首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Here we present one design based on OWDP for secure high-speed IP network performance monitor system. Based on the analysis of OWDP protocol and the high-speed IP network performance's real-time monitor infrastructure, the paper illustrates the potential security problems in OWDP and its possible weakness when applied in the monitor infrastructure. One secure improvement design based on Otway-Rees authentication protocol is put forward, which can improve the security of the implementation of OWDP and the monitor architecture. Having kept OWDP's simplicity and efficiency, the design satisfies the real-time demand of high-speed network performance monitor and will effectively safeguard the monitor procedure against intensive attacks. Foundation item: Supported by the 863 National High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province (991P110) Biography: Xu Ning (1975-), male, Master candidate, research interest: distributed system, computer security.  相似文献   

2.
A system designed for supporting the network performance analysis and forecast effort is presented, based on the combination of offline network analysis and online real-time performance forecast. The off-line analysis will perform analysis of specific network node performance, correlation analysis of relative network nodes performance and evolutionary mathematical modeling of long-term network performance measurements. The online real-time network performance forecast will be based on one so-called hybrid prediction modeling approach for short-term network, performance prediction and trend analysis. Based on the module design, the system proposed has good intelligence, scalability and self-adaptability, which will offer highly effective network performance analysis and forecast tools for network managers, and is one ideal support platform for network performance analysis and forecast effort. Foundation item: Supported by the National 863 High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province (991P110) Biography: Wang Zhi(1977-), male, Master candidate, research direction, intelligent network management and performance evaluation.  相似文献   

3.
Knowledge discovery from communication network alarm databases   总被引:2,自引:0,他引:2  
The technique of Knowlege Discovery in Databases (KDD) to learn valuable knowledge hidden in network alarm databases is introduced. To get such knowledge, we propose an efficient method based on sliding windows (named as Slidwin) to discover different episode rules from time squential alarm data. The experimental results show that given different thresholds parameters, large amount of different rules could be discovered quickly. Foundation item: Supported by the National 863 High-Tech Project (863-306-Z705-02) and National Natural Science Foundation of China (69896240) Biography: Wang Xi-miao (1973-), female, Ph. D. candidate. Research interests: network management and information processing.  相似文献   

4.
This paper proposes a security enhancement scheme for disaster tolerant system based on trusted computing technology which combines with the idea of distributed threshold storage. This scheme takes advantage of trusted computing platform with trusted computing module, which is provided with such excellent features as security storage, remote attestation, and so on. Those features effectively ensure trustworthiness of disaster tolerant point. Furthermore, distributed storage based on Erasure code not only disposes the storage problem about a great deal of data, but also preferably avoids one node invalidation, alleviates network load and deals with joint cheat and many other security problems. Consequently, those security enhancement technologies provide mass data with global security protection during the course of disaster tolerance. Foundation Items: Supported by the National High Technology Research and Development Program of China (863 Program) (2008AA01Z404), the Science and Technical Key Project of Ministry of Education (108087) and the Scientific and Technological Project of Wuhan City (200810321130)  相似文献   

5.
The “shooting and bouncing rays” (SBR) technique is used to analyze the electromagnetic scattering characters of ocean rough surfaces varying with time. Some numerical results are presented and compared with the method of moments, and some factors, such as the incident angle, polarization and frequency are investigated which influence on electromagnetic scattering characters of ocean rough surfaces. Foundation item: Supported by the 863 High Technology Project of China (863-818-01-02) Biography: GAO Huo-tao(1964-), male, Ph. D. candidate. Research direction: electromagnetic field theory and engineering application  相似文献   

6.
This paper examines task partition problem in a Multiagent-based Distributed Open Computing Environment Model (MDOCEM). We first present a formal method to describe the task partition problem, then give a heuristic algorithm to solve the task partition problem that gives an approximate optimum solution. Foundation item: Supported partially by the National 863 High Technology Project (863-306-05-01-1B) Biography: He Yan-xiang (1952-), male, Professor, Research interests include distributed OS and distributed information processing, distributed software engineering, parallel compiler.  相似文献   

7.
Real time communication (RTC) frequency selecting system is used to the maximum usable frequency (MUF) between two communication points, then finds the best frequency between 0. 85 MUF and 1. 0 MUF. Determination of electric wave delay is mostly introduced, and of MUF values, the form of frequency-controlling code and relative interface circuits in the frequency selecting system are introduced in detail. Foundation item: Supported by the 863 High Technology Project of China (863-818-01-02) Biography: SHI Zhen-hua(1999-), male, Professor. Research direction, radio communication and radar system.  相似文献   

8.
Serial communications programming in Windows95 with API functions   总被引:1,自引:0,他引:1  
This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Windows95. The related sample codes of the applications of this technique written in C++ programming language are also given. This technique is applied successfully to receive the data of the radio noise from a frequency monitor. Foundation item: Supported by the 863 High Technology Project of China (863-818-01-02) Biography: Wang Cheng-hu(1975-), male, Master candidate, research direction: ocean remote sensing.  相似文献   

9.
Based on Remote Sensing (RS), Geographic Information System (GIS), and combining Principal Component Analysis, this paper designed a numerical integrated evaluation model for mountain eco-environment on the base of grid scale. Using this model, we evaluated the mountain eco-environmental quality in a case study area-the upper reaches of Minjiang River, and achieved a good result, which accorded well with the real condition. The study indicates that, the integrated evaluation model is suitable for multi-layer spatial factor computation, effectively lowing man's subjective influence in the evaluation process; treating the whole river basin as a system, the model shows full respect to the circulation of material and energy, synthetically embodies the determining impact of such natural condition as water-heat and landform, as well as human interference in natural eco-system; the evaluation result not only clearly presents mountainous vertical distribution features of input factors, but also provides a scientific and reliable thought for quantitatively evaluating mountain eco-environment.  相似文献   

