期刊文献+
共找到383篇文章
< 1 2 20 >
每页显示 20 50 100
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
1
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
在线阅读 下载PDF
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
2
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
在线阅读 下载PDF
Construction of a reusable data access layer based on .NET
3
作者 王远斌 《Journal of Chongqing University》 CAS 2005年第2期76-79,共4页
A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution util... A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution utilizes the reflection technology of .NET and design pattern. A typical application of the solution demonstrates that the new solution of data access layer performs better than the current N-tier architecture. More importantly, the application suggests that the new solution of data access layer can be reused effectively. 展开更多
关键词 N-tier architecture data access layer reflection technology REUSE
在线阅读 下载PDF
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
4
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
5
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD data STORAGE CLOUD Service PROVIDER Formula-Based CLOUD data access Control Multi-Agent system and Secure Java Agent Development Framework
在线阅读 下载PDF
Database-oriented storage based on LMDB and linear octree for massive block model 被引量:6
6
作者 毕林 赵辉 贾明涛 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2016年第9期2462-2468,共7页
Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, incl... Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, including ACID-compliant, concurrency support, data sharing, and efficient access. Each block model is organized by linear octree, stored in LMDB(lightning memory-mapped database). Geological attribute can be queried at any point of 3D space by comparison algorithm of location code and conversion algorithm from address code of geometry space to location code of storage. The performance and robustness of querying geological attribute at 3D spatial region are enhanced greatly by the transformation from 3D to 2D and the method of 2D grid scanning to screen the inner and outer points. Experimental results showed that this method can access the massive data of block model, meeting the database characteristics. The method with LMDB is at least 3 times faster than that with etree, especially when it is used to read. In addition, the larger the amount of data is processed, the more efficient the method would be. 展开更多
关键词 block model linear octree lightning memory-mapped database mass data access digital mine etree
在线阅读 下载PDF
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
7
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3GPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5G mobile communication
在线阅读 下载PDF
应用Access数据库建立的一种卫生检验数据管理系统 被引量:1
8
作者 林吉年 《职业与健康》 CAS 2006年第2期129-130,共2页
