期刊文献+
共找到1,148篇文章
< 1 2 58 >
每页显示 20 50 100
Research on Classification and Desensitization Strategies of Sensitive Educational Data
1
作者 Chen Chen Caixia Liu 《Journal of Contemporary Educational Research》 2025年第4期141-146,共6页
In the era of digital intelligence,data is a key element in promoting social and economic development.Educational data,as a vital component of data,not only supports teaching and learning but also contains much sensit... In the era of digital intelligence,data is a key element in promoting social and economic development.Educational data,as a vital component of data,not only supports teaching and learning but also contains much sensitive information.How to effectively categorize and protect sensitive data has become an urgent issue in educational data security.This paper systematically researches and constructs a multi-dimensional classification framework for sensitive educational data,and discusses its security protection strategy from the aspects of identification and desensitization,aiming to provide new ideas for the security management of sensitive educational data and to help the construction of an educational data security ecosystem in the era of digital intelligence. 展开更多
关键词 data security sensitive data data classification data desensitization
在线阅读 下载PDF
A Deep Auto-encoder Based Security Mechanism for Protecting Sensitive Data Using AI Based Risk Assessment
2
作者 Lavanya M Mangayarkarasi S 《Journal of Harbin Institute of Technology(New Series)》 2025年第4期90-98,共9页
Big data has ushered in an era of unprecedented access to vast amounts of new,unstructured data,particularly in the realm of sensitive information.It presents unique opportunities for enhancing risk alerting systems,b... Big data has ushered in an era of unprecedented access to vast amounts of new,unstructured data,particularly in the realm of sensitive information.It presents unique opportunities for enhancing risk alerting systems,but also poses challenges in terms of extraction and analysis due to its diverse file formats.This paper proposes the utilization of a DAE-based(Deep Auto-encoders)model for projecting risk associated with financial data.The research delves into the development of an indicator assessing the degree to which organizations successfully avoid displaying bias in handling financial information.Simulation results demonstrate the superior performance of the DAE algorithm,showcasing fewer false positives,improved overall detection rates,and a noteworthy 9%reduction in failure jitter.The optimized DAE algorithm achieves an accuracy of 99%,surpassing existing methods,thereby presenting a robust solution for sensitive data risk projection. 展开更多
关键词 data mining sensitive data deep auto-encoders
在线阅读 下载PDF
Sensitive Resource and Traffic Density Risk Analysis of Marine Spill Accidents Using Automated Identification System Big Data 被引量:1
3
作者 Eunlak Kim Hyungmin Cho +3 位作者 Namgyun Kim Eunjin Kim Jewan Ryu Heekyung Park 《Journal of Marine Science and Application》 CSCD 2020年第2期173-181,共9页
This study developed a new methodology for analyzing the risk level of marine spill accidents from two perspectives,namely,marine traffic density and sensitive resources.Through a case study conducted in Busan,South K... This study developed a new methodology for analyzing the risk level of marine spill accidents from two perspectives,namely,marine traffic density and sensitive resources.Through a case study conducted in Busan,South Korea,detailed procedures of the methodology were proposed and its scalability was confirmed.To analyze the risk from a more detailed and microscopic viewpoint,vessel routes as hazard sources were delineated on the basis of automated identification system(AIS)big data.The outliers and errors of AIS big data were removed using the density-based spatial clustering of applications with noise algorithm,and a marine traffic density map was evaluated by combining all of the gridded routes.Vulnerability of marine environment was identified on the basis of the sensitive resource map constructed by the Korea Coast Guard in a similar manner to the National Oceanic and Atmospheric Administration environmental sensitivity index approach.In this study,aquaculture sites,water intake facilities of power plants,and beach/resort areas were selected as representative indicators for each category.The vulnerability values of neighboring cells decreased