首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 855 毫秒
1.
Intrusion detection system can make effective alarm for illegality of network users, which is absolutely necessarily and important to build security environment of communication base service. According to the principle that the number of network traffic can affect the degree of self-similar traffic, the paper investigates the variety of self-similarity resulted from unconventional network traffic. A network traffic model based on normal behaviors of user is proposed and the Hurst parameter of this model can be calculated. By comparing the Hurst parameter of normal traffic and the self-similar parameter, we can judge whether the network is normal or not and alarm in time.  相似文献   

2.
Self-organization criticality of debris flow rheology   总被引:3,自引:0,他引:3  
Based on the viewpoint of stress and strain serf-organization criticality of debris flow mass, this paper probes into inter-nonlinear action between different factors in the thixotropic liquefaction system of loose clastic soil on slope to make clastic soil in slope develop naturally towards critical stress status, and slope debris flow finally occurs under trigging by rainstorm. Also according to observation and analysis of self-organization criticality of sediment runoff system of viscous debris flow surges in ravines and power relation between magnitude and frequency of debris flows,this paper expounds similarity of the self-organized structure of debris flow mass. The self-organized critical system is a weak chaotic system. Debris flow occurrences can be predicted accordingly by means of observation at certain time scale and analysis of self-organization criticality of magnitude, frequency and time interval of debris flows.  相似文献   

3.
Using the fact that the factorization of x^N-1 over GF(2) is especially explicit, we completely establish the distributions and the expected values of the linear complexity and the k-error linear complexity of the N-periodic sequences respectively, where N is an odd prime and 2 is a primitive root modulo N. The results show that there are a large percentage of sequences with both the linear complexity and the k-error linear complexity not less than N, quite close to their maximum possible values.  相似文献   

4.
Digital broadcasting system has become a highlight of research on computer application. To respond to the changes of the playbill in the broadcasting system in real time, the response time of the system must be studied. There is scarcely the research on this area currently. The influence factors in the response time are analyzed; the model on the response time of the system service is built; how the influence factors affect the response time of the system service is validated; and four improvement measures are proposed to minimize the response time of system service.  相似文献   

5.
The k-error linear complexity and the linear complexity of the keystream of a stream cipher are two important standards to scale the randomness of the key stream. For a pq^n-periodic binary sequences where p, q are two odd primes satisfying that 2 is a primitive root module p and q^2 and gcd(p-1, q-1) = 2, we analyze the relationship between the linear complexity and the minimum value k for which the k-error linear complexity is strictly less than the linear complexity.  相似文献   

6.
In this paper, by studying the different kinds of jetting system in patternless casting manufacturing (PCM) technique, the different types of jetting mode are tested which affect whether PCM process can be done successful. The two different kinds of jetting device and their control circuits are designed based on which the relationship between the jetting system and amount of the catalyst flow is analyzed. The experiments show that the amount of the catalyst by using discrete jetting mode in the discrete jetting device is much lower than that by using continuous jetting mode in the discrete jetting device and in the continuous device when the pressured is fixed. At the same time, in the discrete jetting mode the amount of the catalyst flow can also be changed by adjusting the pulse frequency and its duty cycle, this can ensure the strength of the sand mould. The flow of catalyst in this discrete jetting device can match the scanning speed of the jetting device in real time which will improve the resolution and building precision of casting mould. When the amount of the catalyst jetting is too large, PCM process will fail.  相似文献   

7.
Based on the equilibrium theory of chemical reactions between water and rocks,this paper establishes a thermodynamic phase relationship diagram among calcites,dolomites and water solution under the condition of diagenesis based on the thermodynamic database of related minerals and fluids and dolomite's degree of order parameters.It has been discovered that the equilibrium between calcites and dolomites in the diagenetic environment is strongly impacted by temperature and the Ca/Mg ratios in groundwater,and that the dolomite's degree of order in the diagenetic environment is a function of crystallization temperature and time,not controlled by water solution.Hereby,the authors make a further analysis of the close relationship of chemical reaction between carbonate cements and pore water in the sandstone reservoirs of Kala 2 gas field in Kuche sag.It can be seen that there are different impacts on sandstone reservoir quality among the equilibrium system of calcites,dolomites and pore water at different depths of reservoirs.  相似文献   

