首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 500 毫秒
1.
特征选择和分类器设计是网络攻击监测的关键,为了提高网络攻击监测率,针对特征选择问题,提出一种蚁群算法选择特征和SVM特征加权相结合的网络攻击检测方法(ACO-SVM)。首先利用支持向量机的分类精度和特征子集维数加权构造了综合适应度指标,利用蚁群算法的全局寻优和多次优解搜索能力实现特征子集搜索;然后选择网络数据的关键特征,计算信息增益获得各个特征权重,并根据特征权重构建加权支持向量机的网络攻击分类器;最后设计了局部细化搜索方式,使得特征选择结果不含冗余特征的同时提高了算法的收敛性,并通过KDD1999数据集验证了算法有效性。结果表明,ACO-SVM有效降低了特征维数,提高了网络攻击检测正确率和检测速度。  相似文献   

2.
无线射频识别技术,也就是RFID技术是一种典型的非接触性自动识别技术,当前在生产、管理、生活等社会各领域都有用到这一技术,并逐渐成为主要的自动识别技术,本文基于RFID技术和SURF算法,提出了校园智能车辆管理模型,首先按照三层开发原则,将系统分为数据层、应用层和表现层,然后在校园智能车辆管理模型中采用SURF算法对车辆牌照进行识别,首先构建车辆图像的尺度空间,接着由一个64维的特征向量来描述车牌的特征点,并对两帧图像车牌检测时的特征点进行匹配,最后在车牌特征点匹配过程中加入几何区域限定。仿真试验结果表明,本文提出的基于SURF算法的车牌识别模型误差较小,并且校园智能车辆管理系统功能完善,能很好的对校园车辆进行智能化车辆管理。  相似文献   

3.
对网络攻击信号进行盲分离,实现对攻击信号的准确有效检测。传统的网络攻击信号检测算法使用时频分析方法,提取非平稳群攻击信号的时频特征,实现信号检测,但算法把网络入侵检测正确率作为约束目标函数进行同步最优特征子集求解,复杂度较高,提出一种引入合同变换矩阵的网络攻击信号盲分离算法。采用时频分析Viterbi算法,得到信号谱的平均频率等于瞬时频率的时间平均,根据合同变换矩阵,对攻击信号进行离散数据解析化处理,构建网络攻击信号的解析模型,得到网络统计信号在多复变边界条件下的时频特征,实现盲分离算法改进。仿真实验表明,该算法能有效实现对网络攻击信号的盲分离,盲分离结果能准确反映网络攻击信号的内部特征,提高了对网络攻击信号的检测能力,对攻击信号的检测性能有所提高,保证了网络安全。  相似文献   

4.
针对基本蚁群算法在机器人路径规划中盲目性大、效率低以及易陷入局部最优等缺陷,提出一种在蚁群算法中修改信息素初始值、改进全局信息素更新方式以及改进状态转移规则的移动机器人路径规划方案,在栅格环境下对移动机器人的路径规划进行仿真测试,仿真结果表明该方案能缩小最优路径的查询范围,降低发现最优路径所需的循环次数,有效提高最优路径的搜索效率,整体性能优于普通蚁群算法。  相似文献   

5.
实行虚拟机最优分配方案的准确挖掘能够提高云计算的服务质量(Qo S)。利用传统算法进行虚拟机最优分配方案挖掘的过程中,由于受到大量冗余数据的影响,造成挖掘效率降低。为此,提出一种基于蚁群算法的面向多通道Qo S需求的虚拟机分簇挖掘方法。根据虚拟机特征的相似度对虚拟机进行分簇,利用蚁群算法进行虚拟机最优分配方案的挖掘,在此过程中,充分考虑了多用户对云计算中虚拟机资源服务质量(Qo S)的要求,避免出现同类型虚拟机被分配到同一物理机上的情况,同时,对蚁群算法中信息素的更新进行了优化。实验结果表明,利用改进算法进行虚拟机最优分配方案挖掘,能够有效提高挖掘效率,并降低系统负载均衡度。  相似文献   

6.
针对蚁群算法在机器人路径规划中易陷入局部最优问题,提出首先利用蚁群算法寻找移动路径,然后采用模拟退火算法进行迭代,并加入回火机制消除局部最优,有效提高蚁群算法的全局搜索能力。仿真研究表明,模拟退火-蚁群算法在机器人路径搜索上可得到较短路径。  相似文献   

