首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A new evolutionary algorithm for function optimization   总被引:27,自引:1,他引:26  
A new algorithm based on genetic algorithm(GA) is developed for solving function optimization problems with inequality constraints. This algorithm has been used to a series of standard test problems and exhibited good performance. The computation results show that its generality, precision, robustness, simplicity and performance are all satisfactory. Foundation item: Supported by the National Natural Science Foundation of China (No. 69635030), National 863 High Technology Project of China, the Key Scientific Technology Development Project of Hubei Province. Biography: GUO Tao(1971-), male, Ph D, research interests are in evolutionary computation and network computing.  相似文献   

2.
Here we present one design based on OWDP for secure high-speed IP network performance monitor system. Based on the analysis of OWDP protocol and the high-speed IP network performance's real-time monitor infrastructure, the paper illustrates the potential security problems in OWDP and its possible weakness when applied in the monitor infrastructure. One secure improvement design based on Otway-Rees authentication protocol is put forward, which can improve the security of the implementation of OWDP and the monitor architecture. Having kept OWDP's simplicity and efficiency, the design satisfies the real-time demand of high-speed network performance monitor and will effectively safeguard the monitor procedure against intensive attacks. Foundation item: Supported by the 863 National High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province (991P110) Biography: Xu Ning (1975-), male, Master candidate, research interest: distributed system, computer security.  相似文献   

3.
An MLP(Multi-Layer Perceptron)/ Elman neural network is proposed in this paper, which realizes classification with memory of past events using the real-time classification of MI.P and the memorial functionality of Elman. The system‘s sensitivity for the memory of past events can be easily reconfigured without retraining the whole network. This approach can be used for both misuse and anomaly detection system. The intrusion detection systems(IDSs) using the hybrid MLP/Elman neural network are evaluated by the intrusion detection evaluation data sponsored by U. S. Defense Advanced Research Projects Agency (DARPA). The results of experiment are presented in Receiver Operating Characteristic (ROC) curves. The capabilites of these IDSs to identify Deny of Service(DOS) and probing attacks are enhanced.  相似文献   

4.
This paper introduced a performance evaluating approach of computer communication system based on the simulation and measurement technology, and discussed its evaluating models. The result of our experiment showed that the outcome of practical measurement on Ether-LAN fitted in well with the theoretical analysis. The approach we presented can be used to define various kinds of artificially simulated load models conveiently, build all kinds of network application environments in a flexible way, and exert sufficiently the widely-used and high-precision features of the traditional simulation technology and the reality, reliability, adaptability features of measurement technology. Foundation item: Supported by the National 863 High-Tech Project of China (863-300-02-09-99) and by Key Research Project of Hubei Province (991P110) Biography: CAO Yang(1943-), male, Professor, Research interests are in computer network and distributed processing.  相似文献   

5.
A system designed for supporting the network performance analysis and forecast effort is presented, based on the combination of offline network analysis and online real-time performance forecast. The off-line analysis will perform analysis of specific network node performance, correlation analysis of relative network nodes performance and evolutionary mathematical modeling of long-term network performance measurements. The online real-time network performance forecast will be based on one so-called hybrid prediction modeling approach for short-term network, performance prediction and trend analysis. Based on the module design, the system proposed has good intelligence, scalability and self-adaptability, which will offer highly effective network performance analysis and forecast tools for network managers, and is one ideal support platform for network performance analysis and forecast effort. Foundation item: Supported by the National 863 High-Tech Project (863-300-02-09-99) and Key Research Project of Hubei Province (991P110) Biography: Wang Zhi(1977-), male, Master candidate, research direction, intelligent network management and performance evaluation.  相似文献   

