期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Permission and role automatic assigning of user in role-based access control 被引量:4
1
作者 韩道军 卓汉逵 +1 位作者 夏兰亭 李磊 《Journal of Central South University》 SCIE EI CAS 2012年第4期1049-1056,共8页
Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and th... Role mining and setup affect the usage of role-based access control(RBAC).Traditionally,user's role and permission assigning are manipulated by security administrator of system.However,the cost is expensive and the operating process is complex.A new role analyzing method was proposed by generating mappings and using them to provide recommendation for systems.The relation among sets of permissions,roles and users was explored by generating mappings,and the relation between sets of users and attributes was analyzed by means of the concept lattice model,generating a critical mapping between the attribute and permission sets,and making the meaning of the role natural and operational.Thus,a role is determined by permission set and user's attributes.The generated mappings were used to automatically assign permissions and roles to new users.Experimental results show that the proposed algorithm is effective and efficient. 展开更多
关键词 role-based access control ROLE permission assignment concept lattice
在线阅读 下载PDF
CSMCCVA:Framework of cross-modal semantic mapping based on cognitive computing of visual and auditory sensations 被引量:1
2
作者 刘扬 Zheng Fengbin Zuo Xianyu 《High Technology Letters》 EI CAS 2016年第1期90-98,共9页
Cross-modal semantic mapping and cross-media retrieval are key problems of the multimedia search engine.This study analyzes the hierarchy,the functionality,and the structure in the visual and auditory sensations of co... Cross-modal semantic mapping and cross-media retrieval are key problems of the multimedia search engine.This study analyzes the hierarchy,the functionality,and the structure in the visual and auditory sensations of cognitive system,and establishes a brain-like cross-modal semantic mapping framework based on cognitive computing of visual and auditory sensations.The mechanism of visual-auditory multisensory integration,selective attention in thalamo-cortical,emotional control in limbic system and the memory-enhancing in hippocampal were considered in the framework.Then,the algorithms of cross-modal semantic mapping were given.Experimental results show that the framework can be effectively applied to the cross-modal semantic mapping,and also provides an important significance for brain-like computing of non-von Neumann structure. 展开更多
关键词 multimedia neural cognitive computing (MNCC) brain-like computing cross-modal semantic mapping (CSM) selective attention limbic system multisensory integration memory-enhancing mechanism
在线阅读 下载PDF
A Deletable and Modifiable Blockchain Scheme Based on Record Verification Trees and the Multisignature Mechanism 被引量:4
3
作者 Daojun Han Jinyu Chen +3 位作者 Lei Zhang Yatian Shen Yihua Gao Xueheng Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第7期223-245,共23页
As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios.However,data on a blockchain cannot be deleted.A... As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios.However,data on a blockchain cannot be deleted.As a result,it is impossible to clean invalid and sensitive data and correct erroneous data.This,to a certain extent,hinders the application of blockchains in supply chains and Internet of Things.To address this problem,this study presents a deletable and modifiable blockchain scheme(DMBlockChain)based on record verification trees(RVTrees)and the multisignature scheme.(1)In this scheme,an RVTree structure is designed and added to the block structure.The RVTree can not only ensure that a record is true and valid but,owing to its unique binary structure,also verify whether modification and deletion requests are valid.(2)In DMBlockChain,the multisignature mechanism is also introduced.This mechanism requires the stakeholders’signatures for each modification or deletion request and thus ensures that a record will not be modified arbitrarily.A user’s request is deemed valid only if it is dually verified by the RVTree and the multisignature mechanism.The analysis finds that DMBlockChain can provide a secure and valid means for modifying and deleting records in a block while ensuring the integrity of the block and that DMBlockChain can effectively save space in some scenarios that require frequent records modification. 展开更多
关键词 Blockchain record verification trees MULTISIGNATURE DMBlockChain
在线阅读 下载PDF
Mining Bytecode Features of Smart Contracts to Detect PonziScheme on Blockchain 被引量:2
4
作者 Xiajiong Shen Shuaimin Jiang Lei Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第6期1069-1085,共17页
The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in unt... The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in untrustworthy environments.However,these features of this technology are also easily exploited by unscrupulous individuals,a typical example of which is the Ponzi scheme in Ethereum.The negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been significant.To solve this problem,we propose a detection model for detecting Ponzi schemes in smart contracts using bytecode.In this model,our innovation is shown in two aspects:We first propose to use two bytes as one characteristic,which can quickly transform the bytecode into a high-dimensional matrix,and this matrix contains all the implied characteristics in the bytecode.Then,We innovatively transformed the Ponzi schemes detection into an anomaly detection problem.Finally,an anomaly detection algorithm is used to identify Ponzi schemes in smart contracts.Experimental results show that the proposed detection model can greatly improve the accuracy of the detection of the Ponzi scheme contracts.Moreover,the F1-score of this model can reach 0.88,which is far better than those of other traditional detection models. 展开更多
