共查询到10条相似文献,搜索用时 154 毫秒
1.
A new evolutionary algorithm for function optimization 总被引:27,自引:1,他引:26
A new algorithm based on genetic algorithm(GA) is developed for solving function optimization problems with inequality constraints.
This algorithm has been used to a series of standard test problems and exhibited good performance. The computation results
show that its generality, precision, robustness, simplicity and performance are all satisfactory.
Foundation item: Supported by the National Natural Science Foundation of China (No. 69635030), National 863 High Technology
Project of China, the Key Scientific Technology Development Project of Hubei Province.
Biography: GUO Tao(1971-), male, Ph D, research interests are in evolutionary computation and network computing. 相似文献
2.
Here we present one design based on OWDP for secure high-speed IP network performance monitor system. Based on the analysis
of OWDP protocol and the high-speed IP network performance's real-time monitor infrastructure, the paper illustrates the potential
security problems in OWDP and its possible weakness when applied in the monitor infrastructure. One secure improvement design
based on Otway-Rees authentication protocol is put forward, which can improve the security of the implementation of OWDP and
the monitor architecture. Having kept OWDP's simplicity and efficiency, the design satisfies the real-time demand of high-speed
network performance monitor and will effectively safeguard the monitor procedure against intensive attacks.
Foundation item: Supported by the 863 National High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province
(991P110)
Biography: Xu Ning (1975-), male, Master candidate, research interest: distributed system, computer security. 相似文献
3.
YAOYu YUGe GAOFu-xiang 《武汉大学学报:自然科学英文版》2005,10(1):115-118
An MLP(Multi-Layer Perceptron)/ Elman neural network is proposed in this paper, which realizes classification with memory of past events using the real-time classification of MI.P and the memorial functionality of Elman. The system‘s sensitivity for the memory of past events can be easily reconfigured without retraining the whole network. This approach can be used for both misuse and anomaly detection system. The intrusion detection systems(IDSs) using the hybrid MLP/Elman neural network are evaluated by the intrusion detection evaluation data sponsored by U. S. Defense Advanced Research Projects Agency (DARPA). The results of experiment are presented in Receiver Operating Characteristic (ROC) curves. The capabilites of these IDSs to identify Deny of Service(DOS) and probing attacks are enhanced. 相似文献
4.
This paper introduced a performance evaluating approach of computer communication system based on the simulation and measurement
technology, and discussed its evaluating models. The result of our experiment showed that the outcome of practical measurement
on Ether-LAN fitted in well with the theoretical analysis. The approach we presented can be used to define various kinds of
artificially simulated load models conveiently, build all kinds of network application environments in a flexible way, and
exert sufficiently the widely-used and high-precision features of the traditional simulation technology and the reality, reliability,
adaptability features of measurement technology.
Foundation item: Supported by the National 863 High-Tech Project of China (863-300-02-09-99) and by Key Research Project of
Hubei Province (991P110)
Biography: CAO Yang(1943-), male, Professor, Research interests are in computer network and distributed processing. 相似文献
5.
A system designed for supporting the network performance analysis and forecast effort is presented, based on the combination
of offline network analysis and online real-time performance forecast. The off-line analysis will perform analysis of specific
network node performance, correlation analysis of relative network nodes performance and evolutionary mathematical modeling
of long-term network performance measurements. The online real-time network performance forecast will be based on one so-called
hybrid prediction modeling approach for short-term network, performance prediction and trend analysis. Based on the module
design, the system proposed has good intelligence, scalability and self-adaptability, which will offer highly effective network
performance analysis and forecast tools for network managers, and is one ideal support platform for network performance analysis
and forecast effort.
Foundation item: Supported by the National 863 High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province
(991P110)
Biography: Wang Zhi(1977-), male, Master candidate, research direction, intelligent network management and performance evaluation. 相似文献
6.
Recently Guo Tao proposed a stochastic search algorithm in his PhD thesis for solving function optimization problems. He combined
the subspace search method (a general multi-parent recombination strategy) with the population hill-climbing method. The former
keeps a global search for overall situation, and the latter keeps the convergence of the algorithm. Guo's algorithm has many
advantages, such as the simplicity of its structure, the higher accuracy of its results, the wide range of its applications,
and the robustness of its use.
In this paper a preliminary theoretical analysis of the algorithm is given and some numerical experiments has been done by
using Guo's algorithm for demonstrating the theoretical results. Three asynchronous parallel evolutionary algorithms with
different granularities for MIMD machines are designed by parallelizing Guo's Algorithm.
National Laboratory for Parallel and Distributed Processing
Foundation item: Supported by the Natonal Natural Science Foundation of China (No. 70071042, 50073043), the National 863 Hi-Tech
Project of China (No. 863-306-ZT06-06-3) and the National Laboratory for Parallel and Distributed Processing.
Biography: Kang Li-shan (1934-), male, Professor, research interests: parallel computing and evolutionary computation. 相似文献
7.
Model of production planning and scheduling in shop floor based on collaboration and competition 总被引:1,自引:0,他引:1
The planning and scheduling in real shop floor is actually achieved by coordination between different persons. In this process,
cooperation is mainstream, but competition also exists, for example, the competition between different groups, operators with
the same skill, etc. In multi-agent based shop floor management and control system, this competition and cooperation relation
must be embodied. The general process of shop floor production planning and scheduling is studied, and a colored Petri-net
model for the competition and cooperation process of three main agents in such system to achieve shop floor production planning
and scheduling is presented. The evaluating method of bids in bidding process that especially embodies the competition relationship
is also presented. This colored Petri-net model gives a clear illustration of this complex coordination process to system
designers, effectively promotes the cooperative development.
Foundation item: Supported partly by the Hi-tech Program of China (China 863) (No. 863-511-943-009) and the National Natural
Science Foundation of China(No. 59990470)
Biography: Liu Shi-ping(1971-), male, Ph. D. candidate, research direaction: CIMS, intelligent manufacturing. 相似文献
8.
This paper examines task partition problem in a Multiagent-based Distributed Open Computing Environment Model (MDOCEM). We
first present a formal method to describe the task partition problem, then give a heuristic algorithm to solve the task partition
problem that gives an approximate optimum solution.
Foundation item: Supported partially by the National 863 High Technology Project (863-306-05-01-1B)
Biography: He Yan-xiang (1952-), male, Professor, Research interests include distributed OS and distributed information processing,
distributed software engineering, parallel compiler. 相似文献
9.
A new synthetical knowledge representation model that integrates the attribute grammar model with the semantic network model
was presented. The model mainly uses symbols of attribute grammar to establish a set of syntax and semantic rules suitable
for a semantic network. Based on the model, the paper introduces a formal method defining data flow diagrams (DFD) and also
simply explains how to use the method.
Supported by the National Natural Science Foundation of China
Liu Xiang: born in June 1973, MS graduate student 相似文献
10.
We discuss the basic intrusion detection techniques, and focus on how to apply association rules to intrusion detection. Begin
with analyzing some close relations between user’s behaviors, we discuss the mining algorithm of association rules and apply
to detect anomaly in IDS. Moreover, according to the characteristic of intrusion detection, we optimize the mining algorithm
of association rules, and use fuzzy logic to improve the system performance.
Foundation item: Supported by the National Natural Science Foundation of China (69983005)
Biography: Mao Ping-ping (1979-), male, Master candidate, research direction: multimedia and network security. 相似文献