6.
Recently Guo Tao proposed a stochastic search algorithm in his PhD thesis for solving function optimization problems. He combined the subspace search method (a general multi-parent recombination strategy) with the population hill-climbing method. The former keeps a global search for overall situation, and the latter keeps the convergence of the algorithm. Guo's algorithm has many advantages, such as the simplicity of its structure, the higher accuracy of its results, the wide range of its applications, and the robustness of its use. In this paper a preliminary theoretical analysis of the algorithm is given and some numerical experiments has been done by using Guo's algorithm for demonstrating the theoretical results. Three asynchronous parallel evolutionary algorithms with different granularities for MIMD machines are designed by parallelizing Guo's Algorithm. National Laboratory for Parallel and Distributed Processing Foundation item: Supported by the Natonal Natural Science Foundation of China (No. 70071042, 50073043), the National 863 Hi-Tech Project of China (No. 863-306-ZT06-06-3) and the National Laboratory for Parallel and Distributed Processing. Biography: Kang Li-shan (1934-), male, Professor, research interests: parallel computing and evolutionary computation.  相似文献   

7.
The planning and scheduling in real shop floor is actually achieved by coordination between different persons. In this process, cooperation is mainstream, but competition also exists, for example, the competition between different groups, operators with the same skill, etc. In multi-agent based shop floor management and control system, this competition and cooperation relation must be embodied. The general process of shop floor production planning and scheduling is studied, and a colored Petri-net model for the competition and cooperation process of three main agents in such system to achieve shop floor production planning and scheduling is presented. The evaluating method of bids in bidding process that especially embodies the competition relationship is also presented. This colored Petri-net model gives a clear illustration of this complex coordination process to system designers, effectively promotes the cooperative development. Foundation item: Supported partly by the Hi-tech Program of China (China 863) (No. 863-511-943-009) and the National Natural Science Foundation of China(No. 59990470) Biography: Liu Shi-ping(1971-), male, Ph. D. candidate, research direaction: CIMS, intelligent manufacturing.  相似文献   

8.
This paper examines task partition problem in a Multiagent-based Distributed Open Computing Environment Model (MDOCEM). We first present a formal method to describe the task partition problem, then give a heuristic algorithm to solve the task partition problem that gives an approximate optimum solution. Foundation item: Supported partially by the National 863 High Technology Project (863-306-05-01-1B) Biography: He Yan-xiang (1952-), male, Professor, Research interests include distributed OS and distributed information processing, distributed software engineering, parallel compiler.  相似文献   

9.
A new synthetical knowledge representation model that integrates the attribute grammar model with the semantic network model was presented. The model mainly uses symbols of attribute grammar to establish a set of syntax and semantic rules suitable for a semantic network. Based on the model, the paper introduces a formal method defining data flow diagrams (DFD) and also simply explains how to use the method. Supported by the National Natural Science Foundation of China Liu Xiang: born in June 1973, MS graduate student  相似文献   

10.
We discuss the basic intrusion detection techniques, and focus on how to apply association rules to intrusion detection. Begin with analyzing some close relations between user’s behaviors, we discuss the mining algorithm of association rules and apply to detect anomaly in IDS. Moreover, according to the characteristic of intrusion detection, we optimize the mining algorithm of association rules, and use fuzzy logic to improve the system performance. Foundation item: Supported by the National Natural Science Foundation of China (69983005) Biography: Mao Ping-ping (1979-), male, Master candidate, research direction: multimedia and network security.  相似文献   

11.
The demand for individualized teaching from Elearning websites is rapidly increasing due to the huge differences existed among Web learners. A method for clusteringWeb learners based on rough set is proposed. The basic ideaof the method is to reduce the learning auributes prior to clustering, and therefore the clustering of Web learners iscarried out in a relative low-dimensional space. Using thismethod, the E-learning websites can arrange correspondingleaching content for different clusters of learners so that thelearners‘ individual requirements can be more satisfied.  相似文献   

12.
The numerical evaluation of an integral is a frequently encountered problem in antenna analysis. A special Gauss-Christoffel quadrature formula for nonclassical weight function is constructed for solving the pseudo-singular integration problem arising from the analysis of thin-wire antennas. High integration accuracy is obtained at comparable low computation cost by the quadrature formula constructed. This integration method can be also used in other electromagnetic integral equation problems. Supported by the 863 High Technology Project of China (No. 863-818-01-02) and the National Science Foundation of Hubei Province (No. 97J002) Yang Shaolin: born in 1975, M. S graduate student.  相似文献   

