Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm f...Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm for infrared images,F-YOLOv8,is proposed.First,a spatial-to-depth network replaces the traditional backbone network's strided convolution or pooling layer.At the same time,it combines with the channel attention mechanism so that the neural network focuses on the channels with large weight values to better extract low-resolution image feature information;then an improved feature pyramid network of lightweight bidirectional feature pyramid network(L-BiFPN)is proposed,which can efficiently fuse features of different scales.In addition,a loss function of insertion of union based on the minimum point distance(MPDIoU)is introduced for bounding box regression,which obtains faster convergence speed and more accurate regression results.Experimental results on the FLIR dataset show that the improved algorithm can accurately detect infrared road targets in real time with 3%and 2.2%enhancement in mean average precision at 50%IoU(mAP50)and mean average precision at 50%—95%IoU(mAP50-95),respectively,and 38.1%,37.3%and 16.9%reduction in the number of model parameters,the model weight,and floating-point operations per second(FLOPs),respectively.To further demonstrate the detection capability of the improved algorithm,it is tested on the public dataset PASCAL VOC,and the results show that F-YOLO has excellent generalized detection performance.展开更多
With the global climate change,the high-altitude detection is more and more important in the climate prediction,and the input-output characteristic curve of the air pressure sensor is offset due to the interference of...With the global climate change,the high-altitude detection is more and more important in the climate prediction,and the input-output characteristic curve of the air pressure sensor is offset due to the interference of the tested object and the environment under test,and the nonlinear error is generated.Aiming at the difficulty of nonlinear correction of pressure sensor and the low accuracy of correction results,depth neural network model was established based on wavelet function,and Levenberg-Marquardt algorithm is used to update network parameters to realize the nonlinear correction of pressure sensor.The experimental results show that compared with the traditional neural network model,the improved depth neural network not only accelerates the convergence rate,but also improves the correction accuracy,meets the error requirements of upper-air detection,and has a good generalization ability,which can be extended to the nonlinear correction of similar sensors.展开更多
Firstly,neural network based on improved particle swarm optimization (PSO)algorithm is introduced in this paper. Based on the data collected from projects in typical areas,the concrete carbonation depth is assessed wi...Firstly,neural network based on improved particle swarm optimization (PSO)algorithm is introduced in this paper. Based on the data collected from projects in typical areas,the concrete carbonation depth is assessed with consideration of various factors such as unit cement consumption (C),unit water consumption (W),binder material content (B),water binder ratio (W/B ),concrete strength (MPa),rapid carbonization days (D),fly ash consumption of unit volume concrete(FA),fly ash percentage of total cementitious materials (FA%),expansion agent consumption of unit volume concrete(EA),expansion agent percentage of total cementitious materials (FA%).Gaining the data from project-experiment,a model is presented to calculate and forecast carbonation depth using neural network based on improved PSO algorithm. The calculation results indicate that this algorithm accord with the prediction carbonation depth of concrete accuracy requirements and has a better convergence and generalization,worth being popularized.展开更多
This paper outlines the application of the multi-layer perceptron artificial neural network (ANN), ordinary kriging (OK), and inverse distance weighting (IDW) models in the estimation of local scour depth around bridg...This paper outlines the application of the multi-layer perceptron artificial neural network (ANN), ordinary kriging (OK), and inverse distance weighting (IDW) models in the estimation of local scour depth around bridge piers. As part of this study, bridge piers were installed with bed sills at the bed of an experimental flume. Experimental tests were conducted under different flow conditions and varying distances between bridge pier and bed sill. The ANN, OK and IDW models were applied to the experimental data and it was shown that the artificial neural network model predicts local scour depth more accurately than the kriging and inverse distance weighting models. It was found that the ANN with two hidden layers was the optimum model to predict local scour depth. The results from the sixth test case showed that the ANN with one hidden layer and 17 hidden nodes was the best model to predict local scour depth. Whereas the results from the fifth test case found that the ANN with three hidden layers was the best model to predict local scour depth.展开更多
