期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
A Hierarchical P2P Model and a Data Fusion Method for Network Security Situation Awareness System 被引量:5
1
作者 GUO Fangfang HU Yibing +2 位作者 XIU Longting FENG Guangsheng WANG Shuaishuai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第2期126-132,共7页
A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single po... A hierarchical peer-to-peer(P2P)model and a data fusion method for network security situation awareness system are proposed to improve the efficiency of distributed security behavior monitoring network.The single point failure of data analysis nodes is avoided by this P2P model,in which a greedy data forwarding method based on node priority and link delay is devised to promote the efficiency of data analysis nodes.And the data fusion method based on repulsive theory-Dumpster/Shafer(PSORT-DS)is used to deal with the challenge of multi-source alarm information.This data fusion method debases the false alarm rate.Compared with improved Dumpster/Shafer(DS)theoretical method based on particle swarm optimization(PSO)and classical DS evidence theoretical method,the proposed model reduces false alarm rate by 3%and 7%,respectively,whereas their detection rate increases by 4%and 16%,respectively. 展开更多
关键词 distributed security behavior monitoring peer-to- peer (P2P) data fusion DS evidence theory PSO algorithm
原文传递
Least Privileges and Role’s Inheritance of RBAC 被引量:3
2
作者 HAN Lan-sheng HONG Fan Asiedu Baffour Kojo 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期185-187,共3页
The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalizat... The main advantages of role-based access control (RBAC) are able to support the well-known security principles and roles'inheritance. But for there remains a lack of specific definition and the necessary formalization for RBAC, it is hard to realize RBAC in practical work. Our contribution here is to formalize the main relations of RBAC and take first step to propose concepts of action closure and deta closure of a role, based on which we got the specification and algorithm for the least privileges of a role. We propose that roles' inheritance should consist of inheritance of actions and inheritance of data, and then we got the inheritance of privileges among roles, which can also be supported by existing exploit tools. 展开更多
关键词 role-based access control least privileges role's inheritance
在线阅读 下载PDF
INVESTIGATION ON STABILITY OF PZT/EPOXY PIEZOCOMPOSITE WITH PRESSURE AND TEMPERATURE 被引量:2
3
作者 Likun Wang Yuanyuan Wan +2 位作者 Li Li Lei Qin Yi Lu 《Acta Mechanica Solida Sinica》 SCIE EI 2009年第3期226-231,共6页
With the universal test machine and temperature test chamber, the effect of pressure and temperature on the behavior of 1-3 and 1-3-2 piezocomposites prepared with PZT/epoxy in our lab has been investigated through el... With the universal test machine and temperature test chamber, the effect of pressure and temperature on the behavior of 1-3 and 1-3-2 piezocomposites prepared with PZT/epoxy in our lab has been investigated through electrical impedance and dielectric analysis. The permittivity, resonant frequency and dielectric loss of the composites have been measured under vertical stress and temperature, and the variety of the material properties under pressure and temperature could also be obtained. The pressure and temperature stability of the composites have been assessed through experiments. The data of these two types of composites indicated that the stability of 1-342 composite with pressure was better than that of 1-3 composite, and two composites have almost the same dielectric stability with temperature. However, 1-3-2 composite showed slower frequency variation than 1-3 composite. 展开更多
关键词 piezoelectric composite directional pressure temperature STABILITY
在线阅读 下载PDF
Cut-Vertex Independent Connectivity Maintaining Approach for Wireless Sensor and Actor Networks
4
作者 ZHAO Xinyuan WANG Neng 《China Communications》 SCIE CSCD 2015年第S2期19-28,共10页
In recent years, the development of wireless sensor networks(WSNs) has risen to a great interest in the Wireless Sensor and Actor Networks(WSANs), which consist of sensors and actors. Because actors have to collaborat... In recent years, the development of wireless sensor networks(WSNs) has risen to a great interest in the Wireless Sensor and Actor Networks(WSANs), which consist of sensors and actors. Because actors have to collaborate with each other to perform tasks, it is vital to maintain the connectivity of actor network in WSANs. This paper proposes a 1-hop based cut-vertex independent connectivity maintaining approach(CIMA) to restore the broken connectivity caused by single actor failure. A balance is achieved in restoration overheads between all actors and individuals by bounding the maximum moveable distance of actor and determining a local optimal repair plan. The effectiveness of CIMA has been validated through simulation experiments. 展开更多
关键词 ACTOR failure CONNECTIVITY RESTORATION COORDINATION cascaded
在线阅读 下载PDF
Study on the Technology of Image Measurement with High Accuracy based on Sobel Operator
5
作者 Zuobing WANG Xiaona SONG 《International Journal of Technology Management》 2015年第2期34-36,共3页
