The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes the extraction task of the Chinese Sci-tech journal text and presents a WCA-Selection Chinese free-text HMM IE algorithm. The HMM IE algorithm takes the Chinese Sci-tech journal abstract text as the extraction text. According to the features of WCA, an idea of WCA selection model re-optimization is proposed. And a WCA selection optimization strategy is concreted. Then the experimental...
There are many researches which focus on the security of network-attached storages. The cryptology tools can protect the storages against non-authorized access, but turned out ineffective when malicious authenticated users attack inside. Also the intrusion detection methods are applied in the network-attached storages, such as, storage-based intrusion detection method and the intrusion detection method...
Intrusion detection systems could rely on short sequences of system calls to distinguish between legitimate and illegitimate activities. We found that the frequencies of system calls in a particular process generally follow the Zipf's law. It means that there are many sequences which are meaningless to differentiate the ongoing behavior but generate lots of computing waste. Due to improve the performance...
Rapid increase of information resources speeds the development of network storage. And security of network storage satisfies the demands of privacy and safety of the information. Data encryption and personal identity authentication which are based on cryptography can protect the storage against non-authorized access, while they are ineffective for malicious authorized users and inherent attacks. Also...
Sequences of system call have become an important data resource of anomaly detection. Considering the large overhead of existing methods to construct normal profile using system call traces, an efficient algorithm is proposed based on STIDE in order to reduce the computing cost. The axis system calls which could represent the characteristics of normal behaviors are extracted by a sequences extracting...
This paper presents a new kind of Chinese text encoding method based on Chinese word, and establishes a new Chinese document format which deals with the automatic segmentation issue. This method makes word the smallest information unit. Chinese text analysis does not rely on segmentation by the method. On this word platform, N-gram and word co-occurrence statistical analysis are combined to carry...
This paper presents a word-based Chinese document experimental system which is aimed to make Chinese information processing technology to develop on a more reliable and more efficient basis. This system implements the document storage and processing format, both of which are based on the smallest information carrier: Chinese word. Further an IE algorithm with two steps strategy for the Chinese free...
At present researches on Chinese keyword extraction mainly focus on automatic segmentation which is a pretreatment problem. This paper presents a kind of Chinese encoding method based on word platform, and establishes a new Chinese document format in computer. This method makes word the smallest information unit. Chinese keyword extraction does not rely on segmentation by this new method. Thereby...
This paper presents a Word-based Chinese Document Experimental System which is aimed to make Chinese Information Processing technology to develop on a more reliable and more efficient basis. This system implements the document storage and processing format, both of which are based on the smallest information carrier: Chinese word. Further an IE algorithm with two steps strategy for the Chinese free...
A new analytical method for improving the performance of a network attached optical jukebox is presented by means of artificial neural networks. Through analyzing operation (request) process in this system, the mathematics model and algorithm are built for this storage system, and then a classified method based on artificial neural networks for this system is proposed. Simulation results testified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.