首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
对内容中心网络的域间流量监测是未来互联网架构和网络安全监护的重要内容,通过域间流量监测,防止网络拥堵和不稳,提供网络性能,同时缩减网络冗余流量。传统方法中,对域间流量的预测采用双谱分析的方法进行特征提取,实现对局域网流量的预测,算法受到短时缓冲流量的非线性特征的影响,性能不好。提出一种基于鱼群信息链特征优选的域间流量预测算法,进行网络流量信号模型分析,构建流量监护数据样本驱动空间,进行鱼群信息链特征优选系统模型与数据预处理,得到域间流量为一阶空间权矩阵,域间网络流量信息数据表示为一个方阵,实现基于鱼群信息链特征优选的域间流量预测算法的改进。实验得出,采用该算法,在较低的信噪比下,仍然具有较高的预测精度,域间流量估计误差较低,性能较优。  相似文献   

2.
构建云计算网络下的安全等级评估模型,提出一种基于模糊集和粗糙集数据挖掘的云计算网络下安全等级评估算法,实现对云计算和云存储的安全综合评估和预测。结果表明,采用该安全等级评估模型,具有较好的数据监测和挖掘能力,有效实现对云计算网络的危险数据和病毒检测,性能较好,保证了网络安全。  相似文献   

3.
通过对网络流量的准确预测提高对网络的调控和监测水平,避免网络拥堵,确保网络畅通。传统的网络流量预测算法采用粒子群算法,在处理大规模的流量数据时,容易导致信息发散和易陷入局部极值点,流量预测准确度不高。提出一种基于多标记学习混合差分粒子群进化的网络流量预测算法。构建多分簇的无线网络流量数据传输模型,对网络流量进行时间序列分析,采用粒子群优化算法分别比较网络信息流中的频率波动是否相同,对相同的进行合并,基于自回归移动平均算法,进行粒子群信息链特征优选准则设计,采用多标记学习混合差分粒子群进化算法,把网络流量数据嵌入到内核空间的超球体中,进行离线阶段的网络流量预测优化。仿真结果表明,该算法对网络流量预测的精度较高,误差减少,具有较好的应用价值。  相似文献   

4.
研究多源语义特征分层数据库中的大数据聚类方法,实现数据的分类识别。多源语义特征分层数据库中由于路由冲突,在链路负载较大的情况下,不能有效实现对大数据语义特征的并行搜索。提出一种基于增广链同态解析的链路分流方法避免路由冲突,实现增广链修复下大数据并行搜索聚类。构建大数据聚类的语义相似度融合模型,基于跨层链路分流算法实现增广链路分流,进行语义本体模型构建,选择采用高阶贝塞尔函数累积量作为增广链修复检验统计量,确定节点数据包的置信度,确立置信区间,在进行缓冲区溢出修复时,进行功率谱幅度特征提取,实现大数据的并行搜索聚类,进行语义本体模型构建,为离群点新建一个簇,依次对每个文档的主题词集进行处理,将每个主题词自动添加入形式背景的属性集中,采用并行搜索算法实现对语义大数据的优化聚类算法改进。仿真结果表明,采用该算法进行大数据聚类,契合度较高,误分率较低,性能优越。  相似文献   

5.
<正>态谐振数据库多用于构建物理数据层,实现数据集中控制,研究正态谐振数据库的优化访问技术,提高数据库的数据分析处理能力。传统方法采用数据库整体逻辑映射方法进行数据库访问,导致数据召回性能不好。提出一种基于小波包分解的正态谐振数据库优化访问算法。构建数据库的信息模型,构建双曲调频母小波,对数据访问特征进行双曲调频特征分解,得到物理层的数据特征通过小波包分解匹配滤波后的输出。仿真结果表明,采用该算法能有效提高数据召回率,优化数据库访问控制性能。  相似文献   

