首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The paper presents the design and implementation of a line-of-sight (Los)microwave channel simulator. The basic principle is to reproduce channel transfer functions given by their amplitude and group delay characteristics by driving a linear transversal filter with precomputed data. The transfer functions can be either collected from measurements in the field or derived from any analytical modelling of the Los microwave channel. It is shown that a thirteen tap filter with a 70 MHz period leads to accurate realtime simulations of selective fading in a 50 MHz bandwidth. The control interface, microprocessorbased, allows an efficient and smooth use of the simulator. Finally,hardware problems and technological solutions related to the implementation are presented.  相似文献   

2.
Generally, an intruder must perform several actions, organized in an intrusion scenario, to achieve his or her malicious objectives. Actions are modeled by their pre and post conditions, which are a set of logical predicates or negations of predicates. Pre conditions of an action correspond to conditions the system’s state must satisfy to perform the action. Post conditions correspond to the effects of executing the action on the system’s state. When an intruder begins his intrusion, we can deduce, from the alerts generated byidss (Intrusion Detection Systems), several possible scenarios, by correlating attacks, that lead to multiple intrusion objectives. However, with no further analysis, we are not able to decide which are the most plausible ones among the possible scenarios. We propose in this paper to define an order over the possible scenarios by weighting the correlation relations between successive attacks composing the scenarios. These weights reflect to what level executing some actions are necessary to execute some action B. We will see that to be satisfactory, the comparison operator between two scenarios must satisfy some properties.  相似文献   

3.
A commonly used method for achieving a prescribed security level in a telecommunication network is to manage extra capacities all over the network. This paper describes a number of computational methods, both exact and approximate, for determining a minimum cost network of extra capacities needed to achieve security under any given trunk dimensioning, routing and grouping policy. From a mathematical point of view, it is shown that the problem reduces to the determination of a minimum cost network subject to a number of non simultaneous multicommodity flow requirements. Since real life instances of such problems commonly result in very large linear programs of many thousands of variables and constraints, the techniques of linear programming would be unacceptably time and space-consuming. Instead, it is shown how the use of Lagrangean relaxation in conjunction with sub-gradient optimization schemes can lead to efficient and easy-to-implement solution methods. The various procedures described in this paper form the heart of a general software product for long and medium term planning applications (Supersec program) which has already been used to investigate the economical implications of security requirements in telecommunication networks.  相似文献   

4.
With the growing need for protection of informations systems, the intrusion detection approach is interesting but still imperfect. At the moment two main approaches exist: the behaviour based approach and the scenario detection approach. None of those two approaches is fully satisfactory. They often generate two many false positives and the generated alerts are generally too elementary and imprecise to be efficiently processed by a system administrator. An interesting approach consists in developing a cooperation module to analyze and correlate alerts, to generate a more global and synthetic diagnostic, and help the system administrator to choose the best counter-measure given a detected attack. This article presents the work we have achieved in this context to create theRim module (Cooperation and Recognition of Malevolent Intentions).  相似文献   

5.
F. Krief  A. Osmani 《电信纪事》2002,57(1-2):125-149
When an anomaly occurs in aSDH network, many notifications are emitted towards the supervision center. The emission of these notifications is the result of the signals treatment on the level of the objects describing the network. This document describes the modeling process of the behavior and the interaction between the objects intervening in the data processing of faults management. It gives a methodology ofSDH network model construction for the needs for faults situations diagnosis.  相似文献   

6.
7.
8.
This paper presents a novel active architecture for building and deploying network services:aswa, Web Services based Active network Architecture. At the architectural level,aswa defines an active node whose functionalities are divided into the Node Operating System, the Execution Environment, and the Active Applications. At the implementation level,aswa is a Web Services based platform where new components could be added and deployed, in order to dynamically modify network nodes behavior. Applications can be developed with any language and communicate across heterogeneous environments, and across Internet and Intranet structures. At the deployment levelaswa uses an active node approach, and offers a controlled deployment mode. In terms of security, Authentication of deployed code and protection of the nodes is achieved by the use ofhttps and the header extensions of thesoap envelope. Finally to validate this architecture,aswa defines a Firewall as an Active Application to secure the code deployment.  相似文献   

9.
10.
J. Almhana  J. Paillé  C. Bozzo 《电信纪事》1984,39(7-8):323-332
The authors describe a fast, parallel and static data flow architecture that is used for Fast Riccati Operator (Fro)design. This operator has a cellular, regular structure easy to integrate, and is intended to resolve with high speed execution the matrix Riccati equation for filtering purpose. To evaluate its performances, two solving algorithms, Lindquist and quasilinéarisation, are represented and simulated by data flow Petri nets, defined for this purpose. Simulation results are compared to real needs in search and tracking situations.  相似文献   

11.
12.
The primary effect of the field continuously capted by aGpr is the production of a class which limits the contrast of the reflections on the targets. The target response becomes illegible sight the influence of certain disturbances which are due to the reflections caused by certain parasitic elements which are randomly distributed in the soil and the dispersion phenomenon. We present in this paper an approach based on a μ-wave modulation which allowed stage this problem. The technique suggested makes it possible to do a classification of capted signals. It will be shown that the frequency of modulation fm must be higher than a cut-off frequency fc which depends on the electric parameters of the ground. In a second part of this paper, we show how to improve quality of the radargram of a systemGpr by a simple convolution between the collected signal and a wavelet with a defined parameters.  相似文献   

13.
Serge Baile 《电信纪事》2003,58(1-2):297-328
EDI is by far the Information Technology (IT) that has aroused, these last ten years, many interesting works in the field of theSME organizational development. The absence of federative conceptual framework is probably behind the great diversity of results, especially in the area of the prediction of its adoption and the evaluation of its success. These observations are behind a five years field research carried by an objective ofEDI success evaluation by end users. This article contributes to validate an “abductive” approach. To be made, it summarizes and classifies theoretical foundations of an analysis of thisIT impacts, and formulate an evaluation model using a system approach. Each of the three levels of the studied system (processing factor keys of success, quality of theEDI acceptance process, and success or internal performance) fact thus the object of premises allowing to confront observations of the four field enterprises to the conceptual framework and concepts identified in the review of the literature. Results of this approach using an appropriate qualitative methodology on cases of enterprises users ofEDI have allowed to validate the structure of the model and to refine the constructs of the different variables, that, so as to commit ulterior empirical works destined for validate the aimed explanatory of the model.  相似文献   

14.
Algebraic decoding procedures can be greatly simplified in case the number of errors being corrected is small. The authors present here a decoder which is capable of correcting errors occuring on four bits packets. The considered code is a (15, 11) Reed-Solomon code over GF (16). A Meggitttype decoder has been selected. The hardware implementation consists of 49 ttl (ls) packages and operates for the present at a rate of 5 Mbit/s. The utilisation of this decoding scheme is considered for other Reed-Solomon codes.  相似文献   

15.
16.
17.
18.
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号