according to the Euclidean distance from the resource cells.Two resulting maps were aggregated to construct a final sensitive resource and traffic density(SRTD)risk analysis map of the Busan–Ulsan sea areas.We confirmed the effectiveness of SRTD risk analysis by comparing it with the actual marine spill accident records.Results show that all of the marine spill accidents in 2018 occurred within 2 km of high-risk cells(level 6 and above).Thus,if accident management and monitoring capabilities are concentrated on high-risk cells,which account for only 6.45%of the total study area,then it is expected that it will be possible to cope with most marine spill accidents effectively. 展开更多
关键词 SRTD risk analysis AIS big data sensitive resource Marine spill accidents Marine traffic Traffic density Marine oil spill
在线阅读 下载PDF
Secure Sharing Scheme of Sensitive Data in the Precision Medicine System
4
作者 Deukhun Kim Heejin Kim Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2020年第9期1527-1553,共27页
Numerous industries,especially the medical industry,are likely to exhibit significant developments in the future.Ever since the announcement of the precision medicine initiative by the United States in 2015,interest i... Numerous industries,especially the medical industry,are likely to exhibit significant developments in the future.Ever since the announcement of the precision medicine initiative by the United States in 2015,interest in the field has considerably increased.The techniques of precision medicine are employed to provide optimal treatment and medical services to patients,in addition to the prevention and management of diseases via the collection and analysis of big data related to their individual genetic characteristics,occupation,living environment,and dietary habits.As this involves the accumulation and utilization of sensitive information,such as patient history,DNA,and personal details,its implementation is difficult if the data are inaccurate,exposed,or forged,and there is also a concern for privacy,as massive amount of data are collected;hence,ensuring the security of information is essential.Therefore,it is necessary to develop methods of securely sharing sensitive data for the establishment of a precision medicine system.An authentication and data sharing scheme is presented in this study on the basis of an analysis of sensitive data.The proposed scheme securely shares sensitive data of each entity in the precision medicine system according to its architecture and data flow. 展开更多
关键词 Precision medicine sensitive data keyless signature infrastructure data sharing
在线阅读 下载PDF
(p,a)-sensitivek-匿名隐私保护模型 被引量:8
5
作者 王茜 曾子平 《计算机应用研究》 CSCD 北大核心 2009年第6期2177-2179,2183,共4页
提出了一种(p,a)-sensitivek-匿名模型,将敏感属性根据敏感度进行分组,然后给各分组设置不同的约束,并给出了(p,a)-sensitiveK-匿名算法。实验结果表明该方法可以明显地减少隐私泄露,增强了数据发布的安全性。
关键词 数据发布 敏感度 K-匿名 隐私泄露 分组
在线阅读 下载PDF
Snow and sea ice thermodynamics in the Arctic:Model validation and sensitivity study against SHEBA data 被引量:6
6
作者 Cheng Bin Timo Vihma +2 位作者 Zhang Zhanhai Li Zhijun Wu Huiding 《Chinese Journal of Polar Science》 2008年第2期108-122,共15页
Evolution of the Arctic sea ice and its snow cover during the SHEBA year were simulated by applying a high-resolution thermodynamic snow/ice model (HIGHTSI). Attention was paid to the impact of albedo on snow and se... Evolution of the Arctic sea ice and its snow cover during the SHEBA year were simulated by applying a high-resolution thermodynamic snow/ice model (HIGHTSI). Attention was paid to the impact of albedo on snow and sea ice mass balance, effect of snow on total ice mass balance, and the model vertical resolution. The SHEBA annual simulation was made applying the best possible external forcing data set created by the Sea Ice Model Intercomparison Project. The HIGHTSI control run reasonably reproduced the observed snow and ice thickness. A number of albedo schemes were incorporated into HIGHTSI to study the feedback processes between the albedo and snow and ice thickness. The snow thickness turned out to be an essential variable in the albedo parameterization. Albedo schemes dependent on the surface temperature were liable to excessive positive feedback effects generated by errors in the modelled surface temperature. The superimposed ice formation should be taken into account for the annual Arctic sea ice mass balance. 展开更多
关键词 ARCTIC sea ice Model validation and sensitivity study SHEBA data.