为了提高卫生检验数据管理的质量和工作效率,并使检验报告科学化、规范化。应用Access数据库进行卫生检验数据管理系统的编程。应用Access数据库编写的卫生检验数据管理系统具有操作简单、直观、易掌握、易修改、安全和方便的特点,大大... 为了提高卫生检验数据管理的质量和工作效率,并使检验报告科学化、规范化。应用Access数据库进行卫生检验数据管理系统的编程。应用Access数据库编写的卫生检验数据管理系统具有操作简单、直观、易掌握、易修改、安全和方便的特点,大大提高了工作效率。应用Access建立卫生检验数据管理系统是目前最简单实用的方法之一,适合各基层单位开发使用。 展开更多
关键词 access数据库 检验数据 管理系统
在线阅读 下载PDF
巧用Access和Excel实现对高校招生数据的处理 被引量:1
9
作者 李建飞 《闽西职业技术学院学报》 2017年第2期109-112,共4页
"全国普通高校招生管理系统"在实现远程录取中起到了关键的作用,但该系统的院校子系统版本,缺乏对录取信息的直观统计功能。综合利用通俗易懂的Access和Excel等办公自动化软件,可轻松实现对高校招生数据的处理,大幅提高工作... "全国普通高校招生管理系统"在实现远程录取中起到了关键的作用,但该系统的院校子系统版本,缺乏对录取信息的直观统计功能。综合利用通俗易懂的Access和Excel等办公自动化软件,可轻松实现对高校招生数据的处理,大幅提高工作效率。 展开更多
关键词 高校招生管理系统 数据处理 access EXCEL
在线阅读 下载PDF
用VB.NET和ACCESS实现监督监测报告报表编制系统
10
作者 蔡焕兴 龙湘 《环境监测管理与技术》 北大核心 2006年第4期42-44,共3页
将V isual basic.net 2003作为前台界面开发,Access2000作为后台数据库的监测数据管理系统用于环境监测报告和报表的编制时,既提高了报告的编制速度和质量,又提高了监测数据的安全性和监测数据应用查询效率。
关键词 VB.NET access 监测数据 系统管理
在线阅读 下载PDF
基于Access数据库船舶设备智能诊断系统 被引量:1
11
作者 蔡冬林 《南通航运职业技术学院学报》 2005年第4期31-35,共5页
船舶的轮机管理人员通常仅能解决一些普通的维修问题,大多数疑难、综合故障仍得靠船舶维修专家来处理。特别是现代化的船舶,机舱设备种类众多,结构复杂,自动化程度高,对轮机人员的专业水平要求更高,一旦出现故障,部分轮机人员往往束手无... 船舶的轮机管理人员通常仅能解决一些普通的维修问题,大多数疑难、综合故障仍得靠船舶维修专家来处理。特别是现代化的船舶,机舱设备种类众多,结构复杂,自动化程度高,对轮机人员的专业水平要求更高,一旦出现故障,部分轮机人员往往束手无策,这将会影响航行安全和航期,船舶公司每年要为此花费大量的成本。因此开发智能诊断系统并装船使用就显得非常必要。 展开更多
关键词 船舶设备 故障诊断 专家系统 access数据库
在线阅读 下载PDF
基于Delphi和Access开发使用林地数据管理系统 被引量:1
12
作者 张煜 《林业调查规划》 2013年第3期48-50,54,共4页
以Microsoft Access作为后台数据库,应用程序开发软件Delphi 2007开发了"使用林地数据管理系统",目的在于减轻数据统计的工作量,保证成果数据的准确性,完善数据档案的管理,进而提高工作效率。
关键词 使用林地 数据管理系统 数据库设计 access DELPHI
在线阅读 下载PDF
面向跨境的去中心分布式数字身份框架设计
13
作者 陈健 蔡智明 +1 位作者 齐佳音 方滨兴 《中国工程科学》 北大核心 2025年第1期88-97,共10页
进入数字化时代后,跨境数据流动衍生出数据主权要求,在个人数据隐私保护、灵活高效的授权访问之间矛盾凸显;数字身份框架作为解决这一矛盾的关键基础支撑,研究价值突出。本文在梳理跨境数字身份认证模型研究发展态势的基础上,提出了一... 进入数字化时代后,跨境数据流动衍生出数据主权要求,在个人数据隐私保护、灵活高效的授权访问之间矛盾凸显;数字身份框架作为解决这一矛盾的关键基础支撑,研究价值突出。本文在梳理跨境数字身份认证模型研究发展态势的基础上,提出了一种去中心化分布式跨境身份认证框架,引入数据分类分级策略,包含基于区块链的去中心化身份管理机制、动态数据属性分类与分级的通用认证池模型、隐私保护与访问控制策略3个核心模块,用于克服传统的集中式模型在跨境场景中的信任与合规性问题。进一步剖析了属性关联异构分级的效率和精度、跨境双方属性授权信任边界的博弈等跨境数字身份认证框架的应用难点,从认证框架应用封装的应用程序编程接口模型、认证框架的评估标准和实施路径等方面出发完善了相应解决方案。相关框架设计方案及发展理念,不仅为跨境数字身份认证提供了实践参考,而且为构建跨境数据流动的统一标准和安全规范提供了新的技术思路与实施路径。 展开更多
关键词 跨境数据 去中心化数字身份 分布式系统 隐私保护 访问控制 区块链技术
在线阅读 下载PDF
基于ACCESS的仓储管理系统的设计 被引量:3
14
作者 周茜 兰羽 《电子设计工程》 2013年第23期47-49,共3页
为了实现企业产品管理的系统化、规范化和自动化,从而提高企业管理效率。针对中小企业仓储产品管理情况,以ACCESS软件为开发平台,设计了仓储产品信息管理系统。系统经测试,运行效果良好,数据准确性高,而且具有界面美观、操作简单、安全... 为了实现企业产品管理的系统化、规范化和自动化,从而提高企业管理效率。针对中小企业仓储产品管理情况,以ACCESS软件为开发平台,设计了仓储产品信息管理系统。系统经测试,运行效果良好,数据准确性高,而且具有界面美观、操作简单、安全性高。设计的管理系统提高了产品管理流通效率,为中小企业仓储产品管理提供了一种仓储产品管理平台,实现了企业产品管理的信息化。 展开更多
关键词 access软件 仓储管理系统 E-R模型 数据库
在线阅读 下载PDF
Access数据库在高校招生管理系统中的应用
15
作者 原民民 《职业技术教育》 2006年第35期37-38,共2页
基于Access数据库系统可设计出一个不依赖于当前数据库的通用数据库报表,方便输出符合学校实际的通知书和信封的格式。其具体操作包括打开数据库、设置表间关系、建立查询、制作报表等内容。
关键词 高等学校 招生管理系统 access数据库
在线阅读 下载PDF
浅谈基于VB与ACCESS的应用程序体系的安全问题 被引量:1
16
作者 黄雅琼 《电脑知识与技术》 2013年第11X期7398-7399,7407,共3页
