期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Multimodal Evolution Approach to Multidimensional Intrusion Detection 被引量:1
1
作者 翁广安 余胜生 周敬利 《Journal of Southwest Jiaotong University(English Edition)》 2006年第3期212-217,共6页
An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to d... An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors, respectively, and experiments performed on two real data sets (machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stabih'ty, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones. 展开更多
关键词 Artificial immune systems Intrusion detection Multimodal evolution Hyper-sphere Hyper-rectangle
在线阅读 下载PDF
A Cloud Computing Fault Detection Method Based on Deep Learning 被引量:1
2
作者 Weipeng Gao Youchan Zhu 《Journal of Computer and Communications》 2017年第12期24-34,共11页
In the cloud computing, in order to provide reliable and continuous service, the need for accurate and timely fault detection is necessary. However, cloud failure data, especially cloud fault feature data acquisition ... In the cloud computing, in order to provide reliable and continuous service, the need for accurate and timely fault detection is necessary. However, cloud failure data, especially cloud fault feature data acquisition is difficult and the amount of data is too small, with large data training methods to solve a certain degree of difficulty. Therefore, a fault detection method based on depth learning is proposed. An auto-encoder with sparse denoising is used to construct a parallel structure network. It can automatically learn and extract the fault data characteristics and realize fault detection through deep learning. The experiment shows that this method can detect the cloud computing abnormality and determine the fault more effectively and accurately than the traditional method in the case of the small amount of cloud fault feature data. 展开更多
关键词 FAULT Detection Cloud Computing Auto-Encoder SPARSE DENOISING Deep Learning
在线阅读 下载PDF
On optimal receiver buffer size in adaptive Internet video streaming
3
作者 OZBEK Nukhet TUNALI E.Turhan 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第z1期112-118,共7页
The effect of receiver buffer size on perceived video quality of an Internet video streamer application was examined in this work. Several network conditions and several versions of the application are used to gain un... The effect of receiver buffer size on perceived video quality of an Internet video streamer application was examined in this work. Several network conditions and several versions of the application are used to gain understanding of the response to varying buffer sizes. Among these conditions local area versus wide area, bandwidth estimation based versus non-bandwidth estimation based cases are examined in detail. A total of 1000 min of video is streamed over Intemet and statistics are collected. It was observed that when bandwidth estimation is possible, choosing larger buffer size for higher available bandwidth yields quality increase in perceived video. 展开更多
关键词 VIDEO streaming RECEIVER BUFFER SIZE
在线阅读 下载PDF
Mechanical Properties of New Type Negative Offset Structure During Shearing Process of Heavy Steel Plate
4
作者 MA Li-feng HUANG Qing-xue +3 位作者 WANG Jian-mei YANG Jian-wei LI Ying LI Jin-bao 《Journal of Iron and Steel Research International》 SCIE EI CAS CSCD 2007年第5期31-35,共5页
According to the revised Cailikefu's rolling shear force formula, motion path equation of spatial seven-bar path was built, and a mechanical model, with the new structural feature of negative offset, was thus success... According to the revised Cailikefu's rolling shear force formula, motion path equation of spatial seven-bar path was built, and a mechanical model, with the new structural feature of negative offset, was thus successfully established for 2 800 mm heavy shear of some iron and steel company. Shear and bar forces of steel plate, before and after the adoption of negative offset structure, were analyzed, as well as horizontal force component of mechanism that influences pure rolling shear and back-wall push force that keeps blade clearance. It was found that the back-wall push force keeps large even at the time that the maximum rolling shear was obtained; meanwhile, back-wall push force is the most approximate to side forces when 60--100 mm of offset was adopted. Both theoretical results and onsite shear quality show that the negative offset plays an important role in ensuring the stability of pure rolling shear and keeping blade clearance constant. 展开更多
关键词 rolling shear mechanical model mechanical property blade clearance negative offset shear quality
在线阅读 下载PDF
Multi-sensor Data Fusion by Improved Hough Transformation
5
作者 张鸿宾 《High Technology Letters》 EI CAS 1995年第2期7-11,共5页
In this paper we present an evidence-gathering approach to slove the multi-sensor data fusion problem. It uses an improved Hough transformation method rather than the usual statistical or geometric approach to extract... In this paper we present an evidence-gathering approach to slove the multi-sensor data fusion problem. It uses an improved Hough transformation method rather than the usual statistical or geometric approach to extract the directions and positions of the walls in a room and update the location (orientation and position)of a mobile robot. The simulation results show that the proposed method is of practical importance since it is very simple and easy to implement. 展开更多
关键词 Multi-sensor data fusion Hough transformation Mobile robot
在线阅读 下载PDF
HOW FAST THE ALGEBRAIC APPROX-IMATION CAN BE?
6
作者 洪加威 《Chinese Science Bulletin》 SCIE EI CAS 1986年第3期215-216,共2页
Suppose that we want to compute any number by means of operations like +, -, *, /, and suppose that in one step we can get the exact value of the operation performed. Then the number t(n) of the steps needed to obtain... Suppose that we want to compute any number by means of operations like +, -, *, /, and suppose that in one step we can get the exact value of the operation performed. Then the number t(n) of the steps needed to obtain n approximate digits of the final result is either O(1) or Ω(log n). There is a gap. 展开更多
关键词 compute STEPS SUPPOSE approximate operations exact FAST umber INTEGER letter
在线阅读 下载PDF
CAN GEOMETRY THEOREM BE PROVED BY AN EXAMPLE?