在线阅读 下载PDF
High Sensitivity Acquisition Algorithm for DSSS Signal with Data Modulation 被引量:3
7
作者 SHEN Yuyao WANG Yongqing +1 位作者 CHEN Jingyao WU Siliang 《China Communications》 SCIE CSCD 2015年第4期76-85,共10页
In direct sequence spread spectrum communication both for satelliteto-ground and inter-satellite links, the system constrains due to radio frequency spectral occupation, channel data throughput and link performances i... In direct sequence spread spectrum communication both for satelliteto-ground and inter-satellite links, the system constrains due to radio frequency spectral occupation, channel data throughput and link performances in terms of data channel coding which might result in a signal structure where the symbol duration is shorter than the pseudo code period. This can generate some difficulties in the DSSS signal acquisition due to the polarity inversion caused by the data modulation. To eliminate the influence due to polarity inversion, this paper proposes a novel acquisition algorithm based on the simultaneous search of the code phase, data phase and Doppler frequency. In the proposed algorithm the data phase is predicted and the correlation period for the coherent integration can be set equal to the symbol duration. Then non-coherent accumulation over different symbol is implemented in order to enhance the acquisition algorithm sensitivity; the interval of non-coherent accumulation is the least common multiple between the symbol duration and the pseudo code period. The algorithm proposed can largely minimize the SNR loss caused by data polarity inversion and enhance acquisition performance without a noticeable increase in hardware complexity. Theoretical analysis, simulation and measured results verify the validity of the algorithm. 展开更多
关键词 DSSS signal acquisition dataphase prediction data polarity inversion segment search high sensitivity
在线阅读 下载PDF
DAMAGE DETECTION IN BUILDINGS USING A TWO-STAGE SENSITIVITY-BASED METHOD FROM MODAL TEST DATA
8
作者 ZhuHongping ChenXiaozhen ChenChuanyao 《Acta Mechanica Solida Sinica》 SCIE EI 2005年第2期150-156,共7页
Many multi-story or highrise buildings consisting of a number of identical stories are usually considered as periodic spring-mass systems. The general expressions of natural frequencies, mode shapes, slopes and curvat... Many multi-story or highrise buildings consisting of a number of identical stories are usually considered as periodic spring-mass systems. The general expressions of natural frequencies, mode shapes, slopes and curvatures of mode shapes of the periodic spring-mass system by utilizing the periodic structure theory are derived in this paper. The sensitivities of these mode parameters with respect to structural damages, which do not depend on the physical parameters of the original structures, are obtained. Based on the sensitivity analysis of these mode parameters, a two-stage method is proposed to localize and quantify damages of multi-story or highrise buildings. The slopes and curvatures of mode shapes, which are highly sensitive to local damages, are used to localize the damages. Subsequently, the limited measured natural frequencies, which have a better accuracy than the other mode parameters, are used to quantify the extent of damages within the potential damaged locations. The experimental results of a 3-story experimental building demonstrate that the single or multiple damages of buildings, either slight or severe, can be correctly localized by using only the slope or curvature of mode shape in one of the lower modes, in which the change of natural frequency is the largest, and can be accurately quantified by the limited measured natural frequencies with noise pollution. 展开更多
关键词 damage localization damage quantification sensitivity modal test data
在线阅读 下载PDF
Multi-Level Cache System of Small Spatio-Temporal Data Files Based on Cloud Storage in Smart City
9
作者 XU Xiaolin HU Zhihua LIU Xiaojun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第5期387-394,共8页
In this paper, we present a distributed multi-level cache system based on cloud storage, which is aimed at the low access efficiency of small spatio-temporal data files in information service system of Smart City. Tak... In this paper, we present a distributed multi-level cache system based on cloud storage, which is aimed at the low access efficiency of small spatio-temporal data files in information service system of Smart City. Taking classification attribute of small spatio-temporal data files in Smart City as the basis of cache content selection, the cache system adopts different cache pool management strategies in different levels of cache. The results of experiment in prototype system indicate that multi-level cache in this paper effectively increases the access bandwidth of small spatio-temporal files in Smart City and greatly improves service quality of multiple concurrent access in system. 展开更多
关键词 Smart City spatio-temporal data multi-level cache small file
原文传递
Hierarchical Visualized Multi-level Information Fusion for Big Data of Digital Image
