期刊文献+
共找到1,637篇文章
< 1 2 82 >
每页显示 20 50 100
Deep Learning Social Network Access Control Model Based on User Preferences
1
作者 Fangfang Shan Fuyang Li +3 位作者 Zhenyu Wang Peiyu Ji Mengyi Wang Huifang Sun 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1029-1044,共16页
A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social netw... A deep learning access controlmodel based on user preferences is proposed to address the issue of personal privacy leakage in social networks.Firstly,socialusers andsocialdata entities are extractedfromthe social networkandused to construct homogeneous and heterogeneous graphs.Secondly,a graph neural networkmodel is designed based on user daily social behavior and daily social data to simulate the dissemination and changes of user social preferences and user personal preferences in the social network.Then,high-order neighbor nodes,hidden neighbor nodes,displayed neighbor nodes,and social data nodes are used to update user nodes to expand the depth and breadth of user preferences.Finally,a multi-layer attention network is used to classify user nodes in the homogeneous graph into two classes:allow access and deny access.The fine-grained access control problem in social networks is transformed into a node classification problem in a graph neural network.The model is validated using a dataset and compared with other methods without losing generality.The model improved accuracy by 2.18%compared to the baseline method GraphSAGE,and improved F1 score by 1.45%compared to the baseline method,verifying the effectiveness of the model. 展开更多
关键词 Graph neural networks user preferences access control social network
在线阅读 下载PDF
Framework to Model User Request Access Patterns in the World Wide Web
2
作者 Richard Hurley Robert Sturgeon 《Journal of Software Engineering and Applications》 2024年第2期69-88,共20页
In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pa... In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns. 展开更多
关键词 Performance Modelling World Wide Web sIMULATION user Request access Patterns FRAMEWORK
在线阅读 下载PDF
Factors Influence Hanoians’ Choice of Non-Motorized Transport Mode to Access Bus Stations
3
作者 Ngo Trung Phuong Masahiko Kikuchi +1 位作者 Aya Kojima Hisashi Kubota 《Journal of Transportation Technologies》 2024年第3期372-389,共18页
Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized tr... Hanoi’s rapid urbanization has led to a surge in private vehicle ownership, particularly motorcycles, amidst inadequate public transportation infrastructure. Despite government efforts, many still prefer motorized transport, citing mobility and safety concerns, exacerbated by insufficient pedestrian infrastructure. This study examines the motivations behind this reliance on motorized vehicles, particularly motorcycles, in Hanoi. Findings reveal safety and convenience as primary factors driving motorized transport use, especially for accessing bus stations. Economic incentives could promote non-motorized travel and public transport adoption. Policy implications highlight the importance of addressing economic factors and improving access infrastructure to manage motorized vehicle reliance and foster sustainable urban mobility in Hanoi. 展开更多