6.
网络撞库攻击是一种从数据库中导出数据的攻击方式,通过网站入侵,非法实现对用户信息的窃取和修改,如何更好提高网络安全,提出一种改进的网络撞库攻击信息特征潜在博弈欺骗鉴别算法。首先构建信号模型,采用博弈论方法,对攻击行为的欺骗性进行鉴别,得到网络区分服务等级的服务质量量化函数,从而实现对撞库攻击信号的欺骗性鉴别,利用非单调性决策博弈方法,给出网络威胁离散度状态方程,得到骗性判别的鉴别函数,统计撞库攻击行为的参与者,构建接入网络的优服务质量函数,提取出有用的规则性异常数据特征,并结合后置分类处理和数据处理,实现对攻击信号的准确检测和欺骗信号的鉴别。仿真实验表明,采用该方法,能有效鉴别出网络撞库攻击信号的实质信息特征和欺骗信息特征,对攻击信号的检测性能优越,提高了鉴别准确率,提高了网络服务的质量。  相似文献   

7.
云计算环境下,需要对云数据特征进行深度融合,提高对云数据的调度和决策能力。传统的云数据融合算法采用置信增益概率分配算法,当云数据出现多重特征时,融合深度不够,信息提取效果不好。提出一种基于贝叶斯粗糙集的云数据深度融合算法。引入了置信增益函数贝叶斯粗糙集,得到贝叶斯粗糙集云数据模型构建,在特征空间关系中进行特征合并,进行决策表决策属性分区处理,提高融合精度,依据信任函数最大化原则确定新对象的决策属性取值,实现云数据深度融合算法改进。仿真实验表明,采用该算法,能有效提高数据融合深度和精度,稳健性较好,可以明显的抑制噪声的影响,并提高20 d B左右的特征空间增益,算法在高维空间中仍体现出了较为明显的数据融合优势,该算法在云计算和云数据信息处理等领域具有较好应用前景。  相似文献   

8.
基于模糊集和粗糙集理论的云安全评价模型   总被引:1,自引:0,他引:1  
研究对云安全的综合评价模型,提高云计算中的网格计算并行处理和防病毒攻击能力。传统的云安全评价模型采用多层模糊集自适应算法,评价系统单一,抗病毒攻击能力较差。提出一种基于模糊集和粗糙集理论的云安全评价模型,构建云安全数据信息网格计算系统,进行安全动态数据流分析,采用基于模糊集和粗糙集理论的评价模型,构建有格点链重叠检测和向量化运算算法,检测病毒入侵信号。仿真结果表明,该云安全综合评价模型执行效率较高,对病毒入侵的检测能力提高,安全检测的成功率比传统方法提高34%,该模型有较好的安全综合评价和攻击入侵检测性能。在云计算系统安全构架中具有较好的应用价值。  相似文献   

9.
针对目前的煤矿安全评价和预测模型还存在精确性不高的问题。本文基于煤矿安全预测需求和人体行为影响因子,提出了一种基于蚁群离散和自适应BP算法的煤矿安全预测模型,首先采用改进蚁群算法对煤矿安全采集的数据进行数据离散化,并对其解空间初始分布、信息量分布、信息量的遗留和蚁群的移动方向进行优化,然后根据BP网络进行调整,得到最为合适的神经网络模型,最后构建煤矿安全预测模型。结果表明,本文提出的改进模型能很好地对数据进行离散化,并且具有较高的煤矿安全预测精度。  相似文献   

10.
对入侵病毒的最大化吸附可以有效保证网络安全,提高入侵容忍系统的安全防护性能。传统的入侵容忍系统检测和吸附病毒的方法采用链节点的随机运动生长模型,当入侵病毒为非均匀增长状态时,对病毒的吸附能力不好。提出一种基于高分子链的病毒优化吸附方法,采用线性规划技术进行入侵容忍系统状态数据融合,把入侵容忍系统描述为马尔科夫链的5个状态,进行入侵容忍系统安全属性分析,采用链重叠检测和向量化运算模拟高分子链吸附性能,实现对入侵病毒的强力吸附。仿真实验表明,采用该算法能把4类病毒入侵数据有效吸附在高分子链模型表面,聚类效果较好,具有较好的实时性和鲁棒性。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

14.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

15.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

16.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

17.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号