首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 154 毫秒
1.
A new evolutionary algorithm for function optimization   总被引:27,自引:1,他引:26  
A new algorithm based on genetic algorithm(GA) is developed for solving function optimization problems with inequality constraints. This algorithm has been used to a series of standard test problems and exhibited good performance. The computation results show that its generality, precision, robustness, simplicity and performance are all satisfactory. Foundation item: Supported by the National Natural Science Foundation of China (No. 69635030), National 863 High Technology Project of China, the Key Scientific Technology Development Project of Hubei Province. Biography: GUO Tao(1971-), male, Ph D, research interests are in evolutionary computation and network computing.  相似文献   

2.
Here we present one design based on OWDP for secure high-speed IP network performance monitor system. Based on the analysis of OWDP protocol and the high-speed IP network performance's real-time monitor infrastructure, the paper illustrates the potential security problems in OWDP and its possible weakness when applied in the monitor infrastructure. One secure improvement design based on Otway-Rees authentication protocol is put forward, which can improve the security of the implementation of OWDP and the monitor architecture. Having kept OWDP's simplicity and efficiency, the design satisfies the real-time demand of high-speed network performance monitor and will effectively safeguard the monitor procedure against intensive attacks. Foundation item: Supported by the 863 National High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province (991P110) Biography: Xu Ning (1975-), male, Master candidate, research interest: distributed system, computer security.  相似文献   

3.
An MLP(Multi-Layer Perceptron)/ Elman neural network is proposed in this paper, which realizes classification with memory of past events using the real-time classification of MI.P and the memorial functionality of Elman. The system‘s sensitivity for the memory of past events can be easily reconfigured without retraining the whole network. This approach can be used for both misuse and anomaly detection system. The intrusion detection systems(IDSs) using the hybrid MLP/Elman neural network are evaluated by the intrusion detection evaluation data sponsored by U. S. Defense Advanced Research Projects Agency (DARPA). The results of experiment are presented in Receiver Operating Characteristic (ROC) curves. The capabilites of these IDSs to identify Deny of Service(DOS) and probing attacks are enhanced.  相似文献   

4.
This paper introduced a performance evaluating approach of computer communication system based on the simulation and measurement technology, and discussed its evaluating models. The result of our experiment showed that the outcome of practical measurement on Ether-LAN fitted in well with the theoretical analysis. The approach we presented can be used to define various kinds of artificially simulated load models conveiently, build all kinds of network application environments in a flexible way, and exert sufficiently the widely-used and high-precision features of the traditional simulation technology and the reality, reliability, adaptability features of measurement technology. Foundation item: Supported by the National 863 High-Tech Project of China (863-300-02-09-99) and by Key Research Project of Hubei Province (991P110) Biography: CAO Yang(1943-), male, Professor, Research interests are in computer network and distributed processing.  相似文献   

5.
A system designed for supporting the network performance analysis and forecast effort is presented, based on the combination of offline network analysis and online real-time performance forecast. The off-line analysis will perform analysis of specific network node performance, correlation analysis of relative network nodes performance and evolutionary mathematical modeling of long-term network performance measurements. The online real-time network performance forecast will be based on one so-called hybrid prediction modeling approach for short-term network, performance prediction and trend analysis. Based on the module design, the system proposed has good intelligence, scalability and self-adaptability, which will offer highly effective network performance analysis and forecast tools for network managers, and is one ideal support platform for network performance analysis and forecast effort. Foundation item: Supported by the National 863 High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province (991P110) Biography: Wang Zhi(1977-), male, Master candidate, research direction, intelligent network management and performance evaluation.  相似文献   

6.
Recently Guo Tao proposed a stochastic search algorithm in his PhD thesis for solving function optimization problems. He combined the subspace search method (a general multi-parent recombination strategy) with the population hill-climbing method. The former keeps a global search for overall situation, and the latter keeps the convergence of the algorithm. Guo's algorithm has many advantages, such as the simplicity of its structure, the higher accuracy of its results, the wide range of its applications, and the robustness of its use. In this paper a preliminary theoretical analysis of the algorithm is given and some numerical experiments has been done by using Guo's algorithm for demonstrating the theoretical results. Three asynchronous parallel evolutionary algorithms with different granularities for MIMD machines are designed by parallelizing Guo's Algorithm. National Laboratory for Parallel and Distributed Processing Foundation item: Supported by the Natonal Natural Science Foundation of China (No. 70071042, 50073043), the National 863 Hi-Tech Project of China (No. 863-306-ZT06-06-3) and the National Laboratory for Parallel and Distributed Processing. Biography: Kang Li-shan (1934-), male, Professor, research interests: parallel computing and evolutionary computation.  相似文献   

7.
The planning and scheduling in real shop floor is actually achieved by coordination between different persons. In this process, cooperation is mainstream, but competition also exists, for example, the competition between different groups, operators with the same skill, etc. In multi-agent based shop floor management and control system, this competition and cooperation relation must be embodied. The general process of shop floor production planning and scheduling is studied, and a colored Petri-net model for the competition and cooperation process of three main agents in such system to achieve shop floor production planning and scheduling is presented. The evaluating method of bids in bidding process that especially embodies the competition relationship is also presented. This colored Petri-net model gives a clear illustration of this complex coordination process to system designers, effectively promotes the cooperative development. Foundation item: Supported partly by the Hi-tech Program of China (China 863) (No. 863-511-943-009) and the National Natural Science Foundation of China(No. 59990470) Biography: Liu Shi-ping(1971-), male, Ph. D. candidate, research direaction: CIMS, intelligent manufacturing.  相似文献   

8.
This paper examines task partition problem in a Multiagent-based Distributed Open Computing Environment Model (MDOCEM). We first present a formal method to describe the task partition problem, then give a heuristic algorithm to solve the task partition problem that gives an approximate optimum solution. Foundation item: Supported partially by the National 863 High Technology Project (863-306-05-01-1B) Biography: He Yan-xiang (1952-), male, Professor, Research interests include distributed OS and distributed information processing, distributed software engineering, parallel compiler.  相似文献   

9.
A new synthetical knowledge representation model that integrates the attribute grammar model with the semantic network model was presented. The model mainly uses symbols of attribute grammar to establish a set of syntax and semantic rules suitable for a semantic network. Based on the model, the paper introduces a formal method defining data flow diagrams (DFD) and also simply explains how to use the method. Supported by the National Natural Science Foundation of China Liu Xiang: born in June 1973, MS graduate student  相似文献   

10.
We discuss the basic intrusion detection techniques, and focus on how to apply association rules to intrusion detection. Begin with analyzing some close relations between user’s behaviors, we discuss the mining algorithm of association rules and apply to detect anomaly in IDS. Moreover, according to the characteristic of intrusion detection, we optimize the mining algorithm of association rules, and use fuzzy logic to improve the system performance. Foundation item: Supported by the National Natural Science Foundation of China (69983005) Biography: Mao Ping-ping (1979-), male, Master candidate, research direction: multimedia and network security.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号