期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Development of 2D computer program to determine geometry of rock mass blocks 被引量:1
1
作者 Yarahmadi Reza Bagherpour Raheb +2 位作者 Kakaie Reza Mirzaie N. Hossein Yari Mojtaba 《International Journal of Mining Science and Technology》 SCIE EI 2014年第2期191-194,共4页
Due to various geological processes such as tectonic activities fractures might be created in rock mass body which causes creation of blocks with different shapes and sizes in the rock body. Exact understand- ing of t... Due to various geological processes such as tectonic activities fractures might be created in rock mass body which causes creation of blocks with different shapes and sizes in the rock body. Exact understand- ing of these blocks geometry is an essential issue concerned in different domains of rock engineering such as support system of underground spaces built in jointed rock masses, design of blasting pattern, optimi- zation of fragmentation, determination of cube blocks in quarry mines, blocks stability, etc. The aim of this paper is to develop a computer program to determine geometry of rock mass blocks in two dimen- sional spaces. In this article, the eometrv of iointed rock mass is programmed in MATLABTM. 展开更多
关键词 Block detection Computer programming Rock mass Algorithm
在线阅读 下载PDF
Efficient Accurate Context-Sensitive Anomaly Detection
2
作者 李红娇 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期639-644,650,共7页
For program behavior-based anomaly detection, the only way to ensure accurate monitoring is to construct an efficient and precise program behavior model. A new program behavior-based anomaly detection model, called co... For program behavior-based anomaly detection, the only way to ensure accurate monitoring is to construct an efficient and precise program behavior model. A new program behavior-based anomaly detection model, called combined pushdown automaton (CPDA) model was proposed, which is based on static binary executable analysis. The CPDA model incorporates the optimized call stack walk and code instrumentation technique to gain complete context information. Thereby the proposed method can detect more attacks, while retaining good performance. 展开更多
关键词 program behavior-based anomaly detection system call combined pushdown automaton (CPDA) model
在线阅读 下载PDF
Detection of And-Parallelism in Logic Programs
3
作者 黄志毅 胡守仁 《Journal of Computer Science & Technology》 SCIE EI CSCD 1990年第4期379-387,共9页
In this paper, we present a detection technique of and-parallelism in logic programs. The detection consists of three phases: analysis of entry modes, derivation of exit modes and determination of execution graph expr... In this paper, we present a detection technique of and-parallelism in logic programs. The detection consists of three phases: analysis of entry modes, derivation of exit modes and determination of execution graph expressions. Compared with other techniques, our approach, with the compile-time program-level data-dependence analysis of logic programs, can efficiently exploit and-parallelism in logic programs. Two precompilers, based on our technique and DeGroot' s approach respectively, have been implemented in SES-PIM system. Through compiling and running some typical benchmarks in SES-PIM, we conclude that our technique can, in most cases, exploit as much and-parallelism as the dynamic approach does under 'producer-consumer' scheme, and needs less dynamic overhead while exploiting more and- parallelism than DeGroot's approach does. 展开更多
关键词 MODE detection of And-Parallelism in Logic programs
原文传递
A two-phase system call arguments attribute analyzing method
4
作者 李红娇 李建华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期573-577,共5页
To detect more attacks aiming at key security data in program behavior-based anomaly detection,the data flow properties were formulated as unary and binary relations on system call arguments.A new method named two-phr... To detect more attacks aiming at key security data in program behavior-based anomaly detection,the data flow properties were formulated as unary and binary relations on system call arguments.A new method named two-phrase analysis(2PA)is designed to analyze the efficient relation dependency,and its description as well as advantages are discussed.During the phase of static analysis,a dependency graph was constructed according to the program's data dependency graph,which was used in the phase of dynamic learning to learn specified binary relations.The constructed dependency graph only stores the information of related arguments and events,thus improves the efficiency of the learning algorithm and reduces the size of learned relation dependencies.Performance evaluations show that the new method is more efficient than existing methods. 展开更多
关键词 program behavior-based anomaly detection system call arguments data flow dependency 2PA method
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部