|
|
|
Abner Perez-Haro and Arturo Diaz-Perez
Policy mining is an automated procedure for generating access rules by means of mining patterns from single permissions, which are typically registered in access logs. Attribute-based access control (ABAC) is a model which allows security administrators ...
ver más
|
|
|
|
|
|
|
Minghao Liu, Qingxi Luo, Jianxiang Wang, Lingbo Sun, Tingting Xu and Enming Wang
Land use/cover change (LUCC) refers to the phenomenon of changes in the Earth?s surface over time. Accurate prediction of LUCC is crucial for guiding policy formulation and resource management, contributing to the sustainable use of land, and maintaining...
ver más
|
|
|
|
|
|
|
Fahad Alqahtani, Mohammed Almutairi and Frederick T. Sheldon
This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead o...
ver más
|
|
|
|
|
|
|
Bao She, Jiating Hu, Linsheng Huang, Mengqi Zhu and Qishuo Yin
To grasp the spatial distribution of soybean planting areas in time is the prerequisite for the work of growth monitoring, crop damage assessment and yield estimation. The research on remote sensing identification of soybean conducted in China mainly foc...
ver más
|
|
|
|
|
|
|
Lihan Chen, Lihong Xu and Ruihua Wei
Due to the complex coupling of greenhouse environments, a number of challenges have been encountered in the research of automatic control in Venlo greenhouses. Most algorithms are only concerned with accuracy, yet energy-saving control is of great import...
ver más
|
|
|
|
|
|
|
Szabolcs Deák, Paul Levine, Joseph Pearlman and Bo Yang
We construct a New Keynesian (NK) behavioural macroeconomic model with bounded-rationality (BR) and heterogeneous agents. We solve and simulate the model using a third-order approximation for a given policy and evaluate its properties using this solution...
ver más
|
|
|
|
|
|
|
Huaixi Xing, Qinghua Xing and Kun Wang
Current electronic warfare jammers and radar countermeasures are characterized by dynamism and uncertainty. This paper focuses on a decision-making framework of radar anti-jamming countermeasures. The characteristics and implementation process of radar i...
ver más
|
|
|
|
|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
|
Sirui Chen, Yuming Tian and Lingling An
Order scheduling is of a great significance in the internet and communication industries. With the rapid development of the communication industry and the increasing variety of user demands, the number of work orders for communication operators has grown...
ver más
|
|
|
|
|
|
|
Hee Jun Ryu, Ye Na Jo, Won Jun Lee, Ji Won Cheong, Boo Yong Moon and Young Dae Ko
The efficient management of social worker personnel is important since it involves a huge portion in its operations. However, the burnout and turnover rates of social workers are very high, which is due to dissatisfaction with the irregular and unequal s...
ver más
|
|
|
|