共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
ZHANGWei-feng XUBao-wen ZHOUXiao-yu 《武汉大学学报:自然科学英文版》2004,9(5):561-568
Web search engines are very useful information service tools in the Internet. The current web search engines produce search results relating to the search terms and the actual information collected hy them. Since the selections of the search results cannot affect the future ones. they may not cover most people‘s interests. In this paper, feedback informarion produced by the users‘ accessing lists will be represented By the rough set and can reconstruct the query string and influence the search results. And thus the search engines can provide self-adaptability. 相似文献
3.
Design and Implementation of FAQ Automatic Return System Based on Similarity Computation 总被引:1,自引:0,他引:1
ZHANG Liang CHEN Zhao-xiong HUANG He-yan 《武汉大学学报:自然科学英文版》2006,11(1):138-142
FAQ (frequently asked question) is widely used on the Internet, but most FAQ's asking and answering are not automatic. This paper introduces the design and imple mentation of a FAQ automatic return system based on semantic similarity computation, including computation model choo sing, FAQ characters analyzing, FAQ data formal expressing, feature vector indexing, and weight computing and so on. According to FAQ features of sentence length short, two mapping, strong domain characteristics etc. Vector Space Model with special semantic process was selected in system, and corresponding algorithm of similarity computation was proposed too. Experiment shows that the system has a good performance for high frequent and common questions. 相似文献
4.
Orientl: A strategy of Web information integration 总被引:1,自引:1,他引:0
YILei MENGXiao-feng HUDong-dong YUJun-tao LIYu 《武汉大学学报:自然科学英文版》2004,9(5):659-664
We propose the OrientI approach for effectively building flexible applications on information integration. The system presents a fully visual development environment tobuild applications. With Orient I system, a user only needs to concentrate on the composition of components for building the InterPlan. and the detailed underlying operations and data streams are invisible to the user. A prototype system has been implemented and has partially proved the convenience hrought by the Orient] approach. 相似文献
5.
XU Lei XU Baowent 《武汉大学学报:自然科学英文版》2006,11(3):561-566
Forms enhance both the dynamic and interactive abilities of Web applications and the system complexity. And it is especially important to test forms completely and thoroughly. Therefore, this paper discusses how to carry out the form testing by different methods in the related testing phases. Namely, at first, automatically abstracting forms in the Web pages by parsing the HTML documents; then, ohtai ning the testing data with a certain strategies, such as by requirement specifications, by mining users' hefore input informarion or by recording meehanism; and next executing the testing actions automatically due to the well formed test cases; finally, a case study is given to illustrate the convenient and effective of these methods. 相似文献
6.
YAOYu YUGe GAOFu-xiang 《武汉大学学报:自然科学英文版》2005,10(1):115-118
An MLP(Multi-Layer Perceptron)/ Elman neural network is proposed in this paper, which realizes classification with memory of past events using the real-time classification of MI.P and the memorial functionality of Elman. The system‘s sensitivity for the memory of past events can be easily reconfigured without retraining the whole network. This approach can be used for both misuse and anomaly detection system. The intrusion detection systems(IDSs) using the hybrid MLP/Elman neural network are evaluated by the intrusion detection evaluation data sponsored by U. S. Defense Advanced Research Projects Agency (DARPA). The results of experiment are presented in Receiver Operating Characteristic (ROC) curves. The capabilites of these IDSs to identify Deny of Service(DOS) and probing attacks are enhanced. 相似文献
7.
As our best knowledge, in the Publish/Subscribe application environment, few research work has been done on the dissemination and routing of compressed XML (extended markup language) data. A high-speed compressed XML data routing and dissemination framework BloomRouter is proposed. In BloomRouter, a Bloom Filter based prefilte ring mechanism is used to filter out compressed XML elements that users do not care; after that an interval tree dis seminator forwards target elements to the corresponding end users by matching the incomming compressed XML elements with indexed users' query regions. Based on this framework, we can efficiently filter/query the compressed incoming XML data, and then route the query result to the corresponding subseriber. 相似文献
8.
Wigner frequency point slice analysis of superposition data for phased-array ground penetrating radar 总被引:1,自引:0,他引:1
ZOULian CHENShu-zhen YANGShen WEIDan XIAOBo-xun 《武汉大学学报:自然科学英文版》2004,9(6):904-908
According to the frequency property of Phasedarray ground penetrating radar (PGPR), this paper gives a frequency point slice method based on Wigner time-frequency analysis. This method solves the problem of analysis for the PGPR‘s superposition data and makes detecting outcome simpler and detecting target more recognizable. At last, the analytical, results of road test data of the Three Gorges prove the analytical method efficient. 相似文献
9.
ZHANG Hua YUAN Zheng WEN Qiaoyan 《武汉大学学报:自然科学英文版》2006,11(6):1915-1918
Zhou et al give an attack on Ham's modified authenticated multi-key agreement protocol, and give a protocol that can prevent the unknown key-share attack. The paper points out that the protocol is vulnerable to a concatenation attack. This paper proposes an improved authenticated multi-key agreement protocol which shows how to make Harn's protocol more secure by modifying the signature and verification. And this protocol can escape the concatenation attack. 相似文献
10.
A New Mechanism Based on Similar Clouds Watermark for Database's Information Security 总被引:2,自引:0,他引:2
HUANGMin CAOJia-heng PENGZhi-yong ZENGCheng 《武汉大学学报:自然科学英文版》2004,9(4):415-419
This paper studies the digit watermark technology of numeric attributes in relational database for database‘s information security. It proposes a new mechanism based on similar clouds watermark and gives the concept of similar clouds. The algorithm SCWA that can insert the meaning wa-termark and detect it from the watermarked data is described. The mechanism can effectively and broadly scatter the watermark in the database; therefore the watermark is very robust. 相似文献
11.
