For a long time, people have little understanding of autism, let alone how to help and treat them. In order to better improve the behavior habits and speech and social disorders of autistic children, I will mainly tal...For a long time, people have little understanding of autism, let alone how to help and treat them. In order to better improve the behavior habits and speech and social disorders of autistic children, I will mainly talk about the most effective intervention method-the application of behavior analysis therapy. We can use this method to analyze various behaviors of autistic children, distinguish the good behavior and the bad behavior, help autistic children to establish good behaviors, and at the same time improve or eliminate their problem behaviors, so that they can better communicate with people and integrate into social life. In fact, these autistic children from the stars are not so difficult to get along with. As long as we really help them with our heart and let them enter our hearts, slowly you will find that you have also entered their hearts. "Application of behavior analysis therapy" is to decompose the target task (i.e. teaching knowledge, skills, behaviors, habits, etc.) into a series of smaller or relatively independent links according to a certain method and order, and then use appropriate reinforcement methods to train each small link step by step according to the order determined by the task decomposition, until the children master all links, and finally can complete the task independently, and can apply the knowledge and skills they have learned in other situations. "Applied behavioral analysis" mainly emphasizes the change and shaping of autisms explicit behavior. It uses the principle and method of operation restriction to shape childrens behavior, designs corresponding situations according to childrens behavior and selects the reinforcement that can affect the target behavior, and establishes new adaptive behavior with their spontaneous reaction behavior to eliminate or improve inappropriate behavior caused by autism symptoms.展开更多
The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the ex...The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the existence is reduced.展开更多
Software credibility refers to the matching degree between the expected result and system behavior in the real running environment.This paper focuses on the application of software creditability verification method ba...Software credibility refers to the matching degree between the expected result and system behavior in the real running environment.This paper focuses on the application of software creditability verification method based on the application behavior declaration(ABD),in which the application of software credibility validation process and the software behavior declaration definition statement are put forward.In the integration of the process and the software development life cycle,the ABD is embedded into the software development phases to make the software behavior be consistent with the judgment and the final realization meet the requirement of trusted software verification.展开更多
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management...With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods.展开更多
A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic...A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic polynomial A(z)=1-a_1z-a_2z^2-…-a_3z^3 has all roots on the unit circle. Asymptotic behavior of sum form 1 to n (x^2(t)) will be studied by showing somerates of divergence of sum form 1 to n (x^2(t)). This kind of properties Will be used for getting the rates of convergenceof least squares estimates of parameters a_1, a_2,…, a_?展开更多
文摘For a long time, people have little understanding of autism, let alone how to help and treat them. In order to better improve the behavior habits and speech and social disorders of autistic children, I will mainly talk about the most effective intervention method-the application of behavior analysis therapy. We can use this method to analyze various behaviors of autistic children, distinguish the good behavior and the bad behavior, help autistic children to establish good behaviors, and at the same time improve or eliminate their problem behaviors, so that they can better communicate with people and integrate into social life. In fact, these autistic children from the stars are not so difficult to get along with. As long as we really help them with our heart and let them enter our hearts, slowly you will find that you have also entered their hearts. "Application of behavior analysis therapy" is to decompose the target task (i.e. teaching knowledge, skills, behaviors, habits, etc.) into a series of smaller or relatively independent links according to a certain method and order, and then use appropriate reinforcement methods to train each small link step by step according to the order determined by the task decomposition, until the children master all links, and finally can complete the task independently, and can apply the knowledge and skills they have learned in other situations. "Applied behavioral analysis" mainly emphasizes the change and shaping of autisms explicit behavior. It uses the principle and method of operation restriction to shape childrens behavior, designs corresponding situations according to childrens behavior and selects the reinforcement that can affect the target behavior, and establishes new adaptive behavior with their spontaneous reaction behavior to eliminate or improve inappropriate behavior caused by autism symptoms.
文摘The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the existence is reduced.
基金Supported by Foundation of the National Public Scientific Research(201210262)
文摘Software credibility refers to the matching degree between the expected result and system behavior in the real running environment.This paper focuses on the application of software creditability verification method based on the application behavior declaration(ABD),in which the application of software credibility validation process and the software behavior declaration definition statement are put forward.In the integration of the process and the software development life cycle,the ABD is embedded into the software development phases to make the software behavior be consistent with the judgment and the final realization meet the requirement of trusted software verification.
基金supported by Key Scientific and Technological Research Projects in Henan Province(Grand No 192102210125)Key scientific research projects of colleges and universities in Henan Province(23A520054)Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2020-2-01).
文摘With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods.
文摘A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic polynomial A(z)=1-a_1z-a_2z^2-…-a_3z^3 has all roots on the unit circle. Asymptotic behavior of sum form 1 to n (x^2(t)) will be studied by showing somerates of divergence of sum form 1 to n (x^2(t)). This kind of properties Will be used for getting the rates of convergenceof least squares estimates of parameters a_1, a_2,…, a_?