10
作者 LI Lan LIN Guoliang +1 位作者 ZHANG Yun DU Jia 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期238-244,共7页
At present,the process of digital image information fusion has the problems of low data cleaning unaccuracy and more repeated data omission,resulting in the unideal information fusion.In this regard,a visualized multi... At present,the process of digital image information fusion has the problems of low data cleaning unaccuracy and more repeated data omission,resulting in the unideal information fusion.In this regard,a visualized multicomponent information fusion method for big data based on radar map is proposed in this paper.The data model of perceptual digital image is constructed by using the linear regression analysis method.The ID tag of the collected image data as Transactin Identification(TID)is compared.If the TID of two data is the same,the repeated data detection is carried out.After the test,the data set is processed many times in accordance with the method process to improve the precision of data cleaning and reduce the omission.Based on the radar images,hierarchical visualization of processed multi-level information fusion is realized.The experiments show that the method can clean the redundant data accurately and achieve the efficient fusion of multi-level information of big data in the digital image. 展开更多
关键词 digital image big data multi-level information FUSION
在线阅读 下载PDF
Evaluating current ethical values of OpenStreetMap using value sensitive design
11
作者 Ruba Jaljolie Talia Dror +1 位作者 David N.Siriba Sagi Dalyot 《Geo-Spatial Information Science》 SCIE EI CSCD 2023年第3期362-378,共17页
The crowdsourced OpenStreetMap mapping platform is utilized by countless stakeholders worldwide for various purposes and applications.Individuals,researchers,governments,commercial,and humanitarian organizations,in ad... The crowdsourced OpenStreetMap mapping platform is utilized by countless stakeholders worldwide for various purposes and applications.Individuals,researchers,governments,commercial,and humanitarian organizations,in addition to the engineers,professionals,and technical developers,use OpenStreetMap both as data contributors and consumers.The storage,usage,and integration of volunteered geographical data in software applications often create complex ethical dilemmas and values regarding the relationships between different categories of stakeholders.It is therefore common for moral preferences of stakeholders to be neglected.This paper investigates the integration of ethical values in OpenStreetMap using the value sensitive design methodology that examines technical,empirical,and conceptual aspects at each design stage.We use the Humanitarian OpenStreetMap Team,an existing volunteered geographic information initiative,as a case study.Our investigation shows that although OpenStreetMap does integrate ethical values in its organizational structure,a deeper understanding of its direct and indirect stakeholders’perspectives is still required.This study is expected to assist organizations that contribute to or use OpenStreetMap in recognizing and preserving existing and important ethical values.To the best of our knowledge,this is the first attempt to evaluate ethical values methodically and comprehensively in the design process of the OpenStreetMap platform. 展开更多
关键词 Value sensitive Design(VSD) OpenStreetMap(OSM) ethical values Volunteered Geographic Information(VGI) crowdsourcing geographic data contributors and consumers
原文传递
Sensitivity of Coupled Chaotic Dynamical System to Parameters in the Context of Data Assimilation
12
作者 Sergei Soldatenko David Smith Peter Steinle Chris Tingwell 《Journal of Mathematics and System Science》 2013年第12期641-654,共14页
In this paper, a numerical modeling tool is described which can be used to explore various aspects of four dimensional variational data assimilation and parameter estimation arising in geophysical, environmental, biol... In this paper, a numerical modeling tool is described which can be used to explore various aspects of four dimensional variational data assimilation and parameter estimation arising in geophysical, environmental, biological and engineering sciences. A major component of this tool is a coupled chaotic dynamical system obtained by coupling two versions of the well-known Lorenz (1963) model with different time scales which differ by a certain time-scale factor. A tangent linear model and its adjoint are considered that correspond to a coupled chaotic system. The general idea of applying sensitivity measures (sensitivity functions) to coupled systems, emphasizing the data assimilation aspects, is explored as well by the forward sensitivity approach. For this purpose the set of sensitivity equations is derived from the nonlinear equations of the coupled dynamical system. To estimate the influence of model parameter uncertainties on the simulated state variables the relative error in the energy norm is used. 展开更多
关键词 data assimilation dynamical system sensitivity analysis.