The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during th...The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables).展开更多
The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many suppo...The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored;this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations.展开更多
Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce c...Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables).展开更多
自监督单目深度估计受到了国内外研究人员的广泛关注。现有基于深度学习的自监督单目深度估计方法主要采用编码器-解码器结构。然而,这些方法在编码过程中对输入图像进行下采样操作,导致部分图像信息,尤其是图像的边界信息丢失,进而影...自监督单目深度估计受到了国内外研究人员的广泛关注。现有基于深度学习的自监督单目深度估计方法主要采用编码器-解码器结构。然而,这些方法在编码过程中对输入图像进行下采样操作,导致部分图像信息,尤其是图像的边界信息丢失,进而影响深度图的精度。针对上述问题,提出一种基于拉普拉斯金字塔的自监督单目深度估计方法(Self-supervised Monocular Depth Estimation Based on the Laplace Pyramid,LpDepth)。此方法的核心思想是:首先,使用拉普拉斯残差图丰富编码特征,以弥补在下采样过程中丢失的特征信息;其次,在下采样过程中使用最大池化层突显和放大特征信息,使编码器在特征提取过程中更容易地提取到训练模型所需要的特征信息;最后,使用残差模块解决过拟合问题,提高解码器对特征的利用效率。在KITTI和Make3D等数据集上对所提方法进行了测试,同时将其与现有经典方法进行了比较。实验结果证明了所提方法的有效性。展开更多
An intelligent system including both a neural network(NN) and a self adjusting fuzzy controller(FC) for modeling and control of the penetration depth during gas tungsten arc welding(GTAW) process is presented in this...An intelligent system including both a neural network(NN) and a self adjusting fuzzy controller(FC) for modeling and control of the penetration depth during gas tungsten arc welding(GTAW) process is presented in this paper. The discussion is mainly focused on two parts. One is the modeling of the penetration depth with NN. A visual sensor CCD is used to obtain the image of the molten pool. A neural network model is established to estimate the penetration depth from the welding current, pool width and seam gap. It is demonstrated that the proposed neural network can produce highly complex nonlinear multi variable model of the GTAW process that offer the accurate prediction of welding penetration depth. Another is the control for the penetration depth with FC.A self adjusting fuzzy controller is proposed,which used for controlling the penetration depth.The control parameters are adjusted on line automatically according to the controlling errors of penetration and the errors can be decreased sharply. The effectiveness of the proposed intelligent methods is demonstrated by the real experiments and the improved performance results are obtained.展开更多
Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the ha...Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the hand in captured images or videos. A new three-stage pipeline approach for fast and accurate hand segmentation for the hand from a single depth image is proposed. Firstly, a depth frame is segmented into several regions by histogrambased threshold selection algorithm and by tracing the exterior boundaries of objects after thresholding. Secondly, each segmentation proposal is evaluated by a three-layers shallow convolutional neural network(CNN) to determine whether or not the boundary is associated with the hand. Finally, all hand components are merged as the hand segmentation result. Compared with algorithms based on random decision forest(RDF), the experimental results demonstrate that the approach achieves better performance with high-accuracy(88.34% mean intersection over union, mIoU) and a shorter processing time(≤8 ms).展开更多
Pattern matching is a fundamental approach to detect malicious behaviors and information over Internet, which has been gradually used in high-speed network traffic analysis. However, there is a performance bottleneck ...Pattern matching is a fundamental approach to detect malicious behaviors and information over Internet, which has been gradually used in high-speed network traffic analysis. However, there is a performance bottleneck for multi-pattern matching on online compressed network traffic(CNT), this is because malicious and intrusion codes are often embedded into compressed network traffic. In this paper, we propose an online fast and multi-pattern matching algorithm on compressed network traffic(FMMCN). FMMCN employs two types of jumping, i.e. jumping during sliding window and a string jump scanning strategy to skip unnecessary compressed bytes. Moreover, FMMCN has the ability to efficiently process multiple large volume of networks such as HTTP traffic, vehicles traffic, and other Internet-based services. The experimental results show that FMMCN can ignore more than 89.5% of bytes, and its maximum speed reaches 176.470MB/s in a midrange switches device, which is faster than the current fastest algorithm ACCH by almost 73.15 MB/s.展开更多
Due to effectiveness of network layer on general performance of networks, designing routing protocols is very important for lifetime and traffic efficiency in wireless sensor networks. So in this paper, we are going t...Due to effectiveness of network layer on general performance of networks, designing routing protocols is very important for lifetime and traffic efficiency in wireless sensor networks. So in this paper, we are going to represent an efficient and scalable version of depth-based routing (DBR) protocol that is limited by depth divisions-policy. In fact the new version is a network information independent routing protocol for acoustic communications. Proposed method by use of depth clustering is able to reduce consumed energy and end-to-end delay in dense underwater sensor networks (DUSNs) and this issue is proved by simulation.展开更多
