首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 85 毫秒
1.
在分析当前网络攻击技术特点的基础上,提出了一种园区网络特点的树形结构分布式防御方案.该方案包括中央控制台、网络安全防御器、主机安全防御器3部分.并描述了各个部件的具体设计方案,以及整个防御系统的协同工作机制.最后分析了设计的优势和缺陷,并提出了弥补缺陷的措施.  相似文献   

2.
构建了基于OURS PXA270平台的安防系统.从搭建系统开发环境着手,实现了客户端对传感器信息和视频数据的采集与传输,让用户可以通过移动通信网络对传感器和摄像头的工作状态进行远程控制,并为用户提供了聊天功能和输入软键盘,极大地方便了用户.同时,服务端实现了对传感器状态信息和视频数据的接收、显示、保存与查询功能,真正做到了安全防范、远程监控.  相似文献   

3.
Unicode漏洞的攻击与防御   总被引:1,自引:0,他引:1  
随着网络攻击事件的频繁发生,如何保护系统并有效防御攻击成为系统安全的主要问题.针对Unicode漏洞屡遭攻击这一现状,通过对Unicode漏洞的详尽分析,例举了对Unicode漏洞进行攻击的方式和方法,根据攻击的特点,为系统的安全提出了相应的防御措施和安全策略.  相似文献   

4.
针对目前少按键设备搭载的汉语输入法多数输入效率较低的现状,在对现在方法进行考察的基础上,提出一种能够自动适应用户输入习惯的笔画输入方法.方法对笔画按键进行了合理的键盘布局并充分利用输入候补的屏幕显示功能,引入分词技术和自动学习机制,使输入法能够通过机器学习自动调节输入词典和联想信息,自动登录新词和删除不用的词汇,使输入法能够随着用户的使用输入效率不断提高.在PC机环境下编程实现了仿真系统,并通过输入实验验证了方法在较小输入词典的状态下,具有较好的输入效率和用户自适应性.  相似文献   

5.
针对经典的求解单行直线型布局算法中需要大量参数、要求设备等概率使用的限制,提出了一种基于数据挖掘的制造业工厂设备布局方法 FMDM.FMDM采用数据挖掘Apriori算法对已有的生产调度计划或柔性作业车间调度问题的调度解进行挖掘,根据贪心方法在频繁项的基础上获得的初步布局方案,给出了将候选方案进行筛选得到最终方案的算法CACULATE_EDIT_DISTANCE.实验结果表明:该方法可对无参数的初建车间进行有效的初步布局,不限制设备的使用概率,能实现多工件共享设备,多工件并发生产,且FMDM结果作为经典算法的输入可提高经典算法的收敛速度.  相似文献   

6.
为了获得布局性能最优的设计方案,提出以人工势场方法为基础的布局定位模型表示方法.通过建立不同影响因素下的引力势场和斥力势场以及总势场叠加模型,把布局定位问题转化为在人工势场中搜索势能极值位置问题.采用栅格模型对布局空间的环境信息进行描述,得到布局环境状态数字势场模型.提出一种基于改进连续蚁群算法的布局定位算法,进行布局定位方案求解.通过对几种算法求得的布局设计方案对比分析,验证了所提出的人工布局势场模型构建以及优化算法的有效性.  相似文献   

7.
针对网络博弈中攻防双方拥有信息的不对称性,考虑攻击者据此伪装合法用户隐蔽攻击的情况,研究提出了平台动态防御的信号博弈策略.从平台动态防御原理入手,分析了网络攻防博弈关系和信息的不对称性,基于对访问者类型的推断等要素,构建了平台动态目标防御的信号博弈模型,提出了信号博弈的攻防收益量化指标,给出了信号博弈流程及均衡求解方法.通过示例和仿真分析,演示了信号博弈策略的求解过程.仿真结果表明,在攻击者类型先验概率信息已知的前提下,防御方的信号博弈策略及迁移方案,其期望收益与实际收益最终误差不超过2.7%,理论收益计算方法正确有效;较无差别平台迁移策略,信号博弈策略实际收益最终高出96%,表明该策略能够改善防御方对攻击方信息的不对称性,实施针对性的平台动态防御.  相似文献   