关键词 access Mode Choice Non-Motorized Vehicles Motorized Vehicles Bus user Urban Transport Behavior
在线阅读 下载PDF
Resource Allocation Based on User Pairing and Subcarrier Matching for Downlink Non-Orthogonal Multiple Access Networks 被引量:1
4
作者 Zhixin Liu Changjian Liang +2 位作者 Yazhou Yuan Kit Yan Chan Xinping Guan 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第3期679-689,共11页
The traditional orthogonal multiple access(OMA)is unable to satisfy the needs of large number of smart devices.To increase the transmission rate in the limited spectrum resource,implementation of both non-orthogonal m... The traditional orthogonal multiple access(OMA)is unable to satisfy the needs of large number of smart devices.To increase the transmission rate in the limited spectrum resource,implementation of both non-orthogonal multiple access(NOMA)and successive interference cancelation(SIC)is essential.In this paper,an optimal resource allocation algorithm in NOMA is proposed to maximize the total system rate in a multi-sector multi-subcarrier relay-assisted communication network.Since the original problem is a non-convex problem with mixed integer programming which is non-deterministic polynomial-time(NP)-hard,a three-step solution is proposed to solve the primal problem.Firstly,we determine the optimal power allocation of the outer users by using the approach of monotonic discrimination,and then the optimal user pairing is determined.Secondly,the successive convex approximation(SCA)method is introduced to transform the non-convex problem involving central users into convex one,and the Lagrangian dual method is used to determine the optimal solution.Finally,the standard Hungarian algorithm is utilized to determine the optimal subcarrier matching.The simulation results show that resource allocation algorithm is able to meet the user performance requirements with NOMA,and the total system rate is improved compared to the existing algorithms. 展开更多
关键词 Non-orthogonal multiple access(NOMA) power control rate maximization subcarrier matching user pairing
在线阅读 下载PDF
Remote Access Communications Security: Analysis of User Authentication Roles in Organizations 被引量:2
5
作者 Ezer Osei Yeboah-Boateng Grace Dzifa Kwabena-Adade 《Journal of Information Security》 2020年第3期161-175,共15页
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario... Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication. 展开更多
关键词 Remote access Communications security user Authentication 2FA Virtual Private Network (VPN) TELECOMMUTING Threats VULNERABILITIEs
在线阅读 下载PDF
Study on Accessible Long-Term Care Mobile Application for Visually Impaired Users
6
作者 Kan C. W. Russ 《Computer Technology and Application》 2016年第5期261-268,共8页
