An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to d...An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors, respectively, and experiments performed on two real data sets (machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stabih'ty, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones.展开更多
In the cloud computing, in order to provide reliable and continuous service, the need for accurate and timely fault detection is necessary. However, cloud failure data, especially cloud fault feature data acquisition ...In the cloud computing, in order to provide reliable and continuous service, the need for accurate and timely fault detection is necessary. However, cloud failure data, especially cloud fault feature data acquisition is difficult and the amount of data is too small, with large data training methods to solve a certain degree of difficulty. Therefore, a fault detection method based on depth learning is proposed. An auto-encoder with sparse denoising is used to construct a parallel structure network. It can automatically learn and extract the fault data characteristics and realize fault detection through deep learning. The experiment shows that this method can detect the cloud computing abnormality and determine the fault more effectively and accurately than the traditional method in the case of the small amount of cloud fault feature data.展开更多
The effect of receiver buffer size on perceived video quality of an Internet video streamer application was examined in this work. Several network conditions and several versions of the application are used to gain un...The effect of receiver buffer size on perceived video quality of an Internet video streamer application was examined in this work. Several network conditions and several versions of the application are used to gain understanding of the response to varying buffer sizes. Among these conditions local area versus wide area, bandwidth estimation based versus non-bandwidth estimation based cases are examined in detail. A total of 1000 min of video is streamed over Intemet and statistics are collected. It was observed that when bandwidth estimation is possible, choosing larger buffer size for higher available bandwidth yields quality increase in perceived video.展开更多
According to the revised Cailikefu's rolling shear force formula, motion path equation of spatial seven-bar path was built, and a mechanical model, with the new structural feature of negative offset, was thus success...According to the revised Cailikefu's rolling shear force formula, motion path equation of spatial seven-bar path was built, and a mechanical model, with the new structural feature of negative offset, was thus successfully established for 2 800 mm heavy shear of some iron and steel company. Shear and bar forces of steel plate, before and after the adoption of negative offset structure, were analyzed, as well as horizontal force component of mechanism that influences pure rolling shear and back-wall push force that keeps blade clearance. It was found that the back-wall push force keeps large even at the time that the maximum rolling shear was obtained; meanwhile, back-wall push force is the most approximate to side forces when 60--100 mm of offset was adopted. Both theoretical results and onsite shear quality show that the negative offset plays an important role in ensuring the stability of pure rolling shear and keeping blade clearance constant.展开更多
In this paper we present an evidence-gathering approach to slove the multi-sensor data fusion problem. It uses an improved Hough transformation method rather than the usual statistical or geometric approach to extract...In this paper we present an evidence-gathering approach to slove the multi-sensor data fusion problem. It uses an improved Hough transformation method rather than the usual statistical or geometric approach to extract the directions and positions of the walls in a room and update the location (orientation and position)of a mobile robot. The simulation results show that the proposed method is of practical importance since it is very simple and easy to implement.展开更多
Suppose that we want to compute any number by means of operations like +, -, *, /, and suppose that in one step we can get the exact value of the operation performed. Then the number t(n) of the steps needed to obtain...Suppose that we want to compute any number by means of operations like +, -, *, /, and suppose that in one step we can get the exact value of the operation performed. Then the number t(n) of the steps needed to obtain n approximate digits of the final result is either O(1) or Ω(log n). There is a gap.展开更多
In this letter, we prove that in order to determine whether a proposition in elementary geometry of a certain type is true, we need only to compute one concrete example which depends only on the length of the proposit...In this letter, we prove that in order to determine whether a proposition in elementary geometry of a certain type is true, we need only to compute one concrete example which depends only on the length of the proposition and the number n of free variables involved.展开更多
In complexity theory, upper bounds have been improved repeatedly, but little has been obtained in the field of lower bounds.For example, the upper bounds for any NP-complete problem are exponential, but there is only ...In complexity theory, upper bounds have been improved repeatedly, but little has been obtained in the field of lower bounds.For example, the upper bounds for any NP-complete problem are exponential, but there is only a trivial linear lower bound. Thisfaet makes us think that some true propositions in complexity are unprovable. But if we get a result like the G?del’s in-展开更多