According to the basic problem of industrial production, the paper presents a monocular camera and automatic annotation ranging scheme with a ruler. The scheme eliminates a series of complex operation steps frequently... According to the basic problem of industrial production, the paper presents a monocular camera and automatic annotation ranging scheme with a ruler. The scheme eliminates a series of complex operation steps frequently used for image location of the calibration, image correction, it has simple implementation and has successfully realized precise ranging by using digital image processing technology. From the beginning of the analysis of image edge detection, edge detection principle and some common edge detection operators, and proposes an improved multi-scale edge detection algorithm, then according to the particularity of the edge proposed new edge thinning algorithm, finally mark the target point through the feature extraction, calculate the final results of fault location. 展开更多
关键词 Image Measuring Edge Detection Wavelet Transformation Edge Thinning Feature Extraction
在线阅读 下载PDF
Immune Recognition Method Based on Analogy Reasoning in Intrusion Detection System 被引量:1
6
作者 ZHANG Changyou CAO Yuanda +2 位作者 YANG Minghua YU Jiong ZHU Dongfeng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1839-1843,共5页
In this paper, we propose an analogy based immune recognition method that focuses on the implement of the clone selection process and the negative selection process by means of analogy similarity. This method is appli... In this paper, we propose an analogy based immune recognition method that focuses on the implement of the clone selection process and the negative selection process by means of analogy similarity. This method is applied in an IDS (Intrusion Detection System) following several steps. Firstly, the initial abnormal behaviours sample set is optimized through the combining of the AIS (Artificial Immune System) and the genetic algorithm. Then, the abnormity probability algorithm is raised considering the two sides of abnormality and normality. Finally, an intrusion detection system model is established based on the above algorithms and models. 展开更多
关键词 immune recognition analogy reasoning SIMILARITY genetic algorithm intrusion detection system
在线阅读 下载PDF
A novel oil spill detection method from synthetic aperture radar imageries via a bidimensional empirical mode decomposition 被引量:2
7
作者 YANG Yonghu LI Ying ZHU Xueyuan 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2017年第7期86-94,共9页
Oil spills pose a major threat to ocean ecosystems and their health. Synthetic aperture radar(SAR) sensors can detect oil spills on the sea surface. These oil spills appear as dark spots in SAR images. However, dark... Oil spills pose a major threat to ocean ecosystems and their health. Synthetic aperture radar(SAR) sensors can detect oil spills on the sea surface. These oil spills appear as dark spots in SAR images. However, dark formations can be caused by a number of phenomena. It is aimed to distinguishing oil spills or look-alike objects. A novel method based on a bidimensional empirical mode decomposition is proposed. The selected dark formations are first decomposed into several bidimensional intrinsic mode functions and the residue. Subsequently, 64 dimension feature sets are calculated using the Hilbert spectral analysis and five new features are extracted with a relief algorithm. Mahalanobis distances are then used for classification. Three data sets containing oil spills or look-alikes are used to test the accuracy rate of the method. The accuracy rate is more than 90%. The experimental results demonstrate that the novel method can detect oil spills validly and accurately. 展开更多
关键词 bidimensional empirical mode decomposition synthetic aperture radar image detection of oil spill hilbert spectral analysis
在线阅读 下载PDF
Research on the Localization of High-Quality Teaching Resources 被引量:1
8
作者 Deng Hong Haoliang Qi +2 位作者 Leilei Kong Changwei Wu An Bo 《国际计算机前沿大会会议论文集》 2016年第2期59-60,共2页
The emergence of the MOOC leads to the revolution of education.All people can be taught by excellent teachers.But the interest of most of the MOOC learners only last less than two weeks.The main reasons may be the cou... The emergence of the MOOC leads to the revolution of education.All people can be taught by excellent teachers.But the interest of most of the MOOC learners only last less than two weeks.The main reasons may be the courses too difficult to study and without the restraint mechanism.This paper tries to solve the problem that learners cannot last in a MOOC.We put forward that it is feasible to bring the MOOC of elite courses to general university classroom after the localization of high quality teaching resources.We imported Information and Entropy of MIT to the curriculum of Heilongjiang Institute of Technology.First,we combine with own school characteristics in Information and Entropy.Second,we brought part of Information and Entropy in our class and edit of the original video in some part.Third,we have a test in the end of the course.At last all of students of class finished the instructional video and got good grades in test.The method of bringing the MOOC of elite courses to the curriculum of general university outperforms that of traditional teaching meth. 展开更多
关键词 MOOC LOCALIZATION Instructional VIDEO
在线阅读 下载PDF
Democratic Group Signatures with Linkability from Gap Diffie-Hellman Group
9
作者 刘彦宾 李祥学 +1 位作者 钱海峰 张文政 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期688-691,共4页