7
作者 洪加威 《Chinese Science Bulletin》 SCIE EI CAS 1986年第3期214-215,共2页
In this letter, we prove that in order to determine whether a proposition in elementary geometry of a certain type is true, we need only to compute one concrete example which depends only on the length of the proposit... In this letter, we prove that in order to determine whether a proposition in elementary geometry of a certain type is true, we need only to compute one concrete example which depends only on the length of the proposition and the number n of free variables involved. 展开更多
关键词 PROPOSITION LETTER compute ELEMENTARY length STATEMENT satis latter operations ARBITRARY
在线阅读 下载PDF
SOME UNPROVABLE TRUE PROPOSITIONS IN COMPLEXITY
8
作者 洪加威 《Chinese Science Bulletin》 SCIE EI CAS 1983年第10期1429-,共1页
In complexity theory, upper bounds have been improved repeatedly, but little has been obtained in the field of lower bounds.For example, the upper bounds for any NP-complete problem are exponential, but there is only ... In complexity theory, upper bounds have been improved repeatedly, but little has been obtained in the field of lower bounds.For example, the upper bounds for any NP-complete problem are exponential, but there is only a trivial linear lower bound. Thisfaet makes us think that some true propositions in complexity are unprovable. But if we get a result like the G?del’s in- 展开更多
关键词 BOUNDS TRIVIAL EXPONENTIAL TRUE THINK repeatedly 幼君 progr
在线阅读 下载PDF
TESTING FINITE ABELIAN GROUP ISOMORPHISM IN SUBLINEAR TIME
9
作者 洪加威 陈溧 《Chinese Science Bulletin》 SCIE EI CAS 1986年第12期859-,共1页
Whether or not the group isomorphism problem is tractable is still an important open problem. But for Abelian groups of order n, C. Savage has an algorithm of time complexity O(n^2) to determine whether they are isomo... Whether or not the group isomorphism problem is tractable is still an important open problem. But for Abelian groups of order n, C. Savage has an algorithm of time complexity O(n^2) to determine whether they are isomorphic, given their multiplication table as input. Notice that the length of the input is of order n^2, therefore this is a linear time algorithm. 展开更多
关键词 ISOMORPHIC SAVAGE MULTIPLICATION LENGTH LETTER
在线阅读 下载PDF
A VLSI Algorithm for Calculating the Tree to Tree Distance
10
作者 徐美瑞 刘小林 《Journal of Computer Science & Technology》 SCIE EI CSCD 1993年第1期68-76,共9页
Given two ordered,labeled trees β and α,to find the distance from tree β to tree α is an important problem in many fields,for example,the pattern recognition field.In this paper,a VLSI algorithm for calculating th... Given two ordered,labeled trees β and α,to find the distance from tree β to tree α is an important problem in many fields,for example,the pattern recognition field.In this paper,a VLSI algorithm for calculating the tree-to-tree distance is presented.The computation structure of the algorithm is a 2-D Mesh with the size m*n-and the time is O(m+n),where m,n are the numbers of nodes of the tree β and tree α,respectively. 展开更多
关键词 VLSI algorithm tree-to-tree distance mesh pattern recognition
原文传递
An Algorithm for the Rank of Elliptic Curves
11
作者 赵春来 《Chinese Science Bulletin》 SCIE EI CAS 1993年第16期1329-1331,共3页
For elliptic curves the rank is one of the most essential numerical charactenstics. By means of finding the independent generators of the rational points on such a curve one may determine the lower bound of the rank. ... For elliptic curves the rank is one of the most essential numerical charactenstics. By means of finding the independent generators of the rational points on such a curve one may determine the lower bound of the rank. In this note we obtain a formula for the rank of elliptic curves defined over the rational numbers. Moreover, if we admit a conjecture suggested by S. Lang, then the proof of our formula provides an algorithm for calculating the rank. 展开更多
关键词 RANK CANONICAL HEIGHT
在线阅读 下载PDF
Design and analysis of firewall-penetrated scheme based on trusted host
12
作者 ZHANG Deng-yin WANG Qian-qian XU Jian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第1期39-44,共6页
On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in t... On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the fuewall-penetrated technology based on trusted host is analyzed under the fuewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality. 展开更多
关键词 firewall-penetrated trusted host (TH) penetrated host penetrated evaluating model
原文传递
DFTSNA:A Distributed Fault-Tolerant Shipboard System
13
作者 徐洁 李庆南 +1 位作者 黄世泽 徐江峰 《Journal of Computer Science & Technology》 SCIE EI CSCD 1990年第2期109-116,共8页
This paper describes the architecture,fundamental principle and implementation of a distributed fault-tolerant system——DFTSNA.Its objective is to combine extreme reliability with high availability in a shipboard env... This paper describes the architecture,fundamental principle and implementation of a distributed fault-tolerant system——DFTSNA.Its objective is to combine extreme reliability with high availability in a shipboard environment.Multi-level fault tolerance is considered and several special-purpose hardware subsystems(F-T clusters)are developed.The physical and functional distribution of the system is empha- sized to meet the stringent shipboard requirements.A number of algorithms are produced to support fault-tolerant operation. 展开更多
关键词 TIME DFTSNA
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部