ZHANG Guangwei KANG Jianchu LUO Ziqiang MENG Xiangyi FANG Peici LI Deyi 《武汉大学学报:自然科学英文版》2006,11(6):1457-1461
Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a formalized model of subjective trust is introduced by which we can transform between qualitative reputation and quantitative voting data. The present paper brings forward algorithms to compute direct trust and recommender trust. Further more, an effective similarity measuring method used to distinguish two users' reputation on knowledge level is also proposed. The given model properly settles the uncertainty and fuzziness properties of subjective trust which is always the weakness of traditional subjective trust model, and provides a step in the direction of proper understanding and definition of human trust. 相似文献
12.
TrustedRBAC is a scalable, decentralized trustmanagement and access control mechanism for systems that span multiple autonomous
domains. We utilize X. 509 attribute certificates to define trust domains, roles to define controlled activities, and role
delegation across domains to represent permissions to these activities. This paper describes the TrustedRBAC model and its
scalable design and implementation.
Foundation item: Supported by the National Key Technologies R&D Program of China (2002BA103A04)
Biography: WANG Zhi-gang (1977-), male, Ph. D Candidate, research direction: beterogeneous information integration, security of distributed
system. 相似文献
13.
LIUShuai-dong CHENShi-hong 《武汉大学学报:自然科学英文版》2004,9(5):542-546
The demand for individualized teaching from Elearning websites is rapidly increasing due to the huge differences existed among Web learners. A method for clusteringWeb learners based on rough set is proposed. The basic ideaof the method is to reduce the learning auributes prior to clustering, and therefore the clustering of Web learners iscarried out in a relative low-dimensional space. Using thismethod, the E-learning websites can arrange correspondingleaching content for different clusters of learners so that thelearners‘ individual requirements can be more satisfied. 相似文献
14.
TUGuo-qing ZHANGHuan-guo WANGLi-na YUDan-dan 《武汉大学学报:自然科学英文版》2005,10(1):35-38
To build a trusted platform based on Trusted Computing Platform Alliance (TCPA)‘s recommendation, we analyze the integrity mechanism for such a PC platform in this paper. By combinning access control model with information flow model, we put forward a combined process-based lattice model to enforce security. This model creates a trust chain by which we can manage a series of processes from a core root of trust module to some other application modules. In the model,once the trust chain is created and managed correctly,the integrity of the computer‘s hardware and sofware has been mainfained, so does the confidentiality and authenticity. Moreover, a relevant implementation of the model is explained. 相似文献
15.
LIANG Wei~ HU Hongying~ GU Xin~ CHE Yuling~ WANG Hui~ GUO Yufeng~ SONG Yudong~ . State Key Laboratory of Freshwater Ecology Biotechnology Institute of Hydrobiology Chinese Academy of Sciences Wuhan Hubei China . Environment Simulation Pollution Control State Key Joint Laboratory Department of Environmental Science Engineering Tsinghua University Beijing China 《武汉大学学报:自然科学英文版》2006,11(3):737-741
0 IntroductionMioclroogincuatlri pernotsce pslsaeys afo vrer wyais tmepwoarttaernt t rroelaetmine nbti- .A widerange of micronutrientsis required byactiva-ted sludge[1-5]. Adequate trace nutrient concentra-tions ,including metal ions and vitamins , are re-quiredtosupport all the genera presentinthe activa-ted sludgetreatment systemfor a diverse communityto survive. The lack of specific nutrients may resultin an unbalanced mixed culture,leading to poor-quality effluent , reduced treatment effic… 相似文献
16.
WANG Hui LIU Shufen ZHANG Xinjia 《武汉大学学报:自然科学英文版》2006,11(6):1498-1502
This paper presents a novel probability generation algorithm to predict attacks from an insider who exploits known system vulnerabilities through executing authorized operations. It is different from most intrusion detection systems (IDSs) because these IDSs are inefficient to resolve threat from authorized insiders. To deter cracker activities, this paper introduces an improved structure of augmented attack tree and a notion of "minimal attack tree", and proposes a new generation algorithm of minimal attack tree. We can provide a quantitative approach to help system administrators make sound decision. 相似文献
17.
PEI Shihui ZHAO Hongwei ZHAO Yongzhe 《武汉大学学报:自然科学英文版》2006,11(6):1525-1528
A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can't be solved with polynomial time algorithm. 相似文献
18.
19.
With the frequent information accesses from users to the Internet, it is important to organize and allocate information resources
properly on different web servers. This paper considers the following problem: Due to the capacity limitation of each single
web server, it is impossible to put all information resources on one web server. Hence it is an important problem to put them
on several different servers such as: (1) the amount of information resources assigned on any server is less than its capacity;
(2) the access bottleneck can be avoided. In order to solve the problem in which the access frequency is variable. this paper
proposes a dynamic optimal modeling. Based on the computational complexity results, the paper further focuses on the genetic
algorithm for solving the dynamic problem. Finally we give the simulation results and conclusions.
Foundation item: Supported by the Hi-tech Research and Development Program of China(2002AAlZ1490)
Biography: Li Yuan-xiang( 1963-), male, Prof, research direction; parallel computing,evolutionary hardware. 相似文献
20.
GU Chun-xiang PAN Heng ZHU Yue-fei 《武汉大学学报:自然科学英文版》2006,11(1):193-197
ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem. 相似文献