A integrated intelligent system for seam tracking and penetration control is given. The system received information of welding seam error and penetration depth from only one sensor, then, it realized seam tracking and...A integrated intelligent system for seam tracking and penetration control is given. The system received information of welding seam error and penetration depth from only one sensor, then, it realized seam tracking and penetration control simultaneously. This paper introduces constitution of the system, methods of information recognition, design of the neural fuzzy controller and results practically.展开更多
An artificial neural network(ANN) and a self-adjusting fuzzy logiccontroller(FLC) for modeling and control of gas tungsten arc welding(GTAW) process are presented.The discussion is mainly focused on the modeling and c...An artificial neural network(ANN) and a self-adjusting fuzzy logiccontroller(FLC) for modeling and control of gas tungsten arc welding(GTAW) process are presented.The discussion is mainly focused on the modeling and control of the weld pool depth with ANN and theintelligent control for weld seam tracking with FLC. The proposed neural network can produce highlycomplex nonlinear multi-variable model of the GTAW process that offers the accurate prediction ofwelding penetration depth. A self-adjusting fuzzy controller used for seam tracking adjusts thecontrol parameters on-line automatically according to the tracking errors so that the torch positioncan be controlled accurately.展开更多
Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical ...Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks.展开更多
Aiming at the problem that the average recognition degree of the moving target line is low with the traditional motion target behaviour recognition method, a motion recognition method based on deep convolutional neura...Aiming at the problem that the average recognition degree of the moving target line is low with the traditional motion target behaviour recognition method, a motion recognition method based on deep convolutional neural network is proposed in this paper. A target model of deep convolutional neural network is constructed and the basic unit of the network is designed by using the model. By setting the unit, the returned unit is calculated into the standard density diagram, and the position of the moving target is determined by the local maximum method to realize the behavior identification of the moving target. The experimental results show that the multi-parameter SICNN256 model is slightly better than other model structures. The average recognition rate and recognition rate of the moving target behavior recognition method based on deep convolutional neural network are higher than those of the traditional method, which proves its effectiveness. Since the frequency of single target is higher than that of multiple recognition and there is no target similarity recognition, similar target error detection cannot be excluded.展开更多
Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding des...Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes.展开更多
基金supported by the National Natural Science Foundation of China(No.62103298)。
文摘Aiming at the problems of low detection accuracy and large model size of existing object detection algorithms applied to complex road scenes,an improved you only look once version 8(YOLOv8)object detection algorithm for infrared images,F-YOLOv8,is proposed.First,a spatial-to-depth network replaces the traditional backbone network's strided convolution or pooling layer.At the same time,it combines with the channel attention mechanism so that the neural network focuses on the channels with large weight values to better extract low-resolution image feature information;then an improved feature pyramid network of lightweight bidirectional feature pyramid network(L-BiFPN)is proposed,which can efficiently fuse features of different scales.In addition,a loss function of insertion of union based on the minimum point distance(MPDIoU)is introduced for bounding box regression,which obtains faster convergence speed and more accurate regression results.Experimental results on the FLIR dataset show that the improved algorithm can accurately detect infrared road targets in real time with 3%and 2.2%enhancement in mean average precision at 50%IoU(mAP50)and mean average precision at 50%—95%IoU(mAP50-95),respectively,and 38.1%,37.3%and 16.9%reduction in the number of model parameters,the model weight,and floating-point operations per second(FLOPs),respectively.To further demonstrate the detection capability of the improved algorithm,it is tested on the public dataset PASCAL VOC,and the results show that F-YOLO has excellent generalized detection performance.