A result revealed by the Department of Statistics, 29,000 elderly people have registered for Visually Impaired Card in 2014, which was 51.2% of all visually impaired people. With annual growth rate of 1.56%, this numb... A result revealed by the Department of Statistics, 29,000 elderly people have registered for Visually Impaired Card in 2014, which was 51.2% of all visually impaired people. With annual growth rate of 1.56%, this number increased yearly by 1,100 people. According to WHO, 285 million people worldwide were estimated to be visually impaired, which is 4.24% of overall population in 2012. From age distribution point of view, most visually impaired people, accounted for 2.76% of overall population, were above age 50. In average, there are 7 visually impaired people in every 100 people above 50 years old. In Taiwan, 549,000 people over age 50 are estimated to be visually impaired. Therefore we expect there is a large amount of visually impaired people. The main purpose of this research is to collect adaptability information on the cognitive model of senior visually impaired people on their work status, social participation status, and leisure activities via questionnaire survey. Furthermore, descriptive video service is used to as an accessible long-term care application for visually impaired senior users. To solve disability circumstances and improve home care quality through visually impaired APP POe (proof-of-concept). The result of this research will serve as an important basis for other researches in related study field, a reference for practice application. As a result in encouraging profit-seeking enterprises design a user oriented products. And even be an opening for mobile accessibility services benchmark on technology social care for disability and senior users. 展开更多
关键词 Mobile computing mobile accessibility UX design CareTech visually impaired users
在线阅读 下载PDF
Access XP数据库的安全性研究 被引量:2
7
作者 李海燕 《中国安全科学学报》 CAS CSCD 2005年第5期67-70,共4页
在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详... 在信息化时代来临、Internet高速发展的今天,信息资源的经济和社会价值越来越明显,而数据库系统所管理、存储的数据已成为各个部门宝贵的信息资源,所以其安全保密性是目前所迫切需要解决的问题。笔者从数据库的安全性、保密性的角度,详细地阐述了MicrosoftAccessXP数据库的安全机制;探讨了实现MicrosoftAccessXP数据库不同保护级别的各种方法;还讨论了共享级安全性和用户级安全性问题。 展开更多
关键词 access 安全性研究 XP MICROsOFT Internet 信息资源 信息化时代 数据库系统 安全保密性 安全性问题 社会价值 安全机制 保护级别 用户级 共享
在线阅读 下载PDF
基于Delphi/Access的C/S系统设计 被引量:2
8
作者 陈振庆 《广西右江民族师专学报》 2006年第3期68-72,共5页
C/S系统采用Access作后台数据库,具有性能稳定、数据交换迅速、数据安全、维护方便等特点,可视化编程语言Delphi具有丰富的编程环境、友好的界面、高速的编译器、强大的数据库开发功能,文章介绍了基于Delphi/Access的C/S系统软、硬件设... C/S系统采用Access作后台数据库,具有性能稳定、数据交换迅速、数据安全、维护方便等特点,可视化编程语言Delphi具有丰富的编程环境、友好的界面、高速的编译器、强大的数据库开发功能,文章介绍了基于Delphi/Access的C/S系统软、硬件设计方法和技术。 展开更多
关键词 DELPHI access C/s系统 应用程序服务器 客户程序
在线阅读 下载PDF
下行RIS-NOMA的用户集群方法 被引量:1
9
作者 彭艺 吴桐 杨青青 《中山大学学报(自然科学版)(中英文)》 CAS CSCD 北大核心 2024年第1期128-136,共9页
为提高用户分布非均匀的场景下可重构智能表面(RIS)辅助下行非正交多址(NOMA)通信系统的性能,提出了一种分布式RIS辅助下行NOMA的用户聚类方案。首先,采用自适应几何分布(AGD)聚类算法划分用户集群(UCs),从而为各UC匹配RIS。然后,利用... 为提高用户分布非均匀的场景下可重构智能表面(RIS)辅助下行非正交多址(NOMA)通信系统的性能,提出了一种分布式RIS辅助下行NOMA的用户聚类方案。首先,采用自适应几何分布(AGD)聚类算法划分用户集群(UCs),从而为各UC匹配RIS。然后,利用分式规划(FP)方法将非凸最大化频谱效率问题转换为凸优化问题。最后,为UC内用户逐级进行功率分配(PA)与被动波束形成(PB)。仿真结果表明,与谱聚类(SPC)、K均值(K-means)、高斯混合模型(GMM)聚类方案和正交多址(OMA)方案相比,在AGD方案下,功率对频谱效率提升了7%、14%、19%和42%的增益,反射面对频谱效率提升了16%、19%、26%和40%的增益。 展开更多
关键词 可重构智能表面 非正交多址 用户集群 分式规划
在线阅读 下载PDF
ACCESS中利用宏实现系统的多用户分角色登录 被引量:1
10
作者 姚一红 《办公自动化(综合月刊)》 2009年第5期52-53,共2页
用户标识与鉴别(Identification&Authentication)是系统为数据库提供的最外层的安全保护措施。一般来讲,用户标识与鉴别(系统登录)的实现需要计算机专业人员用编程语言来实现,考虑到ACCESS可以直接面向数据库的最终用户,而数据库最... 用户标识与鉴别(Identification&Authentication)是系统为数据库提供的最外层的安全保护措施。一般来讲,用户标识与鉴别(系统登录)的实现需要计算机专业人员用编程语言来实现,考虑到ACCESS可以直接面向数据库的最终用户,而数据库最终用户往往并非计算机的专业人员,本文介绍了一种在ACCESS数据库中不用编码而用宏对象实现的系统多用户分角色登录方法。 展开更多