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hel... Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hellman (DDH) assumption. In this paper, we present a democratic group signature scheme based on any gap Diffie-Hellman (GDH) group where DDH problem is easily but computational Diffe-Hellman (CDH) problem is hard to be solved. Besides the properties of ordinary DGSs, our scheme also provides the property of linkability, i.e., any public verifier can tell whether two group signatures are generated using the same private key. Security properties of our scheme employ a new and independently interesting decisional product Diffie-Hellman (DPDH) assumption which is weaker than DDH one. 展开更多
关键词 democratic group signature GDH group ANONYMITY TRACEABILITY linkability
原文传递
Democratic Group Signatures with Threshold Traceability
10
作者 李祥学 钱海峰 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期98-101,共4页
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a... This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members. 展开更多
关键词 democratic group signature (DGS) ANONYMITY TRACEABILITY threshold traceability
原文传递
An Approach of Branch Multithreading Switch Mechanism
11
作者 Lan Dong Zhenzhou Ji Mingzeng Hu Xinmin Tang 《通讯和计算机(中英文版)》 2006年第5期14-16,39,共4页
关键词 解码器 多线程 调节装置 计算机技术
在线阅读 下载PDF
Research on Image Segmentation Algorithm based on Fuzzy C-mean Clustering
12
作者 Xiaona SONG Zuobing WANG 《International Journal of Technology Management》 2015年第2期28-30,共3页
This paper presents a fuzzy C- means clustering image segmentation algorithm based on particle swarm optimization, the method utilizes the strong search ability of particle swarm clustering search center. Because the ... This paper presents a fuzzy C- means clustering image segmentation algorithm based on particle swarm optimization, the method utilizes the strong search ability of particle swarm clustering search center. Because the search clustering center has small amount of calculation according to density, so it can greatly improve the calculation speed of fuzzy C- means algorithm. The experimental results show that, this method can make the fuzzy clustering to obviously improve the speed, so it can achieve fast image segmentation. 展开更多
关键词 Image segmentation Fuzzy clustering Fuzzy c-means Spatial information ANTI-NOISE
在线阅读 下载PDF
SMER:a secure method of exchanging resources in heterogeneous internet of things 被引量:3
13
作者 Yu ZHANG Yuxing HAN Jiangtao WEN 《Frontiers of Computer Science》 SCIE EI CSCD 2019年第6期1198-1209,共12页
The number of IoT(internet of things)connected devices increases rapidly.These devices have different operation systems and therefore cannot communicate with each other.As a result,the data they collected is limited w... The number of IoT(internet of things)connected devices increases rapidly.These devices have different operation systems and therefore cannot communicate with each other.As a result,the data they collected is limited within their own platform.Besides,IoT devices have very constrained resources like weak MCU(micro control unit)and limited storage.Therefore,they need direct communication method to cooperate with each other,or with the help of nearby devices with rich resources.In this paper,we propose a secure method to exchange resources(SMER)between heterogeneous IoT devices.In order to exchange resources among devices,SMER adopts a compensable mechanism for resource exchange and a series of security mechanisms to ensure the security of resource exchanges.Besides,SMER uses a smart contract based scheme to supervise resource exchange,which guarantees the safety and benefits of IoT devices.We also introduce a prototype system and make a comprehensive discussion. 展开更多
关键词 internet of things P2P resource exchange blockchain smart contract
原文传递
Prediction of the future flood severity in plain river network region based on numerical model: A case study 被引量:8
14
作者 胡孜军 王玲玲 +1 位作者 唐洪武 戚晓明 《Journal of Hydrodynamics》 SCIE EI CSCD 2017年第4期586-595,共10页
Suzhou is one of China's most developed regions, located in the eastern part of the Yangtze Delta. Due to its location and river features, it may at a high risk of flood under the climate change background in the fut... Suzhou is one of China's most developed regions, located in the eastern part of the Yangtze Delta. Due to its location and river features, it may at a high risk of flood under the climate change background in the future. In order to investigate the flood response to the extreme scenario in this region, 1-D hydrodynamic model with real-time operations of sluices and pumps is established. The rain-runoff processes of the urban and rural areas are simulated by two lumped hydrologic models, respectively. Indicators for a quantitative assessment of the flood severity in this region are proposed. The results indicate that the existing flood control system could prevent the Suzhou Downtown from inundation in the future. The difficulty of draining the Taihu Lake floods should be given attention to avoid the flood hazard. The modelling approach based on the in-bank model and the evaluation parameters could be effective for the flood severity estimation in the plain river network catchment. The insights from this study of the possible future extreme flood events may assist the policy making and the flood control planning. 展开更多
关键词 Flood control hydrodynamic model sea level rise extreme rain Suzhou District
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部