首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
复杂社团网络的多路由探测漏洞修复算法   总被引:1,自引:0,他引:1  
对复杂社团网络的漏洞有效修复能保证网络的安全和稳定。传统的修复算法采用多分层和多标准的超网络平衡修复算法,社团区划在多路由转发情况下漏洞修复效果不好。提出一种基于多路由探测的复杂社团网络漏洞修复算法。使用线性预测模型对漏洞进行多路由网格划分,采用链路模型重组方案对数据进行攻击相位重组,得到漏洞数据生成和关联性分析结果,通过多路由探测,提取网络传输的数据多路复用器输出端口的数据,找到经过最短路径数目最多的边并将漏洞数据从网络中移除,提高了漏洞修复的性能,实现算法改进。仿真实验表明,该算法的漏洞修复效果较好,通过漏洞修复能有效提高网络数据传输的吞吐量和网络分组数据传输成功率,展示了算法的优越性能,在网络安全等领域具有较大的应用价值。  相似文献   

2.
在对路由交换数据在线时间复杂度预测链路漏洞进行检测的过程中,存在很大的随机性及不确定性,导致传统的链路漏洞检测方法由于采用链路信息流自相关波束,在交换数据出现动态污点的情况下,无法有效实现漏洞检测。提出一种路由交换数据在线时间复杂度预测链路漏洞检测方法,分析在线时间复杂度预测算法,对路由交换数据的数据序列信号模型进行塑造,利用转换矩阵将阵元域信号变换至波束域,完成污点数据静态污点传播分析以及空间重构,对路由交换数据的在线时间复杂度进行预测,通过Fourier实现波束域至阵元域的转换,给出路由交换数据在线时间复杂度预测模型下链路漏洞波数响应矩阵。在网络链路层中对发送数据多路复用器输出端口的数据进行采集,求出链路层信号模型波束域的信号特征以及干扰子空间,通过混叠谱模糊度函数对频谱特进行分析,获取链路漏洞层的新坐标下限定区间。仿真实验结果表明,所提方法具有很高的检测精度。  相似文献   

3.
对网络漏洞进行有效检测,保障网络安全,传统方法采用攻击相位重组方法进行网络漏洞链路分析和检测,由于复杂随机阵列网络的端口的复杂性,导致漏洞检测准确性不好。提出一种基于主频分离激励分析的网络漏洞检测算法。构建了网络漏洞分布的阵列结构模型,对漏洞阵列的交换数据进行信号分析和融合处理,以此为数据依据采用主频分离激励分析方法进行漏洞检测算法改进,仿真结果表明,该算法能有效提高对网络漏洞的检测和数据跟踪性能,提高网络安全防御能力。  相似文献   

4.
基于链路同态解析的WSN路由选择算法   总被引:3,自引:0,他引:3  
通过优化无线传感器网络(WSN)的路由选择算法,实现负载均衡,节省WSN节点的能量开销。传统的路由选择算法使用基于汇聚节点随机链路分析的路由选择算法,控制网络中节点的密度实现路由选择,算法受到外界干扰较大,性能不好。提出一种基于链路同态解析的WSN路由选择算法。设计WSN节点的能量调度算法,提取网络传输的数据多路复用器输出端口的数据,找到经过最短路径数目最多的边并将它从网络中移除,采用能量剩余度同态解析模型,把WSN的能量节点变换到链路同态解析波束域中,实现WSN路由选择算法改进,实现WSN节点的能量调度,提高WSN的负载均衡能力。仿真结果表明,该算法能优化WSN的路由选择,节点的平均能量消耗最低,提高了WSN的可靠性和生存周期。  相似文献   

5.
在非均匀分布多跳网络中,需要对通信节点进行介质访问控制设计,提高网络通信节点的吞吐性和安全性。传统方法采用多路复用器输出端口信号检测方法进行非均匀分布多跳网络通信节点的介质访问控制,产生强烈的信道畸变,节点的通信控制性能不好。提出一种基于协同调度的混合协议激振算法的非均匀分布多跳网络通信节点介质访问控制方法。将非均匀分布多跳网络通信节点分簇模型的服务器网络接收端和发送端数据的信息熵作为信道传递向量函数,构建协同调度混合协议服务器模型,求得非均匀分布多跳网络时延扩展与信道特性测量均衡后的频谱,可以有效提高信息传输的保真度。仿真结果表明,采用该算法可以有效提高对多跳网络的通信节点介质访问控制性能,提高了通信节点的吞吐性能,降低重复传输次数,保证非均匀分布多跳网络通信的安全性和保真性。  相似文献   