关键词 access 多用户 分角色 登录
在线阅读 下载PDF
用VB6.0设计Access数据库的用户级安全管理模块
11
作者 罗彬 刘独玉 《渝州大学学报》 2001年第1期15-19,共5页
在分析了Access数据库安全的重要性的基础上 ,用VB6 .0开发了Access数据库的用户级安全管理模块 ,并详细地介绍了其实现的基本原理、主要过程和核心代码。
关键词 access数据库 用户级 安全管理 VB6.0 数据访问对象模型 密码 权限控制
在线阅读 下载PDF
基于ACCESS的用户信息系统框架设计与实现
12
作者 高恩勇 谢德银 《沧州师范学院学报》 2010年第3期113-115,126,共4页
现代的用户信息系统框架是在应用系统启动的时候出现"用户登录窗口",用户输入正确的登录信息后,单击"登录"按钮,出现系统主窗口,主窗口采用windos风格,即在主窗口界面中使用菜单栏和工具栏实现应用系统的各项功能... 现代的用户信息系统框架是在应用系统启动的时候出现"用户登录窗口",用户输入正确的登录信息后,单击"登录"按钮,出现系统主窗口,主窗口采用windos风格,即在主窗口界面中使用菜单栏和工具栏实现应用系统的各项功能。讨论了在Access环境下,用户应用系统框架的设计与实现的技术、技巧和方法。对于指导Access初学者,尤其是不会Access VBA编程的人员具有较高的应用参考价值。 展开更多
关键词 用户信息系统框架 MICROsOFT access 宏(Micro) 菜单(menu) 窗体(form)
在线阅读 下载PDF
ASP+Access的安全性研究 被引量:4
13
作者 谌爱文 施荣华 《微电子学与计算机》 CSCD 北大核心 2006年第6期106-108,共3页
随着计算机技术的发展,基于计算机网络的数据库应用系统越来越广泛,其安全保密性成为目前迫切需要解决的问题。为了更好地提高数据库的安全性,文章分析了Access数据库及ASP技术的安全问题,并给出了相应的解决方案。
关键词 access数据库 AsP 用户级安全系统 数据库安全管理
在线阅读 下载PDF
谈IIS下基于ASP技术和Access数据库网站的安全性 被引量:4
14
作者 陈瑞 《山西广播电视大学学报》 2010年第3期34-35,共2页
在IIS下基于ASP技术和Access数据库网站的建设中,会遇到很多安全问题,文章中详细阐述了ASP技术、Access数据库和IIS的安全漏洞,并给出了相应的解决方法和建议。
关键词 AsP access s 安全漏洞
在线阅读 下载PDF
基于C/S模式多层结构的在线岗位训练考试系统设计与Delphi/Access实现 被引量:4
15
作者 陈典斌 韩东霏 +1 位作者 曲桂英 韩岳洋 《计算机光盘软件与应用》 2013年第24期41-43,共3页
数字化学习与考试环境建设是岗位数字化训练建设的核心内容。利用开发工具Borland Delphi7.0开发出适用于多岗位的在线训练考试系统。采用C/S模式多层结构,使用Access数据库,在中间层采用大量的远程方法设计供客户端调用,实现训练考试... 数字化学习与考试环境建设是岗位数字化训练建设的核心内容。利用开发工具Borland Delphi7.0开发出适用于多岗位的在线训练考试系统。采用C/S模式多层结构,使用Access数据库,在中间层采用大量的远程方法设计供客户端调用,实现训练考试过程与管理的数字化、信息化和自动化。在线岗位训练考试系统是集数据库管理、随机选题与结果分析为一体,包含系统设置、考试、实时评分等功能模块,通过TCP/IP协议连接到考试服务器完成试卷提交和读取试卷。 展开更多
关键词 C s模式 多层结构 access 考试系统 DELPHI 随机选题 实时评分
在线阅读 下载PDF
基于C SHARP+ACCESS数据库“劳务费统计系统”的设计与实现 被引量:1
16
作者 李国芳 何建斌 《信息安全与技术》 2014年第2期74-77,81,共5页
随着高校办学规模的不断扩大和业务活动的不断拓展,高校教职工的数量也越来越多,高校教师劳务费管理变得更加复杂,传统的人工计算和审核状态效率低,已经明显不能适应现代教育管理要求。基于此,本文以广州医科大学卫生职业技术学院为研... 随着高校办学规模的不断扩大和业务活动的不断拓展,高校教职工的数量也越来越多,高校教师劳务费管理变得更加复杂,传统的人工计算和审核状态效率低,已经明显不能适应现代教育管理要求。基于此,本文以广州医科大学卫生职业技术学院为研究对象,结合了当前国内外有关劳务费系统的发展现状,根据学校的实际需求,并依托其现有的基础信息,开发了基于C/S结构的"劳务费统计系统"。开发语言是使用目前网络开发中使用较多的C Sharp,数据库采用Microsoft Office Access 2003。实际应用表明,该系统的实施极大地提高了教师劳务费管理的工作效率。 展开更多
关键词 高校教师 统计系统 access数据库 C sHARP C s架构
在线阅读 下载PDF
Analysis of cumulative handoff delay for graded secondary users in cognitive radio networks
17
作者 Zhang Lei 张雷 +2 位作者 宋铁成 吴名 胡静 《Journal of Southeast University(English Edition)》 EI CAS 2013年第2期111-117,共7页
According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respecti... According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respectively. It is assumed that SU1 has a higher priority to occupy the primary users' unutilized channels than SU2. A preemptive resume priority M/G/1 queuing network is used to model the multiple spectrum handoffs processing. By using a state transition probability matrix and a cost matrix, the average cumulative delays of SU1 and SU2 are calculated, respectively. Numerical results show that the more the primary user's traffic load, the more rapidly the SU2's cumulative handoff delay grows. Compared with the networks where secondary users are unitary, the lower the SUI's arrival rate, the more obviously both SUI's and SU2's handoff delays decrease. The admission access regions limited by the maximum tolerable delay can also facilitate the design of admission control rules for graded secondary users. 展开更多