在线阅读 下载PDF
Sensitive Information Security Based on Elliptic Curves
13
作者 Nadine Nibigira Vincent Havyarimana Zhu Xiao 《World Journal of Engineering and Technology》 2024年第2期274-285,共12页
The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ... The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication. 展开更多
关键词 CRYPTOGRAPHY Elliptic Curves Digital Security data sensitive data IMPLEMENTATION
在线阅读 下载PDF
Multi-relation spatiotemporal graph residual network model with multi-level feature attention:A novel approach for landslide displacement prediction
14
作者 Ziqian Wang Xiangwei Fang +3 位作者 Wengang Zhang Xuanming Ding Luqi Wang Chao Chen 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第7期4211-4226,共16页
Accurate prediction of landslide displacement is crucial for effective early warning of landslide disasters.While most existing prediction methods focus on time-series forecasting for individual monitoring points,ther... Accurate prediction of landslide displacement is crucial for effective early warning of landslide disasters.While most existing prediction methods focus on time-series forecasting for individual monitoring points,there is limited research on the spatiotemporal characteristics of landslide deformation.This paper proposes a novel Multi-Relation Spatiotemporal Graph Residual Network with Multi-Level Feature Attention(MFA-MRSTGRN)that effectively improves the prediction performance of landslide displacement through spatiotemporal fusion.This model integrates internal seepage factors as data feature enhancements with external triggering factors,allowing for accurate capture of the complex spatiotemporal characteristics of landslide displacement and the construction of a multi-source heterogeneous dataset.The MFA-MRSTGRN model incorporates dynamic graph theory and four key modules:multilevel feature attention,temporal-residual decomposition,spatial multi-relational graph convolution,and spatiotemporal fusion prediction.This comprehensive approach enables the efficient analyses of multi-source heterogeneous datasets,facilitating adaptive exploration of the evolving multi-relational,multi-dimensional spatiotemporal complexities in landslides.When applying this model to predict the displacement of the Liangshuijing landslide,we demonstrate that the MFA-MRSTGRN model surpasses traditional models,such as random forest(RF),long short-term memory(LSTM),and spatial temporal graph convolutional networks(ST-GCN)models in terms of various evaluation metrics including mean absolute error(MAE=1.27 mm),root mean square error(RMSE=1.49 mm),mean absolute percentage error(MAPE=0.026),and R-squared(R^(2)=0.88).Furthermore,feature ablation experiments indicate that incorporating internal seepage factors improves the predictive performance of landslide displacement models.This research provides an advanced and reliable method for landslide displacement prediction. 展开更多
关键词 Landslide displacement prediction Spatiotemporal fusion Dynamic graph data feature enhancement multi-level feature attention
在线阅读 下载PDF