8.
The archiving of Internet traffic is an essential function for retrospective network event analysis and forensic computer communication. The state-of-the-art approach for network monitoring and analysis involves storage and analysis of network flow statistic. However, this approach loses much valuable information within the Internet traffic. With the advancement of commodity hardware, in particular the volume of storage devices and the speed of interconnect technologies used in network adapter cards and multi-core processors, it is now possible to capture 10 Gbps and beyond real-time network traffic using a commodity computer, such as n2disk. Also with the advancement of distributed file system (such as Hadoop, ZFS, etc.) and open cloud computing platform (such as OpenStack, CloudStack, and Eucalyptus, etc.), it is practical to store such large volume of traffic data and fully in-depth analyse the inside communication within an acceptable latency. In this paper, based on well- known TimeMachine, we present TIFAflow, the design and implementation of a novel system for archiving and querying network flows. Firstly, we enhance the traffic archiving system named TImemachine+FAstbit (TIFA) with flow granularity, i.e., supply the system with flow table and flow module. Secondly, based on real network traces, we conduct performance comparison experiments of TIFAflow with other implementations such as common database solution, TimeMachine and TIFA system. Finally, based on comparison results, we demonstrate that TIFAflow has a higher performance improvement in storing and querying performance than TimeMachine and TIFA, both in time and space metrics.  相似文献   

9.
The configuration principles and functions of the non-contact three-dimensional (3D) body measurement system (BMS) developed by the Textile/Clothing Technology Corporation ([TC]^2) are described in this paper. The advantages of this new system, compared with traditional contact body measurement instruments ( Martin instruments ) are discussed by selecting 40 female undergraduates of Donghna University as the scan objects. In the experiments both the Martin instruments and [TC]^2 BMS were used respectively. According to the data of different position (Bust Circumference, Full Waist, Full Hips, Bust Height, Front Waist Height and Back Waist Height) obtained from both of the methods we can get the correlation coefficient which is close to 1, indicating that the results of both methods have comparability. Finally some suggestions for the further applications of the non-contact BMS in the apparel development of China are given.  相似文献   

10.
Take a digital libraries' service system for example, Objects Served Relationship Management (OSRM) in complex systems is proposed firstly as a new concept, and its connotation is explained. The significances and constructions of OSRM are analyzed. Both the fundamental facts and the important natures that the things which are interested by Objects Served (OS) (e. g. publishers and readers) and the server (e. g. digital libraries are the servers of publishers and readers) will not be the same completely although there are a lot of common benefits between OS and servers, are indeed clarified. The valuable information,which should be used by OS and their server, is often hidden behind them. Thus, how to find, manage and control the relationship among OS and their servers is very necessary and important for the common benefits among all of them.(e. g. the three dimensions of OSRM in digital library system and its overall framwork are proposed. The different strategies to different cases in the digital library's multidimensional framework are analyzed.)  相似文献   

11.
Cross-correlating traffic flow data at different intersections in an urban transportation network is important for understanding the collective behavior of constituents in a complex system and for predicting the risk of network-wide congestion. In this work, a Random Matrix Theory (RMT) based method is used to describe the collective behavior from massive traffic data sets. Nonrandom correlations between traffic flow series recorded in the Beijing road network occur both with and without detrending. The effect of the traffic load on the correlation patterns of network-wide traffic flows is analyzed using the RMT analysis of a simulated data set collected from Paramics. The RMT analysis is also used to evaluate the impact of incidents on the network-wide traffic status. Cluster analysis is used to find the largest cluster in the network which indicates the critical congestion caused by the incident. All the results show that RMT analyses are an effective method for investigating systematic interactions in urban transportation systems.  相似文献   

12.
In order to understand how a network is being used or whether it is being abused, an administrator needs to inspect the flow of the traffic and "infers" the intent of the users and applications. So the network traffic measurement and analysis are crucial to network monitoring, reliable DDoS detecting and attack source locating as well. In this paper, we discuss the principle of real-time network traffic measurement and analysis through embedding a traffic measurement and analysis engine into IP packet-decoding module, and emphasize the implementation of visualizing the real-time network traffic, which are helpful to network monitoring and network traffic modeling.  相似文献   

13.
In order to get thermal flow field of direct air-cooled system, the hot water was supplied to the model of direct air-cooled condenser(ACC). The particle image velocimetery (PIV) experiments were carried out to get thermal flow field of a ACC under different conditions in low velocity wind tunnel, at the same time, the recirculation ratio at cooling tower was measured, so the relationship between flow field characteristics and recirculation ratio of cooling tower can be discussed. From the results we can see that the flow field configuration around cooling tower has great effects on average recirculation ratio under cooling tower. The eddy formed around cooling tower is a key reason that recirculation produces. The eddy intensity relates to velocity magnitude and direction angle, and the configuration of eddy lies on the geometry size of cooling tower. So changing the flow field configuration around cooling tower reasonably can decrease recirculation ratio under cooling tower, and heat dispel effect of ACC can also be improved.  相似文献   

