首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 484 毫秒
1.
A vision based query interface annotation meth od is used to relate attributes and form elements in form based web query interfaces, this method can reach accuracy of 82%. And a user participation method is used to tune the result; user can answer "yes" or "no" for existing annotations, or manually annotate form elements. Mass feedback is added to the annotation algorithm to produce more accurate result. By this approach, query interface annotation can reach a perfect accuracy.  相似文献   

2.
Association rule mining is an important issue in data mining. The paper proposed an binary system based method to generate candidate frequent itemsets and corresponding supporting counts efficiently, which needs only some operations such as "and", "or" and "xor". Applying this idea in the existed distributed association rule mining al gorithm FDM, the improved algorithm BFDM is proposed. The theoretical analysis and experiment testify that BFDM is effective and efficient.  相似文献   

3.
This paper presents a novel probability generation algorithm to predict attacks from an insider who exploits known system vulnerabilities through executing authorized operations. It is different from most intrusion detection systems (IDSs) because these IDSs are inefficient to resolve threat from authorized insiders. To deter cracker activities, this paper introduces an improved structure of augmented attack tree and a notion of "minimal attack tree", and proposes a new generation algorithm of minimal attack tree. We can provide a quantitative approach to help system administrators make sound decision.  相似文献   

4.
The demand for individualized teaching from Elearning websites is rapidly increasing due to the huge differences existed among Web learners. A method for clusteringWeb learners based on rough set is proposed. The basic ideaof the method is to reduce the learning auributes prior to clustering, and therefore the clustering of Web learners iscarried out in a relative low-dimensional space. Using thismethod, the E-learning websites can arrange correspondingleaching content for different clusters of learners so that thelearners‘ individual requirements can be more satisfied.  相似文献   

5.
Statistical properties of Chinese semantic networks   总被引:1,自引:0,他引:1  
Almost all language networks in word and syntactic levels are small-world and scale-free. This raises the questions of whether a language network in deeper semantic or cognitive level also has the similar properties. To answer the question, we built up a Chinese semantic network based on a treebank with semantic role (argument structure) annotation and investigated its global statistical properties. The results show that although semantic network is also small-world and scale-free, it is different from syntactic network in hierarchical structure and K-Nearest-Neighbor correlation.  相似文献   

6.
Building Intrusion Tolerant Software System   总被引:1,自引:0,他引:1  
In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploiting N-version module threshold method in con-structing multilevel secure software architecture, by detecting with hash value, by placing an ““““““““antigen““““““““ word next to the return address on the stack that is similar to human immune system, and by adding ““““““““Honey code““““““““ nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured.  相似文献   

7.
This paper presents a lighter protocol, and it removes the multicast burdens from RSVP to adapt to unicast applications. At the same time, when RSVP is used in wireless networks, some issues about mobility raise popular concerns. The proposed protocol a lightweight mobile RSVP protocol, solves the problems by the following mechanisms: changeless flow identifier, a new state management and "refresh" mechanism.  相似文献   

8.
A family of binary sequences were constructed by using an elliptic curve and its twisted curves over finite fields. It was shown that these sequences possess "good" cryptographie properties of 0-1 distribution, long period and large linear complexity. The results indicate that such se quences provide strong potential applications in cryptography.  相似文献   

9.
The mid-long term hydrology forecasting is one of most challenging problems in hydrological studies. This paper proposes an efficient dynamical system prediction model using evolutionary computation techniques. The new model overcomes some disadvantages of conventional hydrology forecasting ones. The observed data is divided into two parts: the slow “smooth and steady” data, and the fast “coarse and fluctuation” data. Under thedivide and conquer strategy, the behavior of smooth data is modeled by ordinary differential equations based on evolutionary modeling, and that of the coarse data is modeled using gray correlative forecasting method. Our model is verified on the test data of the mid-long term hydrology forecast in the northeast region of China. The experimental results show that the model is superior to gray system prediction model (GSPM). Foundation item: Supported by the National Natural Science Foundation of China ( 60133010, 70071042, 60073043) Biography: Zou Xiu-fen(1966-),female,Associate professor, research direction:evolutionary computing, parallel computing.  相似文献   