基金This paper is supported by the following funds:National Key R&D Program of China(2018YFF01010100)National natural science foundation of China(61672064),Beijing natural science foundation project(4172001)Advanced information network Beijing laboratory(PXM2019_014204_500029).
文摘With the global climate change,the high-altitude detection is more and more important in the climate prediction,and the input-output characteristic curve of the air pressure sensor is offset due to the interference of the tested object and the environment under test,and the nonlinear error is generated.Aiming at the difficulty of nonlinear correction of pressure sensor and the low accuracy of correction results,depth neural network model was established based on wavelet function,and Levenberg-Marquardt algorithm is used to update network parameters to realize the nonlinear correction of pressure sensor.The experimental results show that compared with the traditional neural network model,the improved depth neural network not only accelerates the convergence rate,but also improves the correction accuracy,meets the error requirements of upper-air detection,and has a good generalization ability,which can be extended to the nonlinear correction of similar sensors.
文摘Firstly,neural network based on improved particle swarm optimization (PSO)algorithm is introduced in this paper. Based on the data collected from projects in typical areas,the concrete carbonation depth is assessed with consideration of various factors such as unit cement consumption (C),unit water consumption (W),binder material content (B),water binder ratio (W/B ),concrete strength (MPa),rapid carbonization days (D),fly ash consumption of unit volume concrete(FA),fly ash percentage of total cementitious materials (FA%),expansion agent consumption of unit volume concrete(EA),expansion agent percentage of total cementitious materials (FA%).Gaining the data from project-experiment,a model is presented to calculate and forecast carbonation depth using neural network based on improved PSO algorithm. The calculation results indicate that this algorithm accord with the prediction carbonation depth of concrete accuracy requirements and has a better convergence and generalization,worth being popularized.
文摘This paper outlines the application of the multi-layer perceptron artificial neural network (ANN), ordinary kriging (OK), and inverse distance weighting (IDW) models in the estimation of local scour depth around bridge piers. As part of this study, bridge piers were installed with bed sills at the bed of an experimental flume. Experimental tests were conducted under different flow conditions and varying distances between bridge pier and bed sill. The ANN, OK and IDW models were applied to the experimental data and it was shown that the artificial neural network model predicts local scour depth more accurately than the kriging and inverse distance weighting models. It was found that the ANN with two hidden layers was the optimum model to predict local scour depth. The results from the sixth test case showed that the ANN with one hidden layer and 17 hidden nodes was the best model to predict local scour depth. Whereas the results from the fifth test case found that the ANN with three hidden layers was the best model to predict local scour depth.
文摘The purpose of this research was to determine whether the Linear Regression Analysis can be effectively applied to the prioritization of defense-in-depth security tools and procedures to reduce cyber threats during the Global Corona Virus Pandemic. The way this was determined or methods used in this study consisted of scanning 20 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals for a list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The methods further involved using the Likert Scale Model to create an ordinal ranking of the measures and threats. The defense in depth tools and procedures were then compared to see whether the Likert scale and Linear Regression Analysis could be effectively applied to prioritize and combine the measures to reduce pandemic related cyber threats. The results of this research reject the H0 null hypothesis that Linear Regression Analysis does not affect the relationship between the prioritization and combining of defense in depth tools and procedures (independent variables) and pandemic related cyber threats (dependent variables).
文摘The defense in depth methodology was popularized in the early 2000’s amid growing concerns for information security;this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the defense in breadth methodology. A substantial portion of this paper’s body will be devoted to comparing real-world usage scenarios and discussing the flaws in each method. A major goal of this publication will be to assist readers in selecting a method that will best benefit their personal environment. Scenarios certainly exist where one method may be clearly favored;this article will help identify the factors that make one method a clear choice over another. This paper will strive not only to highlight key strengths and weaknesses for the two strategies listed, but also provide the evaluation techniques necessary for readers to apply to other popular methodologies in order to make the most appropriate personal determinations.