Whether or not the group isomorphism problem is tractable is still an important open problem. But for Abelian groups of order n, C. Savage has an algorithm of time complexity O(n^2) to determine whether they are isomo...Whether or not the group isomorphism problem is tractable is still an important open problem. But for Abelian groups of order n, C. Savage has an algorithm of time complexity O(n^2) to determine whether they are isomorphic, given their multiplication table as input. Notice that the length of the input is of order n^2, therefore this is a linear time algorithm.展开更多
Given two ordered,labeled trees β and α,to find the distance from tree β to tree α is an important problem in many fields,for example,the pattern recognition field.In this paper,a VLSI algorithm for calculating th...Given two ordered,labeled trees β and α,to find the distance from tree β to tree α is an important problem in many fields,for example,the pattern recognition field.In this paper,a VLSI algorithm for calculating the tree-to-tree distance is presented.The computation structure of the algorithm is a 2-D Mesh with the size m*n-and the time is O(m+n),where m,n are the numbers of nodes of the tree β and tree α,respectively.展开更多
For elliptic curves the rank is one of the most essential numerical charactenstics. By means of finding the independent generators of the rational points on such a curve one may determine the lower bound of the rank. ...For elliptic curves the rank is one of the most essential numerical charactenstics. By means of finding the independent generators of the rational points on such a curve one may determine the lower bound of the rank. In this note we obtain a formula for the rank of elliptic curves defined over the rational numbers. Moreover, if we admit a conjecture suggested by S. Lang, then the proof of our formula provides an algorithm for calculating the rank.展开更多
On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in t...On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the fuewall-penetrated technology based on trusted host is analyzed under the fuewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.展开更多
This paper describes the architecture,fundamental principle and implementation of a distributed fault-tolerant system——DFTSNA.Its objective is to combine extreme reliability with high availability in a shipboard env...This paper describes the architecture,fundamental principle and implementation of a distributed fault-tolerant system——DFTSNA.Its objective is to combine extreme reliability with high availability in a shipboard environment.Multi-level fault tolerance is considered and several special-purpose hardware subsystems(F-T clusters)are developed.The physical and functional distribution of the system is empha- sized to meet the stringent shipboard requirements.A number of algorithms are produced to support fault-tolerant operation.展开更多
文摘An artificial immunity based multimodal evolution algorithm is developed to generate detectors with variable coverage for multidimensional intrusion detection. In this algorithm, a proper fitness function is used to drive the detectors to fill in those detection holes close to self set or among self spheres, and genetic algorithm is adopted to reduce the negative effects that different distribution of self imposes on the detector generating process. The validity of the algorithm is tested with spherical and rectangular detectors, respectively, and experiments performed on two real data sets (machine learning database and DAPRA99) indicate that the proposed algorithm can obtain good results on spherical detectors, and that its performances in detection rate, false alarm rate, stabih'ty, time cost, and adaptability to incomplete training set on spherical detectors are all better than on rectangular ones.
文摘In the cloud computing, in order to provide reliable and continuous service, the need for accurate and timely fault detection is necessary. However, cloud failure data, especially cloud fault feature data acquisition is difficult and the amount of data is too small, with large data training methods to solve a certain degree of difficulty. Therefore, a fault detection method based on depth learning is proposed. An auto-encoder with sparse denoising is used to construct a parallel structure network. It can automatically learn and extract the fault data characteristics and realize fault detection through deep learning. The experiment shows that this method can detect the cloud computing abnormality and determine the fault more effectively and accurately than the traditional method in the case of the small amount of cloud fault feature data.
文摘The effect of receiver buffer size on perceived video quality of an Internet video streamer application was examined in this work. Several network conditions and several versions of the application are used to gain understanding of the response to varying buffer sizes. Among these conditions local area versus wide area, bandwidth estimation based versus non-bandwidth estimation based cases are examined in detail. A total of 1000 min of video is streamed over Intemet and statistics are collected. It was observed that when bandwidth estimation is possible, choosing larger buffer size for higher available bandwidth yields quality increase in perceived video.
