊群行为。羊群行为分为基于从众心理的真羊群行为和基于相同策略的假羊群行为。进一步分析发现,机构投资者的羊群行为并未将更多信息融入股价,反而增加了股价同步性,是真羊群行为;公共数据开放能够提供更多公司信息,减少机构投资者盲目跟随他人的可能性,抑制了机构投资者的真羊群行为。异质性分析表明,在地处金融发展水平较低地区、信息披露质量较低、机构投资者数量较少公司中,以及市场情绪悲观时,公共数据开放对机构投资者羊群行为的抑制作用更显著。本文丰富了公共数据开放经济后果的相关研究,也为治理机构投资者羊群行为提供了参考。 展开更多
关键词 公共数据开放 机构投资者 羊群行为 信息不对称
在线阅读 下载PDF
公共数据开放能够吸引服务业外商投资吗?——来自中国上市公司的经验证据
19
作者 潘安 刘芳玲 《财经研究》 北大核心 2025年第7期109-124,共16页
提升服务业外商投资水平对我国推进服务业扩大开放具有重要意义,而公共数据开放在其中发挥了积极作用。文章基于2010—2023年我国A股上市公司数据,以城市层面公共数据平台开放作为准自然实验,考察其对服务业企业吸引外商投资的影响及其... 提升服务业外商投资水平对我国推进服务业扩大开放具有重要意义,而公共数据开放在其中发挥了积极作用。文章基于2010—2023年我国A股上市公司数据,以城市层面公共数据平台开放作为准自然实验,考察其对服务业企业吸引外商投资的影响及其作用机制。研究发现,公共数据平台开放显著提高了服务业企业的外资持股比例,该结论在多种稳健性检验后依然成立。机制检验发现,提升城市数字经济发展水平、服务业创业活力以及企业数字化决策能力是公共数据开放吸引服务业外商投资的重要影响机制,同时高管团队国际化水平对公共数据开放的积极影响起到了正向调节作用。异质性分析表明,公共数据平台开放对非信息类企业、生产性服务业和现代服务业的影响更强;公共服务类和经济建设类主题的公共数据开放更有助于提高服务业企业的外资持股比例。文章证实了公共数据开放通过吸引服务业外商投资对服务业结构升级产生了积极作用,为推进服务业扩大开放提供了政策借鉴。 展开更多
关键词 公共数据开放 服务业 外商投资 上市公司
原文传递
基于贝叶斯网络的深海浮式设施数据中心访问安全控制方法
20
作者 刘昊 邓欣 +1 位作者 于超 王鑫章 《天津科技》 2025年第4期4-7,共4页
传统石油企业一体化管理平台数据访问安全控制的范围有限,在“深海一号”等项目的开发及应用过程中,现场数据中心中用户和数据之间复杂交互,致使拓扑率变低,不利于平台的安全运行。通过引入贝叶斯网络模型,提出一种全新的控制方法,以评... 传统石油企业一体化管理平台数据访问安全控制的范围有限,在“深海一号”等项目的开发及应用过程中,现场数据中心中用户和数据之间复杂交互,致使拓扑率变低,不利于平台的安全运行。通过引入贝叶斯网络模型,提出一种全新的控制方法,以评估访问的用户行为信任度、对石油企业一体化管理平台数据进行访问分级、设置石油企业一体化管理平台数据访问的安全控制权限,从而实现石油企业一体化管理平台数据访问的安全控制。对比实验证明,该方法的拓扑率较高,可有效保证数据安全,优势显著。 展开更多
关键词 贝叶斯网络 石油企业 一体化管理 平台数据访问 安全控制
在线阅读 下载PDF
上一页 1 2 164 下一页 到第
使用帮助 返回顶部