文摘Studied in this article is whether the Bayesian Network Model (BNM) can be effectively applied to the prioritization of defense in-depth security tools and procedures and to the combining of those measures to reduce cyber threats. The methods used in this study consisted of scanning 24 peer reviewed Cybersecurity Articles from prominent Cybersecurity Journals using the Likert Scale Model for the article’s list of defense in depth measures (tools and procedures) and the threats that those measures were designed to reduce. The defense in depth tools and procedures are then compared to see whether the Likert scale and the Bayesian Network Model could be effectively applied to prioritize and combine the measures to reduce cyber threats attacks against organizational and private computing systems. The findings of the research reject the H0 null hypothesis that BNM does not affect the relationship between the prioritization and combining of 24 Cybersecurity Article’s defense in depth tools and procedures (independent variables) and cyber threats (dependent variables).
文摘自监督单目深度估计受到了国内外研究人员的广泛关注。现有基于深度学习的自监督单目深度估计方法主要采用编码器-解码器结构。然而,这些方法在编码过程中对输入图像进行下采样操作,导致部分图像信息,尤其是图像的边界信息丢失,进而影响深度图的精度。针对上述问题,提出一种基于拉普拉斯金字塔的自监督单目深度估计方法(Self-supervised Monocular Depth Estimation Based on the Laplace Pyramid,LpDepth)。此方法的核心思想是:首先,使用拉普拉斯残差图丰富编码特征,以弥补在下采样过程中丢失的特征信息;其次,在下采样过程中使用最大池化层突显和放大特征信息,使编码器在特征提取过程中更容易地提取到训练模型所需要的特征信息;最后,使用残差模块解决过拟合问题,提高解码器对特征的利用效率。在KITTI和Make3D等数据集上对所提方法进行了测试,同时将其与现有经典方法进行了比较。实验结果证明了所提方法的有效性。
文摘An intelligent system including both a neural network(NN) and a self adjusting fuzzy controller(FC) for modeling and control of the penetration depth during gas tungsten arc welding(GTAW) process is presented in this paper. The discussion is mainly focused on two parts. One is the modeling of the penetration depth with NN. A visual sensor CCD is used to obtain the image of the molten pool. A neural network model is established to estimate the penetration depth from the welding current, pool width and seam gap. It is demonstrated that the proposed neural network can produce highly complex nonlinear multi variable model of the GTAW process that offer the accurate prediction of welding penetration depth. Another is the control for the penetration depth with FC.A self adjusting fuzzy controller is proposed,which used for controlling the penetration depth.The control parameters are adjusted on line automatically according to the controlling errors of penetration and the errors can be decreased sharply. The effectiveness of the proposed intelligent methods is demonstrated by the real experiments and the improved performance results are obtained.
文摘Real-time hand gesture recognition technology significantly improves the user's experience for virtual reality/augmented reality(VR/AR) applications, which relies on the identification of the orientation of the hand in captured images or videos. A new three-stage pipeline approach for fast and accurate hand segmentation for the hand from a single depth image is proposed. Firstly, a depth frame is segmented into several regions by histogrambased threshold selection algorithm and by tracing the exterior boundaries of objects after thresholding. Secondly, each segmentation proposal is evaluated by a three-layers shallow convolutional neural network(CNN) to determine whether or not the boundary is associated with the hand. Finally, all hand components are merged as the hand segmentation result. Compared with algorithms based on random decision forest(RDF), the experimental results demonstrate that the approach achieves better performance with high-accuracy(88.34% mean intersection over union, mIoU) and a shorter processing time(≤8 ms).
基金supported by China MOST project (No.2012BAH46B04)
文摘Pattern matching is a fundamental approach to detect malicious behaviors and information over Internet, which has been gradually used in high-speed network traffic analysis. However, there is a performance bottleneck for multi-pattern matching on online compressed network traffic(CNT), this is because malicious and intrusion codes are often embedded into compressed network traffic. In this paper, we propose an online fast and multi-pattern matching algorithm on compressed network traffic(FMMCN). FMMCN employs two types of jumping, i.e. jumping during sliding window and a string jump scanning strategy to skip unnecessary compressed bytes. Moreover, FMMCN has the ability to efficiently process multiple large volume of networks such as HTTP traffic, vehicles traffic, and other Internet-based services. The experimental results show that FMMCN can ignore more than 89.5% of bytes, and its maximum speed reaches 176.470MB/s in a midrange switches device, which is faster than the current fastest algorithm ACCH by almost 73.15 MB/s.
