首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 109 毫秒
1.
To accurately track computer viruses, an overlay network that monitors the activities of viruses is constructed. Identifying and locating nodes infected by virus on network is achieved by a naming system in which a node in the network is mapped to a unique serial number of the hard -drive. By carefully monitoring and recording sensitive commu- nication between local system and remote nodes on the network, and suspicious operations on files that originate from remote nodes and entered via some form of file transfer, activities of viruses in both local and network level are recorded and ready for future analysis. These data can also be used in analysis of the mechanism of a computer virus as well as its spreading mode and pattern.  相似文献   

2.
The susceptible–infected–susceptible (SIS) epidemic model is presented which can be used to study the epidemic spreading behavior in the local-world evolving network model. Local-world evolving model displays a transition from the exponential network to the scale-free network with respect to the connectivity distribution. From theoretical analyses and numerical simulations, we ?nd that the epidemic spreading behavior on local-world networks also takes on some kind of transitional behaviors. The transitional behavior is further veri ?ed by comparing the spreading behavior of local-world network with that of random and scale-free networks. Some feasible control strategies are also proposed to keep from the epidemic spreading on networks.  相似文献   

3.
The susceptible-infected-susceptible (SIS) epidemic model is presented which can be used to study the epidemic spreading behavior in the local-world evolving network model. Local-world evolving model displays a transition from the exponential network to the scale-free network with respect to the connectivity distribution. From theoretical analyses and numerical simulations, we find that the epidemic spreading behavior on local-world networks also takes on some kind of transitional behaviors. The transitional behavior is further verified by comparing the spreading behavior of local-world network with that of random and scale-free networks. Some feasible control strategies are also orooosed to keeo from the eoidemic spreading on networks.  相似文献   

4.
ABC95 array computer is a multi-function network computer based on FPGA technology,A notable feature of ABC95 array computer is the support of complex interconnection,which determines that the computer must have enough I/O band and flexible communications between pes.The authors designed the interconnecting network chips of ABC95 and realized a form of multifunction interconnection.The multi-function interconnecting network supports conflict-free acccess from processors to memory matrix and the MESH network of enhanced processors to processor communicatiopns.The design scheme has been proved feasible by experiment.  相似文献   

5.
The origin of the new A (H1N1) influenza virus recently emerging in North America is a hot controversial topic of significance in disease control and risk assessment. Some experts claimed that it was an unusually mongrelized mix of human, avian and swine influenza viruses, while some others concluded that it was totally a simple re-assortment hybrid of two lineages of swine influenza viruses. Here the phylogenetic diversity of the viral PB1, PA and PB2 gene sequences using online web servers, and the results suggest that all the 8 genetic segments of the new virus were possibly from two lineages of swine influenza viruses, and one of the lineage was a mongrelized mix of human, avian and swine influenza viruses emerging in the world approximately 10 years ago. Considering the recent epidemiological trends of the new virus, we believe it will spread more widely in the world and persist long in human populations. It also could spread among swine populations. The future wide spreading of the new virus may coincide the disappearance of a subtype of previous human influenza A virus.  相似文献   

6.
The three types of connections (Permanent Connection, Soft Permanent Connection and Switched Connection) provided by ASON can adapt the requirement of different network services. Management and maintenance of these three connections are the most important aspect of ASON management. The information models proposed in this paper are used for the purpose of ASON connection management. Firstly a new information model is proposed to meet the requirement for the control plane introduced by ASON. In this model, a new class ControlNE is given, and the relationship between the ControlNE and the transport NE (network element) is also defined. Then this paper proposes information models for the three types of connections for the first time, and analyzes the relationship between the three kinds of connections and the basic network transport entities. Finally, the paper defines some CORBA interfaces for the management of the three connections. In these interfaces, some operations such as create or release a connection are defined, and some other operations can manage the performance of the three kinds of connections, which is necessary for a distributed management system.  相似文献   

7.
The implementation methods of computer aided design, drawing and drawing management for plate cutting-machine are discussed. The system structure for plate cutting-machine design is put forward firstly, then some key technologies and their implementation methods are introduced, which include the structure management of graphics, the unification of graph and design calculation, information share of part, assemble and drawing management system, and movement simulation of key components.  相似文献   