6.
在对云计算网络漏洞进行检测的过程中,涉及的数据量巨大,传统方法依据先验知识建立云计算网络漏洞库,通过和漏洞库的匹配实现漏洞检测,实现过程非常复杂,且建立的漏洞库也存在局限性,检测精度低,因此,提出一种基于风险数据挖掘追踪的云计算网络漏洞检测技术。将特征相关性看作是计算数据差异的依据对风险数据进行初聚类,将和风险数据有较大差异的正常数据剔除,完成初步的处理。引入模糊关联规则,依据风险数据属性关联规则,对经初聚类处理后的风险数据进行挖掘追踪,构成云计算网络漏洞数据库,通过隶属度分布函数对漏洞数据库的连续属性进行模糊处理,依据模糊关联规则挖掘构建云计算网络存在漏洞状态时的关联规则集,用相似度对云计算网络当前状态和存在漏洞状态的背离程度进行描述,实现云计算网络的漏洞检测。仿真实验结果表明,所提方法具有很高的检测精度和检测效率。  相似文献   

7.
车流量增加致使交通拥堵,GPS识别定位服务于交通管理系统。现有的GPS定位采用一次定位的思想,识别法实时性低,因为多次定位会造成网络负荷重,网络利用率低,时延长,误码率较高等问题。提出一种基于多端口捆绑压缩思想的车载GPS信号定位方法,通过建立过滤储值非0数据矩阵压缩模型,压缩码全部过滤集合。用纵线向量和矩形空间向量对GPS数据二次定位,在多端口捆绑网络中建立二次定位模块的过程,完成GPS信号的高效定位操作。仿真实验表明,基于多端口捆绑压缩思想的车载GPS信号二次定位方法能够有效的减少网络负担,识别定位速度快,耗时少,定位更为准确。  相似文献   

8.
在许多实际工程问题中大量使用各种类型的二端口网络。它们是为了完成某种功能而接在电源与负载之间或两部分网络之间的。比如在自动控制系统中,为满足系统所要求的性能指标,常有目的地增添一些装置或元件,即校正装置,这些校正装置均属于二端口网络。要想对二端口网络进行深入的分析和计算,需要运用传递函数这一数学模型。对于简单的二端口网络,可以利用电路理论知识来求解:但较复杂的二端口网络由于计算公式繁多,数字复杂,往往使人觉得无从下手。我经过研究,总结出一种简单直观、运算方便的二端口网络求解方法,它既能直观显示网络的结构特点,输入电压、输出电压和内部各支路电压、电流的相互关系,又为今后分析具有二端口网络的自动控制系统和电子元器件打下坚实基础。这种方法,我把它称之谓“动态结构图法”。  相似文献   

9.
对网络攻击信号检测中,需要对网络威胁态势预测的抗体虚警概率阈值估计,提高攻击信号检测性能。传统方法采用伪随机时频跳变的信息容量估计方法实现阈值估计和攻击信号检测,当攻击信号为非线性谐振信号时,检测性能不好。提出一种改进的网络威胁态势预测的抗体虚警概率阈值估计算法。构建多路复用器输入输出网络威胁态势预测算法,通过病毒信息特征预处理为免疫性分析提供信息特征数据基础。得到网络跳变向量和观测向量的标准正态阈值,将网络接收端和发送端数据的信息熵作为信道传递向量函数,在人工免疫进化过程中实现对免疫节点的抗体的虚警概率阈值估计,提高网络攻击信号的检测性能,降低网络威胁态势抗体虚警概率。仿真实验得出,该算法得到的估计结果精确,有效提高了攻击信号的检测性能,确保网络安全。  相似文献   

10.
研究物联网下的差异设备的兼容性模型,对提高物联网平台的工作稳定性和可靠性至关重要。提出一种基于改进K-means不定特征聚类的差异设备软件特征不兼容性分析方法,实现对差异设备的兼容性测试。构建物联网环境下的差异设备通信模型,得到物联网环境下的差异设备多路复用器输出端口节点的集合,在不同的分组中采用随机概率模型消除差异性软件特征。通过改进K-means实现物联网下差异设备兼容性测试数据的聚类分析,为实现差异设备兼容性测试提供准确的数据基础。通过消除物联网差异特征的关联度实现差异设备兼容性测试模型构建。实验结果表明,该算法的测试效果较好,使得设备的兼容性和可移植性提高,物联网系统的鲁棒性好。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

17.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号