关键词 cognitive radio network graded secondary users multiple spectrum handoffs cumulative handoff delay admission access region
在线阅读 下载PDF
关于Access2000的安全机制解析 被引量:2
18
作者 李川 李中 《西安航空技术高等专科学校学报》 2008年第1期64-65,67,共3页
Microsoft Access 2000数据库作为常用的桌面数据库软件,在中小型的数据库系统中得到了广泛的应用。针对Access 2000安全性能不高,探讨如何设置及提高Access 2000的安全性方法。
关键词 access 2000数据库 安全机制 用户级权限 加密或解密 工作组信息文件
在线阅读 下载PDF
Random Access and Resource Allocation for the Coexistence of NOMA-Based and OMA-Based M2M Communications 被引量:2
19
作者 Yali Wu Guixia Kang Ningbo Zhang 《China Communications》 SCIE CSCD 2017年第6期43-53,共11页
In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we pro... In the future fifth generation(5G) systems,non-orthogonal multiple access(NOMA) is a promising technology that can greatly enhance the network capacity compared to orthogonal multiple access(OMA) .In this paper,we propose a novel random access(RA) and resource allocation scheme for the coexistence of NOMA-based and OMAbased machine-to-machine(M2M) communications,which aims at improving the number of successful data packet transmissions and guaranteeing the quality of service(Qo S) (e.g.,the minimum data rate requirement) for M2 M communications.The algorithm of joint user equipment(UE) paring and power allocation is proposed for the coexisting RA(i.e.,the coexistence of NOMA-based RA and OMA-based RA) .The resource allocation for the coexisting RA is investigated,thus improving the number of successful data packet transmissions by more efficiently using the radio resources.Simulation results demonstrate that the proposed RA and resource allocation scheme outperforms the conventional RA in terms of the number of successful data packet transmissions,thus is a promising technology in future M2 M communications. 展开更多
关键词 machine-to-machine communications random access non-orthogonal multiple access user equipment paring power allocation resource allocation
在线阅读 下载PDF
Customization Product Design Based on User's Emotion and Needs 被引量:3
20
作者 金纯 张春林 刘文枝 《Defence Technology(防务技术)》 SCIE EI CAS 2005年第2期245-249,共5页
The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform... The paper presents a design method that ensures the ingenuity of the product form as well as the whole and exact expression of user’s needs. The key idea is to establish an automatic design system which can transform the user’s language needs into the product features in real-time. A rifle was taken as a research instance and soldiers were chosen as evaluation customers. The theory of fuzzy set and semantic difference are adopted to evaluate the relationship between user’s needs and product features as well as their alternatives. FAHP (fuzzy analytic hierarchy process) is utilized to judge the user’s satisfactory forms. This method can also be applied to other product form designs. 展开更多
关键词 users needs product form CUsTOMIZATION fuzzy number
在线阅读 下载PDF
上一页 1 2 82 下一页 到第
使用帮助 返回顶部