10.
In this study, we investigated how the negative emotional arousal induced by watching a number of unpleasant images altered the concentration of secretory immunoglobulin A (SlgA) in saliva. Although our results found discrepancies among participants' SIgA concentration (i.e. some participants' SlgA decreased after watching unpleasant pictures, whereas others increased), further analysis revealed correlations among participants' changes in SIgA concentration, their general coping styles and their actual strategies for emotion regulation when perceiving unpleasant pictures, and the event-related potentials (ERPs) associated with viewing unpleasant pictures. The participants whose SIgA increased after watching unpleasant pictures (the "Increasers") had higher positive coping scores in the Trait Coping Styles Questionnaire (TCSQ) than those whose SIgA decreased (the "Decreasers"). Also, relative to the "Decreasers", the "Increasers" tended to use more emotion regulation strategies, particularly with extremely negative pictures. The amplitude of their late positive potentials (LPPs) exhibited a reverse dissociation pattern for extremely negative pictures versus least negative ones and was related to the cognitive evaluation of the stimuli's meaning. In sum, this research revealed the psychological mechanisms by which negative emotional states influence the immune system and the related ERP changes.  相似文献   

11.
A novel image hiding method based on the correlation analysis of bit plane is described in this paper. Firstly, based on the correlation analysis, different bit plane of a secret image is hided in different bit plane of several different open images. And then a new hiding image is acquired by a nesting "Exclusive-OR" operation on those images obtained from the first step. At last, by employing image fusion technique, the final hiding result is achieved. The experimental result shows that the method proposed in this paper is effec rive.  相似文献   

12.
The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.  相似文献   

13.
One-dimensional carbon nano-materials (ODCNMs) synthesized from ethanol flames exhibit various agglomerated morphologies, such as "chrysanthemum-like", "hairball-like" or "orange-peel-like", "vertically aligned" and "wrinkling-pileup". The present work studied the agglomerating process and the growth mechanism by using scanning electron microscopy (SEM) and transmission electron microscopy (TEM). It is thought that the size and distribution of the catalyst particles produced from pretreatment of the substrates play a key role during the formation of agglomerations. It is expected that the steady growth of ODCNMs in flames will be improved through the preparation of the catalysts.  相似文献   

14.
According to the principle, “The failure data is the basis of software reliabilityanalysis”, we built a software reliability expert system (SRES) by adopting the artificialtechnology. By reasoning out the conclusion from the fitting results of failure data of asoftware project, the SRES can recommend users “the most suitable model” as a softwarereliability measurement model. We believe that the SRES can overcome the inconsistency inapplications of software reliability models well. We report investigation results of singularity and parameter estimation methods of models, LVLM and LVQM. Foundation item: Supported by the National Natural Science Foundation of China Biography: Biography: XU Ren-zuo (1946-), male, Professor, Research interests include software engineering, software reliability engineering, software quality guarantee technology, reliability theory, software safety and security.  相似文献   

15.
Tomé and Miranda’s climate trend turning discriminatory model is used to identify the spatial-temporal characteristics of the interdecadal turning of winter/summer climate modes at stations and in eight sub-areas over Chinese mainland based on the 1961–2000 observations. It is found that the stations with close occurrence years of the interdecadal trend turning (ITT) and coincident trends after the ITT exhibit a zonal distribution. A view is accordingly proposed that the interdecadal turnings of climate modes in China have remarkably regional structures. The research results show that after the early 1980s, winter climate over Chinese mainland overall trends towards a “warm-wet” mode, while summer climate had an abrupt change into “warm wet” mode in the late 1980s, suggesting that the time of the “warm-wet” mode turning for winter climate is earlier than that for summer climate. The regional characteristics and test results of the ITTs in eight sub-areas suggest that winter climate exhibits a distinctive “warm-dry” trend in North China after the late 1970s, and a slight “warm-dry” trend in Northeast China, South China, and Southwest China after the late 1980s. A “warm-wet” trend appears in the rest four sub-areas (the middle and lower reaches of the Yangtze River and the Huaihe River Valley, briefly Jianghuai, the east of the Tibetan plateau, and the east and west of Northwest China) after the early 1980s. The summer climate trends towards a “warm-dry” mode in Northeast China, North China and the east of Northwest China after the late 1980s, but a “warm-wet” mode appears in Southwest China and the east of the Tibetan plateau after the middle 1970s, as well as in Jianghuai and the west of Northwest China after the early 1980s. Specially, summer climate in South China started a “cold-wet” trend in 1984.  相似文献   