7.
蚁群算法是通过模拟蚂蚁觅食而发展出的一种新的启发式算法但是开始的时候信息素缺乏,收敛速度慢一直是蚁群算法的不足。针对该问题,提出加权蚁群算法,它利用传统蚁群算法最优路径的特点,对每个城市分别加权,然后从比较离散的点开始进行寻优。节省了在不可能构成最优路径上的计算时间,提高了运算速度。计算机仿真结果表明,该文算法改进了标准蚁群算法的效率和计算结果的质量。  相似文献   

8.
王丽  于晓敏  邓文新 《科技通报》2010,26(3):417-420
蚁群算法具有收敛速度慢,易陷于局部最优解等缺点。本文以最大-最小蚁群算法和基于变异蚁群算法思想为基础,在通过蚁群算法得到局部最优解后,引入特殊因子回溯的算法来寻找位于局部最优解附近的最优解。仿真实验证明,特殊因子回溯算法应用于寻找最优解问题是有效的。  相似文献   

9.
基于多因素方差分析的文本向量特征挖掘算法   总被引:2,自引:0,他引:2  
文本向量特征挖掘应用于信息资源组织和管理领域,在大数据挖掘领域具有较大应用价值,传统算法精度不好。提出一种基于多因素方差分析的文本向量特征挖掘算法。使用多因素方差分析方法得到多种语料库的特征挖掘规律,结合蚁群算法,根据蚁群适应度概率正则训练迁移法则,得到种群进化最近时刻获得的数据集有效特征概率最大值,基于最优划分的K-means初始聚类中心选取算法,先对数据样本进行划分,然后根据样本分布特点来确定初始聚类中心,提高文本特征挖掘性能。仿真结果表明,该算法提高了文本向量特征的聚类效果,进而提高了特征挖掘性能,具有较高的数据特征召回率和检测率,时间耗时较少,在数据挖掘等领域应用价值较大。  相似文献   

10.
在网络安全预测监护模型设计中,需要对网络安全监护信息进行数据融合和特征优选,以提高对变异特征的识别能力。传统方法中,采用蚁群算法进行监护信息特征优化融合进化和链路模型设计,算法无法实现相邻簇头之间的信息素融合,特征优化效果不好。针对这一问题,提出蚁群链运动多层博弈的网络监护信息融合特征优选算法,构建多层博弈网络监护数据样本驱动空间权矩阵模型,引入粗糙集理论,对蚁群引导的粗糙集前馈补偿网络进行动态博弈,实现网络安全监护数据的预测控制目标函数最佳寻优。构建多层博弈网络监护系统模型,得到蚁群链运动的监护信息数据状态跟踪模型,实现网络安全监护信息的融合特征优选改进。仿真实验表明,该算法能有效提高对异常信息的监护和检测能力,有较高的特征优选品质,展示了本文算法在对网络安全监护中的优越性能。  相似文献   

11.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

12.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

15.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

16.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

17.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

18.
Long-standing conflict between domain name registrants and trademark holders prompted the Internet Corporation for Assigned Names and Numbers (ICANN) to create a global, mandatory arbitration procedure known as the Uniform Dispute Resolution Policy (UDRP). The UDRP has been used in 2166 cases involving 3938 domain names as of 1 November 2000. The policy gives the initiator of a complaint, generally a trademark holder, the right to choose which ICANN-accredited dispute resolution service provider (RSP) will handle the case. During the preparation of the UDRP,some feared that complainant selection would lead to "forum shopping" that might bias the results. This article performs a statistical assessment of the forum-shopping thesis and finds support for it. There are statistically significant differences in the various RSPs' propensity to take away names from defendants; there are also major differences in the number of cases brought to each RSP. RSPs who take away names have the larger share of cases. The study examines other variables that might explain differences in market share, such as price, the plaintiff's nationality, or the time taken to decide a case. It finds that nationality and time also are correlated with market share. The study concludes that shopping for a favorable outcome is an important factor in the UDRP.  相似文献   

19.
Prof. Raymond C.K. Chen, a neuropsychologist with the CAS Institute of Psychology, has made novel progress in his studies of schizophrenia. His work has been reported by a recent issue of Behavioural Neurology.  相似文献   

20.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号