13.
Balance between exploration and exploitation in genetic search   总被引:1,自引:0,他引:1  
Genetic search plays an important role in Evolutionary Computation (EC). There are two important issues in the evolution process of the genetic search: exploration and exploitation. Exploration is the creation of population diversity by exploring the search space; exploitation is the reduction of the diversity by focusing on the individuals of higher fitness, or exploiting the fitness information (or knowledge) represented within the population. We theoretically analyze the impact of the genetic operators on the balance. In order to further explain the impact, some results of our research on ESs are showed. Finally we conclude that to make the algorithm more efficient, it is important to strike a balance between these two factors. Supported in part by the National Natural Science Foundation of China (No. 69635030) and Doctoral Programme Foundation of China, and National 863 High Technology Project of China Lin Hansheng: born in 1975, Master  相似文献   

14.
Product development process management plays an important role in concurrent engineering (CE). The integration platform is a useful tool for effectively supporting the software development and integration. Based on the analysis of practical requirements for product development process management for CE, a CORBA-based integration platform of product development process management (IP-PDPM) is designed and developed. The design principles for IP-PDPM are described. The system architecture and functions of the platform are given, the key technologies for the implementation of IP-PDPM are presented, the application integration mechanism and its implementation techniques are also detailed. Foundation item: Supported by the National 863 High-Tech Project (863-511-930-012) Biography: Zhao Jin-min (1963-), female, Ph.D. candidate, research direction: concurrent engineering.  相似文献   

15.
According to the frequency property of Phasedarray ground penetrating radar (PGPR), this paper gives a frequency point slice method based on Wigner time-frequency analysis. This method solves the problem of analysis for the PGPR‘s superposition data and makes detecting outcome simpler and detecting target more recognizable. At last, the analytical, results of road test data of the Three Gorges prove the analytical method efficient.  相似文献   

16.
A significant method in the way the MCU EM78P447A manipulates the RF reader IC MF RC530‘ s functions used in RF IC card application is presented. In this paper, RF reader IC MF RC530‘s SPI compatible interface is introduced. The kernel technologies including SPI connection. software design, register initiation, request response between the reader IC and the MCU, authentication and the proper format of the key arc explained, Adopting the serial peripheral interface is the innovation in the paper. The SPI communication mode proves feasible and precise. Furthermore. in the way we avoid the abuse of parallel interface.  相似文献   

17.
This paper studies the digit watermark technology of numeric attributes in relational database for database‘s information security. It proposes a new mechanism based on similar clouds watermark and gives the concept of similar clouds. The algorithm SCWA that can insert the meaning wa-termark and detect it from the watermarked data is described. The mechanism can effectively and broadly scatter the watermark in the database; therefore the watermark is very robust.  相似文献   

18.
To build a trusted platform based on Trusted Computing Platform Alliance (TCPA)‘s recommendation, we analyze the integrity mechanism for such a PC platform in this paper. By combinning access control model with information flow model, we put forward a combined process-based lattice model to enforce security. This model creates a trust chain by which we can manage a series of processes from a core root of trust module to some other application modules. In the model,once the trust chain is created and managed correctly,the integrity of the computer‘s hardware and sofware has been mainfained, so does the confidentiality and authenticity. Moreover, a relevant implementation of the model is explained.  相似文献   

19.
It appears that extensibility and reusability of concurrent applications is far from trivial. Often the inheritance anomalies problems will arise. Basing on the composition-filters object model which is proposed by Aksit, we introduce the Generic Synchronization Policy (GSP) in the inheritance mechanism, produce a new kind of concurrent object-oriented computational model. After analyzing, we show that this new model can tackle the suffering from the inheritance anomalies. Supported by the Foundation of National 863 Project and the Natural Science Foundation of Hubei Province Zhang Qian: born in 1973, Ph. D  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号