10.
Because of the iterative process in the rate control algorithm of H.264 draft, it is not suitable for real-time transmission. A two-layer real-time rate control algorithm based on Lagrange optimum algorithm is proposed. This algorithm consists of two layers, namely, the group of pictures (GOP) layer and the frame layer. The simulation results show that the proposed algorithm is competitive in terms of peak signal to noise ratio (PSNR), real bitrates and the Q-value among frames over the original algorithm. Foundation item: Supported by the National High-Technology Research and Development Program of China (863 Program) (2001AA132050-03) and the Key Project of Chinese Ministry of Education (211CERS-10)  相似文献   

11.
铸造过程计算机模拟研究应用现状与发展   总被引:4,自引:0,他引:4  
概述了计算机技术在铸造过程模拟中的产生、发展和研究应用现状。介绍了一些常用的充型和凝固过程数值模拟软件,对国内相关模拟软件的开发、选择提供参考,并对今后铸造过程模拟的发展进行了评述,指出铸造过程模拟软件需要完善模型,优化算法,制定精确高效的数值计算方法;应能综合考虑不同生产细节预测和解决铸件缺陷;在网络环境下,将设计、模拟、制造、评估等环节并行集中为一个系统应是重点发展方向。  相似文献   

12.
Content-based filtering E-commerce recommender system was discussed fully in this paper. Users' unique features can be explored by means of vector space model firstly. Then based on the qualitative value of products informa tion, the recommender lists were obtained. Since the system can adapt to the users' feedback automatically, its performance were enhanced comprehensively. Finally the evaluation of the system and the experimental results were presented.  相似文献   

13.
A new evolutionary algorithm for function optimization   总被引:27,自引:1,他引:26  
A new algorithm based on genetic algorithm(GA) is developed for solving function optimization problems with inequality constraints. This algorithm has been used to a series of standard test problems and exhibited good performance. The computation results show that its generality, precision, robustness, simplicity and performance are all satisfactory. Foundation item: Supported by the National Natural Science Foundation of China (No. 69635030), National 863 High Technology Project of China, the Key Scientific Technology Development Project of Hubei Province. Biography: GUO Tao(1971-), male, Ph D, research interests are in evolutionary computation and network computing.  相似文献   

14.
The recent development of telemetry system is driven by the fast development of technology in the field of computer and network. The systematic introduction is provided to: digital video and image processing, network communication and the realization of those techniques in computer. Biography: ZHENG Dong (1975-), male, Master candidate. Research direction: multimedia and network, digital image processing.  相似文献   

15.
A new lens calibration method which is suitable for all kinds of cameras is presented. Based on the linear feature in the image, this method does not require the determination of point correspondence between a scene and the image of the scene. By applying B-spline surface fitting, all kinds of lens distortion models can be simulated. The control points of B-spline surface are estimated iteratively to extract linear feature from the distorted image. Compared with traditional calibration method, which requires either corresponding point pairs or distortion model of lens, or both of them, this method has its unique advantage. Experimental results show the effectiveness of the method. Foundation Item: Supported by the Chen Guang Project Biography: CHEN Shu-zhen (1946), female, Professor, Research direction digital image processing, computer vision.  相似文献   

16.
Based on time correlation characteristic, width correlation characteristic and frequency correlation characteristic of detecting pulses, several methods are introduced to control random or periodic noise whose width is narrower than 1 ms or wider than 3 ms in Frequency Selection Detecting Radar System. The software flow chart and the results of the experiment are also given. Foundation item: Supported by the 863 High Technology Project of China (863-81802) Biography: Shi Xin-zhi(1977-), female, Master candidate, research interest: signal processing.  相似文献   

17.
An MLP(Multi-Layer Perceptron)/ Elman neural network is proposed in this paper, which realizes classification with memory of past events using the real-time classification of MI.P and the memorial functionality of Elman. The system‘s sensitivity for the memory of past events can be easily reconfigured without retraining the whole network. This approach can be used for both misuse and anomaly detection system. The intrusion detection systems(IDSs) using the hybrid MLP/Elman neural network are evaluated by the intrusion detection evaluation data sponsored by U. S. Defense Advanced Research Projects Agency (DARPA). The results of experiment are presented in Receiver Operating Characteristic (ROC) curves. The capabilites of these IDSs to identify Deny of Service(DOS) and probing attacks are enhanced.  相似文献   

18.
IntelligentPad approach provides a standard for dynamically linkable components. Based on the standard, this paper introduces an approach of developing dynamically linkable components by using object oriented techniques. Supported by the Foundation of National 863 High Technique Project Zhu Chunyan: born in 1973, Graduate student  相似文献   

19.
王虹 《高等职业教育》2009,18(6):54-55,64
随着计算机技术和网络技术的飞速发展,各种型号的数字语言学习系统先后问世,语言实验室的建设也逐渐从模拟化转向数字化、网络化。在分析数字语言学习系统的类型及技术特点的基础上,结合学校的数字网络语言实验室的使用,探讨数字网络语言实验室在外语教学中的应用与管理以及应当注意的问题。  相似文献   

20.
层次分析法在计算机联网技术中的应用   总被引:2,自引:0,他引:2  
对当前计算机联网的几种主要技术按层次进行分解细化,确定评价因素的权重,建立一个计算机联网技术选型的数学模型,通过对权重的分析得到利用帧中继(FR)技术组建计算机网络具有最好的性能/价格比的结论,这对农村信用合作联社计算机网络系统的构建具有很好的指导意义。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号