8.
The paper points out the relationship between the bottleneck and the minimum cutset of the network, and presents a capacity expansion algorithm of network optimization to solve the network bottleneck problem. The complexity of the algorithm is also analyzed. As required by the algorithm, some virtual sources are imported through the whole positive direction subsection in the network, in which a certain capacity value is given. Simultaneously, a corresponding capacity-expanded network is constructed to search all minimum cutsets. For a given maximum flow value of the network, the authors found an adjustment value of each minimum cutset are‘s group with gradually reverse calculation and marked out the feasible flow on the capacity-extended networks again with the adjustment value increasing. All this has been done repeatedly until the original topology structure is resumed. So the algorithm can increase the capacity of networks effectively and solve the bottleneck problem of networks.  相似文献   

9.
Due to the complexity and asymmetrical illumination, the images of object are difficult to be effectively segmented by some routine method. In this paper, a kind of edge detection method based on image features and genetic algorithms neural network for range images was proposed. Fully considering the essential difference between an edge point and a noise point, some characteristic parameters were extracted from range maps as the input nodes of the network in the algorithm. Firstly, a genetic neural network was designed and implemented. The neural network is trained by genetic algorithm, and then genetic neural network algorithm is combined with the virtue of global optimization of genetic algorithm and the virtue of parallel computation of neural network, so that this algorithm is of good global property. The experimental results show that this method can get much faster and more accurate detection results than the classical differential algorithm, and has better antinoise performance.  相似文献   

10.
Chemical mechanical polishing (CMP) process is commonly regarded as the best method for achieving global planarization in the field of surface finishing with ultra-precision. The development of investigation on material removal mechanisms for different materials used in computer hard disk and ultra-large scale integration fabrication are reviewed here. The mechanisms underlying the interaction between the abrasive particles and polished surfaces during CMP are addressed, and some ways to investigate the polishing mechanisms are presented.  相似文献   

11.
谈网络环境下如何避免电脑感染病毒   总被引:1,自引:0,他引:1  
介绍了电脑病毒造成的危害,阐述了网络环境下电脑病毒的一些新特点,提出了避免感染电脑病毒的措施。  相似文献   

12.
分析了通过电子邮件途径传播的计算机病毒的特点,探讨了邮件病毒传播模型.在不同的感染率和恢复率条件下,通过变更感染源,分别采用不同的阻断策略.在中国教育网中对病毒的传播和控制进行了演化模拟,提出了在资源有限的条件下复杂网络控制病毒传播的有效策略.  相似文献   

13.
阐述了计算机病毒的概念以及图书馆内常见的计算机病毒及其发展趋势,结合南京人口管理干部学院图书馆的实际情况,提出了积极有效的管理措施以构筑全面的、立体的、多层次的计算机病毒防御体系,以更好地保障图书馆的网络服务。  相似文献   

14.
从电脑病毒及它的传染性等方面入手讨论了电脑病毒的特点及传染的规律。  相似文献   

15.
利用802.1x技术加强校园网安全管理   总被引:2,自引:0,他引:2  
随着网络的快速发展,校园网中存在的很多安全问题也日渐突出,主要表现在IP和MAC地址冒用和网络病毒的快速传播.利用802.1x技术不仅做到入网即认证,弥补以太网安全接入的不足,还可以有效地解决校园网中存在的一些安全问题,从而加强校园网的安全管理.  相似文献   

16.
分析了网络病毒对网络安全的危害以及病毒在网络中的各种传播方式,提出计算机网络病毒的防治应从管理措施上着手,并综合防火墙技术、病毒防治软件、软件更新、数据备份等多种技术措施对网络病毒进行防治。  相似文献   

17.
基于复杂网络理论的手机病毒传播模型研究   总被引:1,自引:0,他引:1  
随着智能手机不断发展和普及,基于智能手机平台传播的病毒也随即产生并迅速发展.研究手机病毒传播的特征和规律,有助于对其进行有效的防御和控制.结合当前的研究热点复杂网络理论,对智能手机病毒传播网络建模并通过计算机仿真证明了该方法的有效性.  相似文献   

18.
介绍了实际网络操作中常遇到的8种病毒及其在网络中的运作,分析了这8种病毒对NetWare网的危害,并且针对网络的实际情况,制定了网络安全的措施。  相似文献   

19.
计算机病毒被喻为 2 1世纪计算机犯罪的五大手段之一 ,并排序为第二。计算机病毒的攻击性 ,在于它能够破坏各种程序并蔓延于应用领域。目前世界上上亿用户受着计算机病毒的困扰 ,有些还陷入极度的恐慌之中。事实上人们产生上述不安的原因 ,在与对计算机病毒的误解 ,广大计算机用户有必要对计算机病毒的一些知识有一个比较明确的认识和全面的科学态度  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号