关键词 Ponzi scheme blockchain security smart contracts anomaly detection
在线阅读 下载PDF
The Direct Product of Graded Finite Posets
5
作者 LIU Wei CHEN Shu-wei JIANG Bao-qing 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2008年第3期430-436,共7页
A new concept Graded Finite Poset is proposed in this paper. Through discussing some basic properties of it, we come to that the direct product of graded finite posets is connected if and only if every graded finite p... A new concept Graded Finite Poset is proposed in this paper. Through discussing some basic properties of it, we come to that the direct product of graded finite posets is connected if and only if every graded finite poset is connected. The graded function of a graded finite poset is unique if and only if the graded finite poset is connected. 展开更多
关键词 Graded poset graded finite poset graded function direct product connected post
在线阅读 下载PDF
A Depth-first Algorithm of Finding All Association Rules Generated by a Frequent Itemset
6
作者 武坤 姜保庆 魏庆 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期1-4,9,共5页
The classical algorithm of finding association rules generated by a frequent itemset has to generate all non-empty subsets of the frequent itemset as candidate set of consequents. Xiongfei Li aimed at this and propose... The classical algorithm of finding association rules generated by a frequent itemset has to generate all non-empty subsets of the frequent itemset as candidate set of consequents. Xiongfei Li aimed at this and proposed an improved algorithm. The algorithm finds all consequents layer by layer, so it is breadth-first. In this paper, we propose a new algorithm Generate Rules by using Set-Enumeration Tree (GRSET) which uses the structure of Set-Enumeration Tree and depth-first method to find all consequents of the association rules one by one and get all association rules correspond to the consequents. Experiments show GRSET algorithm to be practicable and efficient. 展开更多
关键词 association rule frequent itemset breath-first depth-first consequent.
在线阅读 下载PDF
Algebraic Independence Measures for the Values of Mahler Type Functions
7
作者 WANG Tian-qin LIU Hua-ke 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2006年第4期567-576,共10页
In this paper, we give the algebraic independence measures for the values ofMahler type functions in complex number field and p-adic number field, respectively.
关键词 algebraic independence measure Mahler type function p-adic number field
在线阅读 下载PDF
Multi-Cluster Feature Selection Based on Isometric Mapping 被引量:7
8
作者 Yadi Wang Zefeng Zhang Yinghao Lin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第3期570-572,共3页
Dear editor,This letter presents an unsupervised feature selection method based on machine learning.Feature selection is an important component of artificial intelligence,machine learning,which can effectively solve t... Dear editor,This letter presents an unsupervised feature selection method based on machine learning.Feature selection is an important component of artificial intelligence,machine learning,which can effectively solve the curse of dimensionality problem.Since most of the labeled data is expensive to obtain. 展开更多
关键词 PROBLEM LETTER dimensionality
在线阅读 下载PDF
Mining Maximal Frequent Patterns in a Unidirectional FP-tree 被引量:1
9
作者 宋晶晶 刘瑞新 +1 位作者 王艳 姜保庆 《Journal of Donghua University(English Edition)》 EI CAS 2006年第6期105-109,共5页
Because mining complete set of frequent patterns from dense database could be impractical, an interesting alternative has been proposed recently. Instead of mining the complete set of frequent patterns, the new model ... Because mining complete set of frequent patterns from dense database could be impractical, an interesting alternative has been proposed recently. Instead of mining the complete set of frequent patterns, the new model only finds out the maximal frequent patterns, which can generate all frequent patterns. FP-growth algorithm is one of the most efficient frequent-pattern mining methods published so far. However, because FP-tree and conditional FP-trees must be two-way traversable, a great deal memory is needed in process of mining. This paper proposes an efficient algorithm Unid_FP-Max for mining maximal frequent patterns based on unidirectional FP-tree. Because of generation method of unidirectional FP-tree and conditional unidirectional FP-trees, the algorithm reduces the space consumption to the fullest extent. With the development of two techniques: single path pruning and header table pruning which can cut down many conditional unidirectional FP-trees generated recursively in mining process, Unid_FP-Max further lowers the expense of time and space. 展开更多
关键词 data mining frequent pattern the maximal frequent pattern Unid _ FP-tree conditional Unid _ FP-tree.