文摘Due to effectiveness of network layer on general performance of networks, designing routing protocols is very important for lifetime and traffic efficiency in wireless sensor networks. So in this paper, we are going to represent an efficient and scalable version of depth-based routing (DBR) protocol that is limited by depth divisions-policy. In fact the new version is a network information independent routing protocol for acoustic communications. Proposed method by use of depth clustering is able to reduce consumed energy and end-to-end delay in dense underwater sensor networks (DUSNs) and this issue is proved by simulation.
文摘A integrated intelligent system for seam tracking and penetration control is given. The system received information of welding seam error and penetration depth from only one sensor, then, it realized seam tracking and penetration control simultaneously. This paper introduces constitution of the system, methods of information recognition, design of the neural fuzzy controller and results practically.
基金National Natural Science Foundation of China and Provincial Natural Science Foundafion of Guangdong, China.
文摘An artificial neural network(ANN) and a self-adjusting fuzzy logiccontroller(FLC) for modeling and control of gas tungsten arc welding(GTAW) process are presented.The discussion is mainly focused on the modeling and control of the weld pool depth with ANN and theintelligent control for weld seam tracking with FLC. The proposed neural network can produce highlycomplex nonlinear multi-variable model of the GTAW process that offers the accurate prediction ofwelding penetration depth. A self-adjusting fuzzy controller used for seam tracking adjusts thecontrol parameters on-line automatically according to the tracking errors so that the torch positioncan be controlled accurately.
文摘Society is becoming increasingly dependent on cyberspace for both business and pleasure. Cyber attackers continue to attack organizational computer networks, as those same computer networks become increasing critical to organizational business process. Strategic planning and managing IT security risks play an important role in the business and government planning process. Deploying defense in depth security measures can ensure that organizations continue to function in times of crisis. This quantitative study explores whether the Latin Square Design (LSD) model can be effectively applied to the prioritization of cybersecurity threats and to the linking of information assurance defense in-depth measures to those threats. The methods used in this study consisted of scanning 10 Cybersecurity Websites such as the Department of Homeland Security US CERT (United States-Computer Emergency Readiness Team [1]) and the SANS Institute (SysAdmin, Audit, Network and Security [2]) using the Likert Scale Model for the Website’s top ten list of cyber threats facing organizations and the network defense in depth measures to fight those threats. A comparison of each cybersecurity threats was then made using LSD to determine whether the Likert scale and the LSD model could be effectively applied to prioritize information assurance measures to protect organizational computing devices. The findings of the research reject the H0 null hypothesis that LSD does not affect the relationship between the ranking of 10 Cybersecurity websites top ten cybersecurity threats dependent variables and the independent variables of defense in depth measures used in protecting organizational devices against cyber-attacks.
文摘Aiming at the problem that the average recognition degree of the moving target line is low with the traditional motion target behaviour recognition method, a motion recognition method based on deep convolutional neural network is proposed in this paper. A target model of deep convolutional neural network is constructed and the basic unit of the network is designed by using the model. By setting the unit, the returned unit is calculated into the standard density diagram, and the position of the moving target is determined by the local maximum method to realize the behavior identification of the moving target. The experimental results show that the multi-parameter SICNN256 model is slightly better than other model structures. The average recognition rate and recognition rate of the moving target behavior recognition method based on deep convolutional neural network are higher than those of the traditional method, which proves its effectiveness. Since the frequency of single target is higher than that of multiple recognition and there is no target similarity recognition, similar target error detection cannot be excluded.
基金supported by National "863" High Technology Research and Development Program Foundation(No.2006AA01Z208)Six Talented Eminence Foundation of Jiangsu Province+1 种基金Natural Science Foundation of Jiangsu Province(No. BK2004149)Green-Blue Academic Talented Project Foundation of Jiangsu Province
文摘Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes.