共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
刘志远 《计算机应用与软件》2008,25(8)
移动自组织网络是由无线移动节点组成的复杂分布式通信系统.研究了移动自组织网络的入侵检测问题,对当前Ad hoc网络上的入侵行为和入侵检测技术进行了分析,论述了学习Petri网络应用于入侵检测系统中的优势,给出了一个基于学习Petri网络的入侵检测实施模型,并在网络仿真软件ns2中对其进行了评估. 相似文献
3.
4.
5.
6.
7.
8.
9.
随着移动自组织网络在各个领域内得到广泛的使用,其安全性研究显得越来越重要。DDoS攻击给有线网络造成了很大的威胁,同样也威胁到了移动自组织网络的安全性。由于移动自组织网络和有线网络存在着结构型差异,因此移动自组织网络中的DDoS攻击研究与有线网络中的DDoS攻击研究有较大的不同。论文首先描述了移动自组织网络的安全状况;然后从移动自组织网络的网络架构出发,分别分析移动自组织网络中针对物理层、MAC层、网络层以及传输层的DDoS攻击,同时总结针对不同网络层次的攻击所需要采取的防御措施;最后为移动自组织网络建设过程中就如何防范DDoS攻击提出参考意见。 相似文献
10.
11.
12.
13.
One's model of skill determines what one expects from neural network modelling and how one proposes to go about enhancing
expertise. We view skill acquisition as a progression from acting on the basis of a rough theory of a domain in terms of facts
and rules to being able to respond appropriately to the current situation on the basis of neuron connections changed by the
results of responses to the relevant aspects of many past situations. Viewing skill acquisition in this ways suggests how
one can avoid the problem currently facing AI of how to train a network to make human-like generalizations. In training a
network one must progress, as the human learner does, from rules and facts to wholistic responses. As to future work, from
our perspective one should not try to enhance expertise as in traditional AI by attempting to construct improved theories
of a domain, but rather by improving the learner's access to the relevant aspects of a domain so as to facilitate learning
from experience. 相似文献
14.
黄全 《数字社区&智能家居》2008,(3)
防火墙作为网络安全设备越来越多地应用于局域网络与公用网络的互联中,具有服务代理、包过滤、入侵检测等功能。防火墙作为一个网络互连设备,在组建网络中还有着局域网与Internet互联、隐藏防火墙外网IP地址、隐藏内部网络、IP地址重定向、安全访问控制以及构建VPN等应用。文中结合某单位的局域网规划设计就防火墙的应用作了重要的阐述。 相似文献
15.
党伟 《计算机光盘软件与应用》2012,(2):121+123
目前我们铁路运输事业快速发展,全国各地都新建了高铁铁路。速度是提升了,安全问题也不能忽视。列车在运行过程中要想保证安全,就需要铁道各处的信号信息正确。控制台通过相关的信号设备将运行的指令传递给列车,以保证铁路的整体运行情况。在新的时期,需要能够全天候检测铁路安全的方法,以便维修人员能够及时了解问题并处理。本文通过对TJWX-2006型信号设备监测系统进行研究,来分析在铁路上使用微机来检测铁路的运行情况。这对研究信号设备安全有着积极的意义。 相似文献
16.
《Ergonomics》2012,55(4):441-475
The operation of machines typically requires attention to instruments that signal the state of the machine. One safeguard against primary instrument malfunction is to provide backup instruments, but this works only if the operators react to malfunction by switching attention to the backups. Little is known about the effect of negative outcomes or feedback on allocation of attention to backup instruments. Four experiments demonstrated that prior practice causes operators of a simulated machine to adapt to instrument malfunction by changing to a suboptimal decision rule rather than by reallocating attention to a different set of instruments. This fallacy appears linked to the operators' failures to notice feedback that they should switch during the simulations and operators' failures to correctly interpret outcome feedback following the simulations. The results raise theoretical questions and warn interface designers not to overrate backup instruments. 相似文献
17.
Holarchy formation and optimization in holonic manufacturing systems with contract net 总被引:1,自引:0,他引:1
Fu-Shiung Hsieh Author Vitae 《Automatica》2008,44(4):959-970
Holonic manufacturing systems (HMS) is based on the notion of holon, an autonomous, cooperative and intelligent entity to provide a econfigurable, flexible and decentralized manufacturing environment to respond to changing needs and opportunities. A set of holons that cooperate to achieve a goal forms a holarchy. How to design a mechanism to form a holarchy to achieve a goal while minimizing the overall cost is a challenge. The objectives of this paper are to propose models and develop collaborative algorithms to guide the holons to form a holarchy to coherently move toward the desired goal state ultimately. We adopt contract net protocol (CNP) to model mutual selection of holons in forming a holarchy. We formulate a holarchy optimization problem to minimize the cost subject to the feasibility constraints. To analyze the feasibility of a holarchy, a Petri net (PN) model is proposed. As classical PN models do not take into account the cost involved in firing transitions, we augment the PN model with cost functions in the problem formulation. Due to the distributed architecture of HMS, the internal structure of each potential holarchy that acts as bidder in CNP is not available to the manager. A key issue is to determine the feasibility of a holarchy without constructing the whole PN model of the given hierarchy. We study the feasible conditions for a holarchy and propose a collaborative algorithm to analyze the feasibility and award contracts to holons without constructing the whole model of a holarchy. 相似文献
18.
F. E. Pollick 《Virtual Reality》1998,3(2):85-101
This research compared grasps to real surfaces with grasps to virtual surfaces, and used virtual surfaces to examine the role of cues to surface shape in grasp. The first experiment investigated the kinematics of overhand grasps to real and virtual objects. The results showed that, compared with grasps to real surfaces, grasps to virtual objects were different in the deceleration phase of the grasp movement and were more variable in their endpoint position. The second experiment used several measures to examine the relationship between the visual perception of a surface and the decision to grasp the surface with either an over-or underhand grasp. It was found that visual perception of the surface was consistent with the grasping decision. The third experiment used virtual surfaces to examine how the removal of visual cues to shape affected the decision to switch from over- to underhand grasp. Results showed that the orientation at which the decision switched was dependent on the visual information content. Overall, the results showed that subtle differences existed between the reach to grasp movements towards real and virtual surfaces and that the decision to choose between grasp types was dependent on the visual information used to depict the virtual surface. These results are discussed in relation to the design and use of input devices to enable manipulation of three-dimensional objects in virtual worlds. 相似文献
19.
Ammar Amran Manmeet Kaur Mahinderjit Singh 《Information Security Journal: A Global Perspective》2018,27(2):119-131
Security warning is a form of computer dialog communication used to inform the users on the risks of allowing random applications to run on a computer system. Accordingly, it is specifically designed to impersonate a legitimate security alerting function (e.g., notify, warn, and advice) to a user about the consequence effect of an action. However, most of the computer users tend to ignore those security warnings conveying the same message over and over again. This eventually leads to habituation. Considering the fact that there is a significant lack of focus paid to address this issue, the main objective of this article is to describe and summarize the related studies on users’ habituation to the security warnings. This article presents a systematic literature review to explore the current key issues, challenges, and the possible solutions related to habituation effects in security warnings. It is expected that this article could contribute to a more complete understanding of the habituation effects in security warnings and eventually bring benefits to the research communities or general publics. 相似文献
20.
随着信息技术的飞速发展,企业的信息化程度越来越高。企业对其内部的各种数据进行统计进而进行数据的分析活动也日趋频繁,因此使得用户对数据统计的要求具有不定性和多变性的特点。同时,由于企业自身的行业特点,又要求动态统计软件对于经常需要统计的内容具有学习能力,从而才能满足用户既灵活多变,又具有一些相对固定的统计要求。文中主要针对此类企业用户对动态统计灵活多变的要求,通过对进行统计的内容按其功能进行SQL语句的分类、定义,设计并实现了一种动态统计软件。通过对此软件的测试及用户使用,能够满足企业相对灵活多变的动态统计需求。 相似文献