在线阅读 下载PDF
p-adic Measures of Algebraic Independence for the Values of Ramanujan Functions and Klein Modular Functions
10
作者 Tian Qin WANG Guang Shan XU 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2007年第1期83-88,共6页
In this paper, we give the p-adic measures of algebraic independence for the values of Ramanujan functions and Klein modular functions at algebraic points.
关键词 p-adic value Measure of algebraic independence Ramanujan function Klein modular function
原文传递
A New Classification Rule Inducing Algorithm Based on Difference Degree (CRID)
11
作者 Honghai Feng Junhui Huang +5 位作者 Lijuan Liu Kaiwei Zou Qiannan Zhu Xiangyong Lu Yingchun Li Sai Liu 《通讯和计算机(中英文版)》 2014年第2期148-157,共10页
关键词 分类规则 算法 差异度 诱导 属性值 粗糙集 规则集 竞争力
在线阅读 下载PDF
Improved Dota2 Lineup Recommendation Model Based on a Bidirectional LSTM 被引量:7
12
作者 Lei Zhang Chenbo Xu +3 位作者 Yihua Gao Yi Han Xiaojiang Du Zhihong Tian 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第6期712-720,共9页
In recent years,e-sports has rapidly developed,and the industry has produced large amounts of data with specifications,and these data are easily to be obtained.Due to the above characteristics,data mining and deep lea... In recent years,e-sports has rapidly developed,and the industry has produced large amounts of data with specifications,and these data are easily to be obtained.Due to the above characteristics,data mining and deep learning methods can be used to guide players and develop appropriate strategies to win games.As one of the world’s most famous e-sports events,Dota2 has a large audience base and a good game system.A victory in a game is often associated with a hero’s match,and players are often unable to pick the best lineup to compete.To solve this problem,in this paper,we present an improved bidirectional Long Short-Term Memory(LSTM)neural network model for Dota2 lineup recommendations.The model uses the Continuous Bag Of Words(CBOW)model in the Word2 vec model to generate hero vectors.The CBOW model can predict the context of a word in a sentence.Accordingly,a word is transformed into a hero,a sentence into a lineup,and a word vector into a hero vector,the model applied in this article recommends the last hero according to the first four heroes selected first,thereby solving a series of recommendation problems. 展开更多
关键词 Word2vec mutiplayer online battle arena games Continuous Bag Of Words(CBOW)model Long Short-Term Memory(LSTM)
原文传递
Phase spectrum based automatic ship detection in synthetic aperture radar images 被引量:2
13
作者 Miaohui Zhang Baojun Qiao +1 位作者 Ming Xin Bo Zhang 《Journal of Ocean Engineering and Science》 SCIE 2021年第2期185-195,共11页
This paper proposes an automatic ship detection approach in Synthetic Aperture Radar(SAR)Images using phase spectrum.The proposed method mainly contains two stages:Firstly,sea-land segmentation of SAR Images is one of... This paper proposes an automatic ship detection approach in Synthetic Aperture Radar(SAR)Images using phase spectrum.The proposed method mainly contains two stages:Firstly,sea-land segmentation of SAR Images is one of the key stages for SAR image application such as sea-targets detection and recognition,which are easily detected only in sea regions.In order to eliminate the influence of land regions in SAR images,a novel land removing method is explored.The removing method employs a Harris corner detector to obtain some image patches belonging to land,and the probability density function(PDF)of land area can be estimated by these patches.Thus,an appropriate land segmentation threshold is accordingly obtained.Secondly,an automatic ship detector based on phase spectrum is proposed.The proposed detector is free from various idealized assumptions and can accurately detect ships in SAR images.Experimental results demonstrate the efficiency of the proposed ship detection algorithm in diversified SAR images. 展开更多
关键词 Ship detection saliency detection phase spectrum sea-land segmentation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部