8.
本文对车间设备布局设计问题进行了深入研究,并分析了设备布局的影响因素,如产品信息、工艺流程、车间生产组织管理方式和生产物流等.并对传统设备布局方法和计算机辅助设备布局法进行了分析和比较.  相似文献   

9.
针对水面舰艇在鱼雷防御行动中难以准确识别来袭鱼雷类型的问题,该文从战技特征层信息入手,提炼出14个与鱼雷类型识别密切相关的证据指标;根据荻取性难易程度将指标进行分类.针对登普斯特-谢弗证据理论的不足,引入了一种改进的融合算法,提出了对证据进行确定性信息预处理的方式,建立了完整的信息融合算法流程.仿真结果表明,通过提取证据指标和改进融合算法,该文算法对鱼雷类型的识别精度比传统方法大大提高,从而为水面舰艇采取有针对性的鱼雷防御措施提供了重要保障.  相似文献   

10.
研究表明很多密码系统虽然通过了常规安全性能测试,但是被证明可通过侧信道攻击破解,从而破获密码系统的敏感信息.为了抵抗侧信道攻击,设计了一种基于混沌的密码系统.该密码算法用两个混沌映射分别生成轮密钥和随机序列数,中间数据由明文、轮密钥和随机序列数三者通过异或操作生成,从而达到扩大密钥空间的目的.此外,随机序列数还控制随机化操作,通过随机化操作,将中间数据与能量消耗的关系进行隐藏,减少侧信道信息的泄露,以此达到抵抗能量分析攻击的目的.为了评估设计的密码系统的安全性,首先对其进行了常规测试,例如字符频率测试、信息熵测试和依赖性测试等,实验结果表明该系统具有良好的安全性能.其次,将该加密算法在Atmel XMEGA128芯片上实现,并对其进行了相关能量分析,结果表明所提出的密码系统可以防御相关能量分析攻击.  相似文献   

11.
Language markedness is a common phenomenon in languages, and is reflected from hearing, vision and sense, i.e. the variation in the three aspects such as phonology, morphology and semantics. This paper focuses on the interpretation of markedness in language use following the three perspectives, i.e. pragmatic interpretation, psychological interpretation and cognitive interpretation, with an aim to define the function of markedness.  相似文献   

12.
何延凌 《科技信息》2008,(4):258-258
Language is a means of verbal communication. People use language to communicate with each other. In the society, no two speakers are exactly alike in the way of speaking. Some differences are due to age, gender, statue and personality. Above all, gender is one of the obvious reasons. The writer of this paper tries to describe the features of women's language from these perspectives: pronunciation, intonation, diction, subjects, grammar and discourse. From the discussion of the features of women's language, more attention should be paid to language use in social context. What's more, the linguistic phenomena in a speaking community can be understood more thoroughly.  相似文献   

13.
The discovery of the prolific Ordovician Red River reservoirs in 1995 in southeastern Saskatchewan was the catalyst for extensive exploration activity which resulted in the discovery of more than 15 new Red River pools. The best yields of Red River production to date have been from dolomite reservoirs. Understanding the processes of dolomitization is, therefore, crucial for the prediction of the connectivity, spatial distribution and heterogeneity of dolomite reservoirs.The Red River reservoirs in the Midale area consist of 3~4 thin dolomitized zones, with a total thickness of about 20 m, which occur at the top of the Yeoman Formation. Two types of replacement dolomite were recognized in the Red River reservoir: dolomitized burrow infills and dolomitized host matrix. The spatial distribution of dolomite suggests that burrowing organisms played an important role in facilitating the fluid flow in the backfilled sediments. This resulted in penecontemporaneous dolomitization of burrow infills by normal seawater. The dolomite in the host matrix is interpreted as having occurred at shallow burial by evaporitic seawater during precipitation of Lake Almar anhydrite that immediately overlies the Yeoman Formation. However, the low δ18O values of dolomited burrow infills (-5.9‰~ -7.8‰, PDB) and matrix dolomites (-6.6‰~ -8.1‰, avg. -7.4‰ PDB) compared to the estimated values for the late Ordovician marine dolomite could be attributed to modification and alteration of dolomite at higher temperatures during deeper burial, which could also be responsible for its 87Sr/86Sr ratios (0.7084~0.7088) that are higher than suggested for the late Ordovician seawaters (0.7078~0.7080). The trace amounts of saddle dolomite cement in the Red River carbonates are probably related to "cannibalization" of earlier replacement dolomite during the chemical compaction.  相似文献   

