首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 220 毫秒
1.
A Wireless Sensor Network (WSN) consists of many low-cost, small devices. Usually, as they are deployed to an open and unprotected region, they are vulnerable to various types of attacks. In this research, a mechanism of Intrusion Detection System (IDS) created in a Cluster-based Wireless Sensor Network (CWSN) is proposed. The proposed IDS is an Integrated Intrusion Detection System (IIDS). It can provide the system to resist intrusions, and process in real-time by analyzing the attacks. The IIDS includes three individual IDSs: Intelligent Hybrid Intrusion Detection System (IHIDS), Hybrid Intrusion Detection System (HIDS) and misuse Intrusion Detection System. These are designed for the sink, cluster head and sensor node according to different capabilities and the probabilities of attacks these suffer from. The proposed IIDS consists of an anomaly and a misuse detection module. The goal is to raise the detection rate and lower the false positive rate through misuse detection and anomaly detection. Finally, a decision-making module is used to integrate the detected results and report the types of attacks.  相似文献   

2.
A prototype intelligent image database system (IIDS) that is based on a novel pictorial data structure is presented. This prototype system supports spatial reasoning, flexible image information retrieval, visualization, and traditional image database operations. A pictorial data structure, based on 2-D strings, provides an efficient means for iconic indexing in image database systems and spatial reasoning. The modular design of IIDS facilitates its implementation. Further extensions of the prototype system are discussed  相似文献   

3.
不一致不完备决策系统中属性约简的比较研究   总被引:1,自引:0,他引:1  
相对其他决策系统,不一致不完备决策系统对于复杂数据具有更强的数据建模和表示能力,这决定了其在实际应用中的重要作用.鉴于此,在已有研究成果的基础上深入探讨了不一致不完备决策系统中约简的定义方法,提出了不一致不完备决策系统中的5种约简概念,并找出了它们之间的关联,为进一步研究此类系统中知识约简的理论和方法奠定了基础.  相似文献   

4.
One purported advantage of hypertext systems is the ability to move between semantically related parts of a document (or family of documents). If the document is undergoing frequent modification (for example while an author is writing a book or while a software design stored in the hypertext system is evolving) the question arises as to how to incrementally maintain semantic interconnections in the face of the modifications.

The paper presents an optimal technique for the incremental maintenance of such interconnections as a document evolves. The technique, based on theories of information retrieval based on lexical affinities and theories of incremental computation, updates semantic interconnections as nodes are checked into the hypertext system (either new or as a result of an edit). Because we use the semantic weight of lexical affinities to determine which affinities are meaningful in the global context of the document, introducing a new affinity or changing the weight of an existing affinity can potentially have an effect on any node in the system. The challenge met by our algorithm is to guarantee that despite this potentially arbitrary impact, we still update link information optimally.

Once established the semantic interconnections are used to allow the user to move from node to node based not on rigid connections but instead on dynamically determined semantic interrelationships among the nodes.  相似文献   


5.
The design issues encountered during the development of a natural language processor (NLP) for the Italian language are described. The focus is on strategic aspects, namely representation and control, and their implementation with first-order logic. The complexity and the size of the knowledge domain (press agency releases on finance and economics) do not present severe restrictions in the sentence structure; hence a considerable design effort for data structures and control algorithms was required. Logic proved to be an important tool for implementing in a modular and efficient way the knowledge sources along with the programs that derive the morphologic, syntactic, and semantic features of sentences. As for the data structures, we found a considerable advantage in separating linguistic knowledge in three sources: morphologic, syntactic, and semantic. This resulted in a clear and systematic representation scheme and reduced the complexity of the parsing system.  相似文献   

6.
沈海波 《计算机工程》2010,36(3):162-163
对语义Web上资源进行访问要求授权决策充分考虑实体之间的语义关系,但传统的访问控制模型不能处理该问题。结合基于本体的语义描述技术和基于语义规则的推理机制,将不同的语义内部关系归纳为包含关系,提出一种面向语义Web的基于语义的访问控制模型,研究其语义授权推理机制,并提出一个推理实现系统。  相似文献   

7.
对网络综合防御系统的理念进行了介绍,并给出网络综合防御系统的整体设计.根据课题组开发的Immuno系统模型和防火墙联动模块二级结构的总体规划,详细阐述了系统中防火墙联动模块的设计及核心子模块的实现.该模块能让多种防御系统进行联动,同时检测到网络攻击后,可通过向防火墙中动态添加规则阻断攻击.  相似文献   

8.
基于P2P模式的煤炭企业协同办公系统是实现煤炭企业信息化的有效方法。文章分析了即时通信技术与煤炭企业协同办公系统的结合点以及即时通信系统的功能层次结构,并从节点的标识规则、工作组的创建和节点间的通信3个方面探讨了系统的实现。  相似文献   

9.
Network visualization by semantic substrates   总被引:1,自引:0,他引:1  
Networks have remained a challenge for information visualization designers because of the complex issues of node and link layout coupled with the rich set of tasks that users present. This paper offers a strategy based on two principles: (1) layouts are based on user-defined semantic substrates, which are non-overlapping regions in which node placement is based on node attributes, (2) users interactively adjust sliders to control link visibility to limit clutter and thus ensure comprehensibility of source and destination. Scalability is further facilitated by user control of which nodes are visible. We illustrate our semantic substrates approach as implemented in NVSS 1.0 with legal precedent data for up to 1122 court cases in three regions with 7645 legal citations  相似文献   

10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号