共查询到20条相似文献,搜索用时 46 毫秒
1.
Here we present one design based on OWDP for secure high-speed IP network performance monitor system. Based on the analysis
of OWDP protocol and the high-speed IP network performance's real-time monitor infrastructure, the paper illustrates the potential
security problems in OWDP and its possible weakness when applied in the monitor infrastructure. One secure improvement design
based on Otway-Rees authentication protocol is put forward, which can improve the security of the implementation of OWDP and
the monitor architecture. Having kept OWDP's simplicity and efficiency, the design satisfies the real-time demand of high-speed
network performance monitor and will effectively safeguard the monitor procedure against intensive attacks.
Foundation item: Supported by the 863 National High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province
(991P110)
Biography: Xu Ning (1975-), male, Master candidate, research interest: distributed system, computer security. 相似文献
2.
A system designed for supporting the network performance analysis and forecast effort is presented, based on the combination
of offline network analysis and online real-time performance forecast. The off-line analysis will perform analysis of specific
network node performance, correlation analysis of relative network nodes performance and evolutionary mathematical modeling
of long-term network performance measurements. The online real-time network performance forecast will be based on one so-called
hybrid prediction modeling approach for short-term network, performance prediction and trend analysis. Based on the module
design, the system proposed has good intelligence, scalability and self-adaptability, which will offer highly effective network
performance analysis and forecast tools for network managers, and is one ideal support platform for network performance analysis
and forecast effort.
Foundation item: Supported by the National 863 High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province
(991P110)
Biography: Wang Zhi(1977-), male, Master candidate, research direction, intelligent network management and performance evaluation. 相似文献
3.
Knowledge discovery from communication network alarm databases 总被引:2,自引:0,他引:2
The technique of Knowlege Discovery in Databases (KDD) to learn valuable knowledge hidden in network alarm databases is introduced.
To get such knowledge, we propose an efficient method based on sliding windows (named as Slidwin) to discover different episode
rules from time squential alarm data. The experimental results show that given different thresholds parameters, large amount
of different rules could be discovered quickly.
Foundation item: Supported by the National 863 High-Tech Project (863-306-Z705-02) and National Natural Science Foundation
of China (69896240)
Biography: Wang Xi-miao (1973-), female, Ph. D. candidate. Research interests: network management and information processing. 相似文献
4.
This paper proposes a security enhancement scheme for disaster tolerant system based on trusted computing technology which
combines with the idea of distributed threshold storage. This scheme takes advantage of trusted computing platform with trusted
computing module, which is provided with such excellent features as security storage, remote attestation, and so on. Those
features effectively ensure trustworthiness of disaster tolerant point. Furthermore, distributed storage based on Erasure
code not only disposes the storage problem about a great deal of data, but also preferably avoids one node invalidation, alleviates
network load and deals with joint cheat and many other security problems. Consequently, those security enhancement technologies
provide mass data with global security protection during the course of disaster tolerance.
Foundation Items: Supported by the National High Technology Research and Development Program of China (863 Program) (2008AA01Z404), the Science
and Technical Key Project of Ministry of Education (108087) and the Scientific and Technological Project of Wuhan City (200810321130) 相似文献
5.
The “shooting and bouncing rays” (SBR) technique is used to analyze the electromagnetic scattering characters of ocean rough
surfaces varying with time. Some numerical results are presented and compared with the method of moments, and some factors,
such as the incident angle, polarization and frequency are investigated which influence on electromagnetic scattering characters
of ocean rough surfaces.
Foundation item: Supported by the 863 High Technology Project of China (863-818-01-02)
Biography: GAO Huo-tao(1964-), male, Ph. D. candidate. Research direction: electromagnetic field theory and engineering application 相似文献
6.
This paper examines task partition problem in a Multiagent-based Distributed Open Computing Environment Model (MDOCEM). We
first present a formal method to describe the task partition problem, then give a heuristic algorithm to solve the task partition
problem that gives an approximate optimum solution.