Modified LR-5 criteria based on gadoxetic acid can improve the sensitivity in the diagnosis of hepatocellular carcinoma
15
作者 Yan Song Yue-Yue Zhang +4 位作者 Qin Yu Rui Ma Yue Xiao Jun-Kang Shen Chao-Gang Wei 《World Journal of Radiology》 2025年第3期17-30,共14页
BACKGROUND Currently,only tumors classified as LR-5 are considered definitive hepatocellular carcinoma(HCC),and no further pathologic confirmation is required to initiate therapy.Previous studies have shown that the s... BACKGROUND Currently,only tumors classified as LR-5 are considered definitive hepatocellular carcinoma(HCC),and no further pathologic confirmation is required to initiate therapy.Previous studies have shown that the sensitivity of LR-5 is modest,and lesions enhanced by gadoxetic acid(Gd-EOB-DTPA)may exhibit lower sensitivity than those enhanced by Gd-DTPA.AIM To identify malignant ancillary features(AFs)that can independently and significantly predict HCC in Liver Imaging Reporting and Data System version 2018,and to develop modified LR-5 criteria to improve diagnostic performance on Gd-EOB-DTPA-enhanced magnetic resonance imaging.METHODS Imaging data from patients with HCC risk factors who underwent abdominal Gd-EOB-DTPA-enhanced magnetic resonance imaging were collected.Univariate and multivariate logistic regression analyses were performed to determine AFs that could independently and significantly predict HCC.The modified LR-5 criteria involved reclassifying LR-4/LR-3 lesions based on major features combined with independently significant AFs for HCC,or by substituting threshold growth with significant AFs.McNemar's test was used to compare the diagnostic performance of the modified LR-5 criteria.RESULTS A total of 244 lesions from 216 patients were included.Transitional phase hypointensity,mild-moderate T2 hyperintensity,and fat in mass(more than adjacent liver)were identified as significant independent predictors of HCC.Using the modified LR-5 criteria(e.g.,LR-5-M1:LR-4+transitional phase hypointensity;LR-5-M4:LR-5 by transitional phase hypointensity instead of threshold growth;LR-5-M5:LR-5 by mild-moderate T2 hyperintensity instead of threshold growth;LR-5-M8:LR-3/LR-4+any two features of transitional phase hypointensity/mild-moderate T2 hyperintensity/fat in mass),sensitivities were significantly increased(88.5%-89.1%)compared to the standard LR-5(60.6%;all P values<0.05),while specificities(84.8%-89.9%)remained largely unchanged(93.7%;all P values>0.05).The LR-5-M8 criterion achieved the highest sensitivity.CONCLUSION Mild-moderate T2 hyperintensity,transitional phase hypointensity,and fat in mass are independent and significant predictors of HCC malignant AFs.The modified LR-5 criteria can improve sensitivity without significantly reducing specificity. 展开更多
关键词 Hepatocellular carcinoma Liver Imaging Reporting and data System Gadoxetic acid sensitivity SPECIFICITY Modified Liver Imaging Reporting and data System
暂未订购
基于DataSocket技术的SMI敏感数据加密方法 被引量:6
16
作者 万方 雷光波 徐承志 《计算机仿真》 北大核心 2021年第8期217-221,共5页
