期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Clustering analysis algorithm for security supervising data based on semantic description in coal mines 被引量:1
1
作者 孟凡荣 周勇 夏士雄 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期354-357,共4页
In order to mine production and security information from security supervising data and to ensure security and safety involved in production and decision-making,a clustering analysis algorithm for security supervising... In order to mine production and security information from security supervising data and to ensure security and safety involved in production and decision-making,a clustering analysis algorithm for security supervising data based on a semantic description in coal mines is studied.First,the semantic and numerical-based hybrid description method of security supervising data in coal mines is described.Secondly,the similarity measurement method of semantic and numerical data are separately given and a weight-based hybrid similarity measurement method for the security supervising data based on a semantic description in coal mines is presented.Thirdly,taking the hybrid similarity measurement method as the distance criteria and using a grid methodology for reference,an improved CURE clustering algorithm based on the grid is presented.Finally,the simulation results of a security supervising data set in coal mines validate the efficiency of the algorithm. 展开更多
关键词 semantic description clustering analysis algorithm similarity measurement
在线阅读 下载PDF
Semantic Description and Verification of Security Policy Based on Ontology 被引量:1
2
作者 TANG Chenghua WANG Lina +2 位作者 TANG Shensheng QIANG Baohua TIAN Jilong 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期385-392,共8页
To solve the shortage problem of the semantic descrip- tion scope and verification capability existed in the security policy, a semantic description method for the security policy based on ontology is presented. By de... To solve the shortage problem of the semantic descrip- tion scope and verification capability existed in the security policy, a semantic description method for the security policy based on ontology is presented. By defining the basic elements of the security policy, the relationship model between the ontology and the concept of security policy based on the Web ontology language (OWL) is established, so as to construct the semantic description framework of the security policy. Through modeling and reasoning in the Protege, the ontology model of authorization policy is proposed, and the first-order predicate description logic is introduced to the analysis and verification of the model. Results show that the ontology-based semantic description of security policy has better flexibility and practicality. 展开更多
关键词 security policy ONTOLOGY semantic description ofpolicy the first-order predicate description logic
原文传递
Model Construction for Complex and Heterogeneous Data of Urban Road Traffic Congestion
3
作者 Jianchun Wen Minghao Zhu +2 位作者 Bo Gao Zhaojian Liu Xuehan Li 《Computers, Materials & Continua》 2026年第2期1354-1370,共17页
Urban traffic generates massive and diverse data,yet most systems remain fragmented.Current approaches to congestion management suffer from weak data consistency and poor scalability.This study addresses this gap by p... Urban traffic generates massive and diverse data,yet most systems remain fragmented.Current approaches to congestion management suffer from weak data consistency and poor scalability.This study addresses this gap by proposing the Urban Traffic Congestion Unified Metadata Model(UTC-UMM).The goal is to provide a standardized and extensible framework for describing,extracting,and storing multisource traffic data in smart cities.The model defines a two-tier specification that organizes nine core traffic resource classes.It employs an eXtensible Markup Language(XML)Schema that connects general elements with resource-specific elements.This design ensures both syntactic and semantic interoperability across siloed datasets.Extension principles allow new elements or constraints to be introducedwithout breaking backward compatibility.Adistributed pipeline is implemented usingHadoop Distributed File System(HDFS)and HBase.It integrates computer vision for video and natural language processing for text to automate metadata extraction.Optimized row-key designs enable low-latency queries.Performance is tested with the Yahoo!Cloud Serving Benchmark(YCSB),which shows linear scalability and high throughput.The results demonstrate that UTC-UMM can unify heterogeneous traffic data while supporting real-time analytics.The discussion highlights its potential to improve data reuse,portability,and scalability in urban congestion studies.Future research will explore integration with association rulemining and advanced knowledge representation to capture richer spatiotemporal traffic patterns. 展开更多
关键词 Metadata urban road traffic heterogeneous data hbase semantic description framework
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部