16.
According to the principle, “The failure data is the basis of software reliability analysis”, we built a software reliability expert system (SRES) by adopting the artificial intelligence technology. By reasoning out the conclusion from the fitting results of failure data of a software project, the SRES can recommend users “the most suitable model” as a software reliability measurement model. We believe that the SRES can overcome the inconsistency in applications of software reliability models well. We report investigation results of singularity and parameter estimation methods of experimental models in SRES. Foundation item: Supported by the National Natural Science Foundation of China Biography: XU Ren-zuo (1946-), male, Professor, research interests include software engineering software reliability engineering, software quality guarantee technology, reliability theory, software safety and security.  相似文献   

17.
The floristic elements and the geographical distribution are analyzed in this paper based on statistics of elements of rare and endangered plants in Tibet. The results have been gained as following:① According to ““““the National Important Wild Conservative Plants List (List 1)““““ and ““““the National Important Wild Conservative Plants List (List 1)““““, there are a total of 54 plant species (48 genera and 33 families); ② The geographical elements are very complicated in Tibet with 12 of 15 distribution patterns of genera classified byacademician Wu; ③ There are obvious temperate genera with 28 genera accounting for 60.40% of the total genera; ④ There are abundant endemic speciesaccounting for 18.52% of total species but poor endemic genera; ⑤ The geographical distribution is uneven and a great of species distribute in the areas be-tween 1 000 m and 3 500 m above sea level; ⑥ To protect the rare and endangered plants efficiently, six conservation measures are proposed, and 35 species are suggested for the conservative plants of the autonomous conservation level.  相似文献   

18.
Focused crawlers are important tools to support applications such as specialized Web portals, online searching, and Web search engines. A topic driven crawler chooses the best URLs and relevant pages to pursue during Web crawling. It is difficult to deal with irrelevant pages. This paper presents a novel focused crawler framework. In our focused crawler, we propose a method to overcome some of the limitations of dealing with the irrelevant pages. We also introduce the implementation of our focused crawler and present some important metrics and an evaluation function for ranking pages relevance. The experimental result shows that our crawler can obtain more "important" pages and has a high precision and recall value.  相似文献   

19.
0 IntroductionMolecularimprinting[1 ] isatechniquebasedoncreatingcavities,inahighlycross linkedpolymermatrix ,thatcorrespondtothesizeandshapeoftheprintmolecule .Themolecularrecognitioneffectisaconsequenceofthepresenceinthepolymerizationmixtureoftemplatemoleculescapableofestab lishingnon covalentinteractionswithmonomerandcross linkers.Molecularlyimprintedpolymers (MIPs)havebeenusedaschromatographicstationaryphases[2 ,3] includingcapillaryelec trochromatography ,asselectivematerialsforbiosenso…  相似文献   

20.
Although Meiyu rainfall has its in-phase spatial variability over the Changjiang-Huaihe River Valley (CHRV) in most years, it is distributed in some years like a seesaw to the north and south of the Changjiang River, when the precipitation tends to be nearly normal throughout the valley, which would inevitably increase difficulties of making short-term prediction of the rainfall. For this reason, EOF analysis is made on 15 related stations’ precipitation from June to July during 1951─2004, revealing that the EOF2 mode shows largely a north-south seesaw-like pattern, and thereby classifying Meiyu patterns into two types: "northern drought and southern flood (NDSF)" and "northern flood and southern drought (NFSD)". Afterwards, the authors investigated ocean-atmospheric characteristics when these two anomalous types occured using the NCEP reanalysis (version 1) and the extended reconstructed SSTs (version 2). The results show that in the NDSF years, the low-level frontal area and moisture convergence center lie more southward, accompanied by weaker subtropical summer mon- soon over East Asia, with the western Pacific subtropical high and 200 hPa South Asia High being more southward. Both the Northern and Southern Hemisphere Annular Modes are stronger than normal in preceding February; SST is higher off China during boreal winter and spring and the opposite happens in the NFSD years. Also, this seesaw-form Meiyu rainfall distribution might be affected to some degree by the previous ENSO event.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号