Foundation item: Supported partially by the National 863 High Technology Project (863-306-05-01-1B)
Biography: He Yan-xiang (1952-), male, Professor, Research interests include distributed OS and distributed information processing,
distributed software engineering, parallel compiler. 相似文献
7.
Real time communication (RTC) frequency selecting system is used to the maximum usable frequency (MUF) between two communication
points, then finds the best frequency between 0. 85 MUF and 1. 0 MUF. Determination of electric wave delay is mostly introduced,
and of MUF values, the form of frequency-controlling code and relative interface circuits in the frequency selecting system
are introduced in detail.
Foundation item: Supported by the 863 High Technology Project of China (863-818-01-02)
Biography: SHI Zhen-hua(1999-), male, Professor. Research direction, radio communication and radar system. 相似文献
8.
This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial
communications between a computer and other digital devices by the serial porst in Windows95. The related sample codes of
the applications of this technique written in C++ programming language are also given. This technique is applied successfully
to receive the data of the radio noise from a frequency monitor.
Foundation item: Supported by the 863 High Technology Project of China (863-818-01-02)
Biography: Wang Cheng-hu(1975-), male, Master candidate, research direction: ocean remote sensing. 相似文献
9.
LI Ainong WANG Angsheng HE Xiaorong FENG Wenlan ZHOU Wancun 《武汉大学学报:自然科学英文版》2006,11(4):969-976
Based on Remote Sensing (RS), Geographic Information System (GIS), and combining Principal Component Analysis, this paper designed a numerical integrated evaluation model for mountain eco-environment on the base of grid scale. Using this model, we evaluated the mountain eco-environmental quality in a case study area-the upper reaches of Minjiang River, and achieved a good result, which accorded well with the real condition. The study indicates that, the integrated evaluation model is suitable for multi-layer spatial factor computation, effectively lowing man's subjective influence in the evaluation process; treating the whole river basin as a system, the model shows full respect to the circulation of material and energy, synthetically embodies the determining impact of such natural condition as water-heat and landform, as well as human interference in natural eco-system; the evaluation result not only clearly presents mountainous vertical distribution features of input factors, but also provides a scientific and reliable thought for quantitatively evaluating mountain eco-environment. 相似文献
10.
Because of the iterative process in the rate control algorithm of H.264 draft, it is not suitable for real-time transmission.
A two-layer real-time rate control algorithm based on Lagrange optimum algorithm is proposed. This algorithm consists of two
layers, namely, the group of pictures (GOP) layer and the frame layer. The simulation results show that the proposed algorithm
is competitive in terms of peak signal to noise ratio (PSNR), real bitrates and the Q-value among frames over the original algorithm.
Foundation item: Supported by the National High-Technology Research and Development Program of China (863 Program) (2001AA132050-03) and
the Key Project of Chinese Ministry of Education (211CERS-10) 相似文献
11.
铸造过程计算机模拟研究应用现状与发展 总被引:4,自引:0,他引:4
概述了计算机技术在铸造过程模拟中的产生、发展和研究应用现状。介绍了一些常用的充型和凝固过程数值模拟软件,对国内相关模拟软件的开发、选择提供参考,并对今后铸造过程模拟的发展进行了评述,指出铸造过程模拟软件需要完善模型,优化算法,制定精确高效的数值计算方法;应能综合考虑不同生产细节预测和解决铸件缺陷;在网络环境下,将设计、模拟、制造、评估等环节并行集中为一个系统应是重点发展方向。 相似文献
12.
HE Weihong CAO Yi 《武汉大学学报:自然科学英文版》2006,11(5):1091-1096
Content-based filtering E-commerce recommender system was discussed fully in this paper. Users' unique features can be explored by means of vector space model firstly. Then based on the qualitative value of products informa tion, the recommender lists were obtained. Since the system can adapt to the users' feedback automatically, its performance were enhanced comprehensively. Finally the evaluation of the system and the experimental results were presented. 相似文献
13.