14.
In this paper, we explored a load-balancing algorithm in a cluster file system contains two levels of metadata-server, primary-level server quickly distributestasks to second-level servers depending on the closest load-balancing information. At the same time, we explored a method which accurately reflect I/O traffic and storage of storage-node: computing the heat-value of file, according to which we realized a more logical storage allocation. According to the experiment result, we conclude that this new algorithm shortens the executing time of tasks and improves the system performance compared with other load algorithm.  相似文献   

15.
The two important features of self-organizing maps (SOM), topological preservation and easy visualization, give it great potential for analyzing multi-dimensional time series, specifically traffic flow time series in an urban traffic network. This paper investigates the application of SOM in the representation and prediction of multi-dimensional traffic time series. Ffrst, SOMs are applied to cluster the time series and to project each multi-dimensional vector onto a two-dimensional SOM plane while preserving the topological relationships of the original data. Then, the easy visualization of the SOMs is utilized and several exploratory methods are used to investigate the physical meaning of the clusters as well as how the traffic flow vectors evolve with time. Finally, the k-nearest neighbor (kNN) algorithm is applied to the clustering result to perform short-term predictions of the traffic flow vectors. Analysis of real world traffic data shows the effec- tiveness of these methods for traffic flow predictions, for they can capture the nonlinear information of traffic flows data and predict traffic flows on multiple links simultaneously.  相似文献   

16.
This text uses the regional geological investigation data and the remote sensing image data of earthsatellite remote sensing to synthetically analyze the structural system of Taiwan region of China. Authors detection-marked and assurance-marked and divided 5 kinds of structural system of the Taiwan region: ( 1 ) the wreath-shaped structural system, (2) the N-N-E oriented structural system, (3) the S-N oriented structural system, (4) the N-E oriented structural system, (5) the are-shaped structural system. Combination of the texture faces and associated method were adopted to recover and reconstruct the structural evolution sequences and the formation periods. In this paper, problems such as the development process in geology etc. are also discussed, contributing new information to research the structural field of the East Asia and its tectonic plate movements and structural actions inside the land plate .  相似文献   

17.
The Forecasting and Warning System of Geological Disasters in China   总被引:2,自引:0,他引:2  
Geological disasters such as landslide and mudslide can be caused by many factors. Collaborations among different governmental agencies and multi-disciplines are necessary to establish a forecasting and warning system of geological disasters ( FWSGD). A FWSGD in China has been in operation since June 1 , 2003 as a joint project between the China Meteorological Administration (CMA) and the Ministry of Land and Resources ( MLR). This system has successfully shown very good social and economic benefits. The temporal-spatial distributions of China geological disasters and their causes have been analyzed in this paper. The FWSGD is described and its possible existing issues are also discussed. Authors suggest a new approach to study these disasters from interactions of the earth systems. Finally, a monitoring, forecasting, warning and preventing system for geological disasters in China is proposed.  相似文献   

18.
In this paper, wavelet transform is used to analyse the stochastic system with coular stationary noise as follows: dX(t)=F(t)X(t)dt B(t)u(t)dt G(t)N(t)dt For wavelet transform, its properties are analysed, and its density degree, wavelet expansion, correlation degree of expansion coefficient and their properties are obtained. All these results are new and useful.  相似文献   

19.
The main objective of this paper is to show an overview analysis of market power issues. Market power reflects the scarcity of power supply. It is the ability of a particular seller or group of sellers to maintain prices profitably above competitive levels for a significant period of time. Because the electric power system has its own characteristics that are different to other economic systems, both physical factors and economic factors of power system are key elements on this definition. We study some cases here, including different line limit levels, load levels and bid strategy through a market model based on OPF (optimal power flow) with a decommitment algorithm.  相似文献   

20.
A method to set up 3D collar prototype is developed in this paper by using the technique of cubic spline and bicubic surface patch. Then the relationship between the parameters of 3D collar prototype and different collar styles are studied. Based on the relationship, we can develop some algorithmsof transferring style requirements to the parameters value of the collar prototype, and obtain some generation rules for the design of 3D collar style. As such, the knowledge base can be constructed, and the intelligent design system of 3D collar style is built. Using the system, various 3D collar styles can be designed automatically to satisfy various style requirements.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号