VB是MicroSoft公司推出的可视化编程软件,虽然采用它的数据控件和绑定控件项可以对数据库进行操作,但是在应用程序运行的时候,VB中的控件并不能从底层实现对数据库的所有操作,Access是MicroSoft公司研发的数据库管理系统,所以ACCESS和V... VB是MicroSoft公司推出的可视化编程软件,虽然采用它的数据控件和绑定控件项可以对数据库进行操作,但是在应用程序运行的时候,VB中的控件并不能从底层实现对数据库的所有操作,Access是MicroSoft公司研发的数据库管理系统,所以ACCESS和VB相结合的应用,是一种实用性很强的技术方案。数据库的主要任务是存储信息和管理信息,而这些信息往往对于人来说极具隐秘性,所以这些信息的安全问题成为人们最关心的问题之一。数据库作为信息的聚集体,它的安全性问题也就成为了信息安全的最大挑战。Access是一种关系型数据库管理系统,它是一种桌面应用程序,并不是Web应用程序,所以Access在网络环境中会存在很多安全隐患,该文从这些安全隐患入手,做了一些探讨,并且提出了几种解决方案,希望能增强信息管理体系的数据库安全性。 展开更多
关键词 access VB 数据库 信息管理系统 数据安全
在线阅读 下载PDF
基于Delphi+Access的会议签到系统设计及实现
17
作者 潘承斌 《电脑编程技巧与维护》 2011年第10期25-27,共3页
介绍一种基于Delphi+Access的会议签到系统的设计及实现方案,并给出了相应的系统结构图与软件流程图和部分程序源代码。
关键词 会议签到系统 DELPHI access 数据库
在线阅读 下载PDF
一种基于小数延时滤波器的时间同步方法
18
作者 李超 《电讯技术》 北大核心 2025年第4期596-601,共6页
在时分多址战术数据链通信系统中,端机发送延时抖动将造成时间同步精度下降。为解决该问题,提出了一种基于小数延时滤波器的时间同步方法。首先,使用硬件描述语言设计相位检测电路,以获取基带信号发送延时;然后,利用拉格朗日插值算法构... 在时分多址战术数据链通信系统中,端机发送延时抖动将造成时间同步精度下降。为解决该问题,提出了一种基于小数延时滤波器的时间同步方法。首先,使用硬件描述语言设计相位检测电路,以获取基带信号发送延时;然后,利用拉格朗日插值算法构造小数延时滤波器;接着,将相位检测电路与小数延时滤波器相结合,以补偿发送延时;最后,通过现场可编程门阵列对该方法进行实现,并搭建实物测试环境,验证所提方法的有效性。实验结果表明,该方法可有效解决发送延时抖动问题,时间同步精度提高了4.6 ns。 展开更多
关键词 战术数据链通信系统 时分多址(TDMA) 往返校时 时间同步 小数延时滤波器
在线阅读 下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
19
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data Security Authentication access control In-network data sharing Information-centric network
在线阅读 下载PDF
Quick System-Level DDR3 Signal Integrity Simulation Research 被引量:2
20
作者 Run-Jing Zhou Yuan-Yuan Hao Jin-Song Hu 《Journal of Electronic Science and Technology》 CAS 2013年第3期286-290,共5页
---Double data rate synchronous dynamic random access memory (DDR3) has become one of the most mainstream applications in current server and computer systems. In order to quickly set up a system-level signal integri... ---Double data rate synchronous dynamic random access memory (DDR3) has become one of the most mainstream applications in current server and computer systems. In order to quickly set up a system-level signal integrity (SI) simulation flow for the DDR3 interface, two system-level SI simulation methodologies, which are board-level S-parameter extraction in the frequency-domain and system-level simulation assumptions in the time domain, are introduced in this paper. By comparing the flow of Speed2000 and PowerSI/Hspice, PowerSI is chosen for the printed circuit board (PCB) board-level S-parameter extraction, while Tektronix oscilloscope (TDS7404) is used for the DDR3 waveform measurement. The lab measurement shows good agreement between simulation and measurement. The study shows that the combination of PowerSI and Hspice is recommended for quick system-level DDR3 SI simulation. 展开更多
关键词 Index Terms--Double data rate synchronousdynamic random access memory HSPICE PowerSI signal integrity system-level signal integrity simulation.
在线阅读 下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部