14.
理论推导与室内实验相结合,建立了低渗透非均质砂岩油藏启动压力梯度确定方法。首先借助油藏流场与电场相似的原理,推导了非均质砂岩油藏启动压力梯度计算公式。其次基于稳定流实验方法,建立了非均质砂岩油藏启动压力梯度测试方法。结果表明:低渗透非均质砂岩油藏的启动压力梯度确定遵循两个等效原则。平面非均质油藏的启动压力梯度等于各级渗透率段的启动压力梯度关于长度的加权平均;纵向非均质油藏的启动压力梯度等于各渗透率层的启动压力梯度关于渗透率与渗流面积乘积的加权平均。研究成果可用于有效指导低渗透非均质砂岩油藏的合理井距确定,促进该类油藏的高效开发。  相似文献   

15.
As an American modern novelist who were famous in the literary world, Hemingway was not a person who always followed the trend but a sharp observer. At the same time, he was a tragedy maestro, he paid great attention on existence, fate and end-result. The dramatis personae's tragedy of his works was an extreme limit by all means tragedy on the meaning of fearless challenge that failed. The beauty of tragedy was not produced on the destruction of life, but now this kind of value was in the impact activity. They performed for the reader about the tragedy on challenging for the limit and the death.  相似文献   

16.
AcomputergeneratorforrandomlylayeredstructuresYUJia shun1,2,HEZhen hua2(1.TheInstituteofGeologicalandNuclearSciences,NewZealand;2.StateKeyLaboratoryofOilandGasReservoirGeologyandExploitation,ChengduUniversityofTechnology,China)Abstract:Analgorithmisintrod…  相似文献   

17.
There are numerous geometric objects stored in the spatial databases. An importance function in a spatial database is that users can browse the geometric objects as a map efficiently. Thus the spatial database should display the geometric objects users concern about swiftly onto the display window. This process includes two operations:retrieve data from database and then draw them onto screen. Accordingly, to improve the efficiency, we should try to reduce time of both retrieving object and displaying them. The former can be achieved with the aid of spatial index such as R-tree, the latter require to simplify the objects. Simplification means that objects are shown with sufficient but not with unnecessary detail which depend on the scale of browse. So the major problem is how to retrieve data at different detail level efficiently. This paper introduces the implementation of a multi-scale index in the spatial database SISP (Spatial Information Shared Platform) which is generalized from R-tree. The difference between the generalization and the R-tree lies on two facets: One is that every node and geometric object in the generalization is assigned with a importance value which denote the importance of them, and every vertex in the objects are assigned with a importance value,too. The importance value can be use to decide which data should be retrieve from disk in a query. The other difference is that geometric objects in the generalization are divided into one or more sub-blocks, and vertexes are total ordered by their importance value. With the help of the generalized R-tree, one can easily retrieve data at different detail levels.Some experiments are performed on real-life data to evaluate the performance of solutions that separately use normal spatial index and multi-scale spatial index. The results show that the solution using multi-scale index in SISP is satisfying.  相似文献   

18.
正The periodicity of the elements and the non-reactivity of the inner-shell electrons are two related principles of chemistry,rooted in the atomic shell structure.Within compounds,Group I elements,for example,invariably assume the+1 oxidation state,and their chemical properties differ completely from those of the p-block elements.These general rules govern our understanding of chemical structures and reactions.Using first principles calcula-  相似文献   

19.
We have developed an adiabatic connection to formulate the ground-state exchange-correlation energy in terms of pairing matrix linear fluctuations.This formulation of the exchange-correlation energy opens a new channel for density functional approximations based on the many-body perturbation theory.We illustrate the potential of such approaches with an approximation based on the particle-particle Random Phase Approximation(pp-RPA).This re-  相似文献   

20.
正The electronic and nuclear(structural/vibrational)response of 1D-3D nanoscale systems to electric fields gives rise to a host of optical,mechanical,spectral,etc.properties that are of high theoretical and applied interest.Due to the computational difficulty of treating such large systems it is convenient to model them as infinite and periodic(at least,in first approximation).The fundamental theoretical/computational problem in doing so is that  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号