由于以往加密方法是将所有的图像信息全部加密成密文图像,导致图像信息膨胀,影响了图像信息传输质量。为解决上述问题,研究一种基于DataSocket技术的序列监控图像敏感数据加密方法。方法先是序列监控图像敏感数据压缩处理,减少信息冗余... 由于以往加密方法是将所有的图像信息全部加密成密文图像,导致图像信息膨胀,影响了图像信息传输质量。为解决上述问题,研究一种基于DataSocket技术的序列监控图像敏感数据加密方法。方法先是序列监控图像敏感数据压缩处理,减少信息冗余度,具体包括图像分块、颜色空间转换、离散余弦变换、离散余弦变换系数量化以及编码等操作;然后利用混沌系统进行图像加密处理,包括实数混沌序列生成与转换、置乱和扩散等。实验结果表明:对比其它三种方法的加密结果,上述方法应用下信息熵最大,PSNR值较大,说明上述方法既能确保监控图像敏感信息安全,提高了图像的传输质量。 展开更多
关键词 序列监控图像 敏感数据 混沌加密方法
在线阅读 下载PDF
一种新的基于地震波形指纹的特定地区核爆炸事件快速检测方法
17
作者 弓妮 商杰 +5 位作者 唐伟 刘哲函 王海军 黄立洪 韩守诚 江宇 《地球科学》 北大核心 2026年第1期130-145,共16页
核爆炸监测是禁核试核查的关键技术.为监测全球可能发生的核试验,全面禁止核试验条约规定了一套严格的核查机制.其中国际监测系统(International Monitoring System,IMS)的波形数据实时传输至国际数据中心(International Data Centre,I... 核爆炸监测是禁核试核查的关键技术.为监测全球可能发生的核试验,全面禁止核试验条约规定了一套严格的核查机制.其中国际监测系统(International Monitoring System,IMS)的波形数据实时传输至国际数据中心(International Data Centre,IDC)进行处理和分析,分别在大约1 h、4 h和6 h给出三个不同阶段的自动处理结果.对于特定地区的核爆监测,直接依赖IDC结果存在响应滞后和误检率高的问题.本文提出了一种基于地震波形指纹的快速检测方法Seisprint.该方法借鉴音频指纹识别思想,将历史核爆波形作为模板,利用滑动窗口与特征提取将连续波形压缩为多个二进制指纹,通过快速相似性匹配与聚类实现核爆事件自动检测并实时报警.采用朝鲜周边两个IMS地震台站和我国东北地区4个地震台站记录的朝鲜6次地下核试验以及历史天然地震事件数据对Seisprint进行测试.Seisprint生成的指纹可以有效区分核爆与非核爆信号,且具有较强的抗噪性;可在数分钟内完成多个地震台站24小时连续波形数据的处理,实现核爆事件的快速准确检出.结果表明,Seisprint可提高特定地区核爆事件监测的时效性和准确性. 展开更多
关键词 CTBT 核爆炸监测 地震波形指纹 局部敏感哈希 自动处理 地震学
原文传递
基于动态数据敏感等级的大数据细粒度访问控制模型
18
作者 张焕 侯明星 +1 位作者 刘光娜 史颖 《计算机科学》 北大核心 2026年第2期187-195,共9页
针对大数据环境下静态访问控制模型难以适应数据动态性与上下文多变性的问题,提出了一种基于动态数据敏感等级的细粒度访问控制模型。该模型首先构建一个多维度量化评估体系,通过分析数据内容、上下文环境及历史操作行为,动态计算数据... 针对大数据环境下静态访问控制模型难以适应数据动态性与上下文多变性的问题,提出了一种基于动态数据敏感等级的细粒度访问控制模型。该模型首先构建一个多维度量化评估体系,通过分析数据内容、上下文环境及历史操作行为,动态计算数据的实时敏感等级,克服了传统静态分类的僵化性。在此基础上,将动态敏感等级作为核心决策属性,与基于属性的访问控制模型深度集成,设计了一种情境自适应的权限动态授予与撤销机制,实现了对不同用户在不同时间、地点及场景下访问行为的精准管控。实验结果表明,该模型能够在保证较低性能开销的同时,有效感知数据价值与风险的变化,相较于传统基于角色的访问控制模型和静态基于属性的访问控制模型,在权限分配的精确度与安全性上均有显著提升,尤其适用于数据流动频繁、安全需求多变的大数据应用场景,为构建智能、自适应的数据安全防护体系提供了有效途径。 展开更多
关键词 大数据安全 访问控制 细粒度 动态敏感等级 属性基访问控制
在线阅读 下载PDF
基于数据驱动的非平衡多分类的热轧板凸度预测
19
作者 董好 吴照松 孙杰 《控制工程》 北大核心 2026年第2期336-342,共7页
板凸度是评价热轧板断面轮廓的最重要的质量指标,良好的板凸度能保障生产的正常进行,因此精确预测不良凸度对保障生产具有至关重要的意义。在热轧实际生产中,合格凸度的样本数量要远多于不良凸度,并且大量的非线性参数和参数间的强耦合... 板凸度是评价热轧板断面轮廓的最重要的质量指标,良好的板凸度能保障生产的正常进行,因此精确预测不良凸度对保障生产具有至关重要的意义。在热轧实际生产中,合格凸度的样本数量要远多于不良凸度,并且大量的非线性参数和参数间的强耦合性,导致板凸度预测成为一个非常复杂的非平衡分类问题。根据热轧板凸度复杂的数据特性,考虑到深度学习的强大非线性拟合能力,并结合代价敏感学习来提升不良凸度的错误分类代价,提出了代价敏感深度置信网络(CS-DBN)模型。将Macro-F1、Micro-F1、G-Mean以及Aacc等评价指标作为模型的评价指标。通过调整模型超参数、优化器等来确定最优CS-DBN,并将其与传统机器学习算法ANN、SVC、KNN、DBN、LR进行对比分析,结果显示CS-DBN在各项评价指标上均优于传统机器学习模型,板凸度预测结果良好。 展开更多
关键词 热轧 板凸度 代价敏感 深度置信网络 非平衡数据
原文传递
支持分层访问控制的弱中心化敏感数据共享方案
20
作者 郑开发 孙炜 +4 位作者 周俊旭 吴云坤 徐振 刘志全 何强 《计算机科学》 北大核心 2026年第2期431-441,共11页
在云边协同等分布式应用场景下,实现高效性、可检索性与弱中心化的细粒度访问控制是保障敏感数据安全共享的核心挑战。然而,传统方案存在高昂的计算开销、缺少密文检索功能和中心化架构固有的安全风险等问题。对此,提出一种支持分层访... 在云边协同等分布式应用场景下,实现高效性、可检索性与弱中心化的细粒度访问控制是保障敏感数据安全共享的核心挑战。然而,传统方案存在高昂的计算开销、缺少密文检索功能和中心化架构固有的安全风险等问题。对此,提出一种支持分层访问控制的弱中心化敏感数据共享方案(HAC-SDS)。首先,通过云边端协同计算方式,将终端侧开销转移到云边侧,降低计算和存储开销。其次,通过构建加密的倒排索引,支持对云端文件进行快速、细粒度的检索,并结合属性撤销与动态更新机制,显著提升效率。最后,将区块链技术应用于密钥管理,通过其弱中心化的特性,从根本上消除传统中心化方案的单点瓶颈与信任风险。安全分析表明,密文的不可区分性有效保障了数据的机密性。实验结果表明,所提密文检索方案在实际应用中是高效可行的。 展开更多
关键词 分层访问控制 敏感数据共享 云边端协同计算 密文检索 弱中心化
在线阅读 下载PDF
上一页 1 2 58 下一页 到第
使用帮助 返回顶部