A new evolutionary algorithm for function optimization 总被引:27,自引:1,他引:26
A new algorithm based on genetic algorithm(GA) is developed for solving function optimization problems with inequality constraints.
This algorithm has been used to a series of standard test problems and exhibited good performance. The computation results
show that its generality, precision, robustness, simplicity and performance are all satisfactory.
Foundation item: Supported by the National Natural Science Foundation of China (No. 69635030), National 863 High Technology
Project of China, the Key Scientific Technology Development Project of Hubei Province.
Biography: GUO Tao(1971-), male, Ph D, research interests are in evolutionary computation and network computing. 相似文献
14.
The recent development of telemetry system is driven by the fast development of technology in the field of computer and network.
The systematic introduction is provided to: digital video and image processing, network communication and the realization
of those techniques in computer.
Biography: ZHENG Dong (1975-), male, Master candidate. Research direction: multimedia and network, digital image processing. 相似文献
15.
A new lens calibration method which is suitable for all kinds of cameras is presented. Based on the linear feature in the
image, this method does not require the determination of point correspondence between a scene and the image of the scene.
By applying B-spline surface fitting, all kinds of lens distortion models can be simulated. The control points of B-spline
surface are estimated iteratively to extract linear feature from the distorted image. Compared with traditional calibration
method, which requires either corresponding point pairs or distortion model of lens, or both of them, this method has its
unique advantage. Experimental results show the effectiveness of the method.
Foundation Item: Supported by the Chen Guang Project
Biography: CHEN Shu-zhen (1946), female, Professor, Research direction digital image processing, computer vision. 相似文献
16.
Based on time correlation characteristic, width correlation characteristic and frequency correlation characteristic of detecting
pulses, several methods are introduced to control random or periodic noise whose width is narrower than 1 ms or wider than
3 ms in Frequency Selection Detecting Radar System. The software flow chart and the results of the experiment are also given.
Foundation item: Supported by the 863 High Technology Project of China (863-81802)
Biography: Shi Xin-zhi(1977-), female, Master candidate, research interest: signal processing. 相似文献
17.
YAOYu YUGe GAOFu-xiang 《武汉大学学报:自然科学英文版》2005,10(1):115-118
An MLP(Multi-Layer Perceptron)/ Elman neural network is proposed in this paper, which realizes classification with memory of past events using the real-time classification of MI.P and the memorial functionality of Elman. The system‘s sensitivity for the memory of past events can be easily reconfigured without retraining the whole network. This approach can be used for both misuse and anomaly detection system. The intrusion detection systems(IDSs) using the hybrid MLP/Elman neural network are evaluated by the intrusion detection evaluation data sponsored by U. S. Defense Advanced Research Projects Agency (DARPA). The results of experiment are presented in Receiver Operating Characteristic (ROC) curves. The capabilites of these IDSs to identify Deny of Service(DOS) and probing attacks are enhanced. 相似文献
18.
IntelligentPad approach provides a standard for dynamically linkable components. Based on the standard, this paper introduces
an approach of developing dynamically linkable components by using object oriented techniques.
Supported by the Foundation of National 863 High Technique Project
Zhu Chunyan: born in 1973, Graduate student 相似文献
19.
随着计算机技术和网络技术的飞速发展,各种型号的数字语言学习系统先后问世,语言实验室的建设也逐渐从模拟化转向数字化、网络化。在分析数字语言学习系统的类型及技术特点的基础上,结合学校的数字网络语言实验室的使用,探讨数字网络语言实验室在外语教学中的应用与管理以及应当注意的问题。 相似文献
20.
层次分析法在计算机联网技术中的应用 总被引:2,自引:0,他引:2
对当前计算机联网的几种主要技术按层次进行分解细化,确定评价因素的权重,建立一个计算机联网技术选型的数学模型,通过对权重的分析得到利用帧中继(FR)技术组建计算机网络具有最好的性能/价格比的结论,这对农村信用合作联社计算机网络系统的构建具有很好的指导意义。 相似文献