基金Item Sponsored by National Natural Science Foundation of China (50575155)National Tenth-Five Key Technologies Research and Development Program(ZZ01-13A-03-03-04)Shanxi Provincial Key Technologies Research and Development Program of China (2006031174)
文摘According to the revised Cailikefu's rolling shear force formula, motion path equation of spatial seven-bar path was built, and a mechanical model, with the new structural feature of negative offset, was thus successfully established for 2 800 mm heavy shear of some iron and steel company. Shear and bar forces of steel plate, before and after the adoption of negative offset structure, were analyzed, as well as horizontal force component of mechanism that influences pure rolling shear and back-wall push force that keeps blade clearance. It was found that the back-wall push force keeps large even at the time that the maximum rolling shear was obtained; meanwhile, back-wall push force is the most approximate to side forces when 60--100 mm of offset was adopted. Both theoretical results and onsite shear quality show that the negative offset plays an important role in ensuring the stability of pure rolling shear and keeping blade clearance constant.
基金the High Technology Research and Development Programme of China
文摘In this paper we present an evidence-gathering approach to slove the multi-sensor data fusion problem. It uses an improved Hough transformation method rather than the usual statistical or geometric approach to extract the directions and positions of the walls in a room and update the location (orientation and position)of a mobile robot. The simulation results show that the proposed method is of practical importance since it is very simple and easy to implement.
文摘Suppose that we want to compute any number by means of operations like +, -, *, /, and suppose that in one step we can get the exact value of the operation performed. Then the number t(n) of the steps needed to obtain n approximate digits of the final result is either O(1) or Ω(log n). There is a gap.
文摘In this letter, we prove that in order to determine whether a proposition in elementary geometry of a certain type is true, we need only to compute one concrete example which depends only on the length of the proposition and the number n of free variables involved.
文摘In complexity theory, upper bounds have been improved repeatedly, but little has been obtained in the field of lower bounds.For example, the upper bounds for any NP-complete problem are exponential, but there is only a trivial linear lower bound. Thisfaet makes us think that some true propositions in complexity are unprovable. But if we get a result like the G?del’s in-
文摘Whether or not the group isomorphism problem is tractable is still an important open problem. But for Abelian groups of order n, C. Savage has an algorithm of time complexity O(n^2) to determine whether they are isomorphic, given their multiplication table as input. Notice that the length of the input is of order n^2, therefore this is a linear time algorithm.
文摘Given two ordered,labeled trees β and α,to find the distance from tree β to tree α is an important problem in many fields,for example,the pattern recognition field.In this paper,a VLSI algorithm for calculating the tree-to-tree distance is presented.The computation structure of the algorithm is a 2-D Mesh with the size m*n-and the time is O(m+n),where m,n are the numbers of nodes of the tree β and tree α,respectively.
基金Project supported by the National Natural Science Foundation (Tianvuan Funds) of China.
文摘For elliptic curves the rank is one of the most essential numerical charactenstics. By means of finding the independent generators of the rational points on such a curve one may determine the lower bound of the rank. In this note we obtain a formula for the rank of elliptic curves defined over the rational numbers. Moreover, if we admit a conjecture suggested by S. Lang, then the proof of our formula provides an algorithm for calculating the rank.
文摘On the basis of various firewall-penetrated technologies, a novel firewall-penetrated technology based on trusted host, which can realize the communication between penetrating host and protected host, is proposed in this paper. Meanwhile, the firewall-penetrated evaluating model and its formalized statement is also proposed by quantizing penetrated level, penetrated quality, and penetrated hiding. Finally, the fuewall-penetrated technology based on trusted host is analyzed under the fuewall-penetrated evaluating model, and the experimental results show that this technology has obvious penetrating effect and high penetrating quality.
文摘This paper describes the architecture,fundamental principle and implementation of a distributed fault-tolerant system——DFTSNA.Its objective is to combine extreme reliability with high availability in a shipboard environment.Multi-level fault tolerance is considered and several special-purpose hardware subsystems(F-T clusters)are developed.The physical and functional distribution of the system is empha- sized to meet the stringent shipboard requirements.A number of algorithms are produced to support fault-tolerant operation.