首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
In this paper, a substructure-based network behavior anomaly detection approach, called WFS (Weighted Frequent Subgraphs), is proposed to detect the anomalies of a large-scale IP networks. With application of WFS, an entire graph is examined, unusual substructures of which are reported. Due to additional information given by the graph, the anomalies are able to be detected more accurately. With multivariate time series motif association rules mining (MTSMARM), the patterns of abnormal traffic behavior are able to be obtained. In order to verify the above proposals, experiments are conducted and, together with application of backbone networks (Internet2) Netflow data, show some positive results.  相似文献   

2.
Stopping to think becomes more important to do the harder that doing it becomes. Television is very popular and has been used with great success for many decades all over the world. Videotelephony is relatively unpopular, despite long study and some recent advances. It seems obvious to adopt the pictorial culture of television as a guide to the development of videotelephony. The authors believe this assumption is not only fundamentally mistaken, but is partly responsible for the unpopularity of videotelephony. To encourage broader and deeper debate, some artistic and engineering aspects of pictorial culture are discussed in exploring how videotelephony might be made more appealing. The implications for future telepresence systems and for new virtual-world multimedia environments are discussed and topics for further work suggested.  相似文献   

3.
This article argues that in order to adequately comprehend and explain change, the field needs to engage more completely with the challenges of researching change over time, and ground the theorizing of change more firmly in empirical research. The goal of this article is to foster a more concerted discussion on these issues that will hopefully move research forward. The first part of the article reviews the breadth and diversity of existing empirical approaches to comprehending change over time across the field. The article then identifies some of the problems and oversights of current approaches and discusses possible solutions, drawing both on proposals developed by communication and media scholars and those developed in other disciplines.  相似文献   

4.
Many methods have been presented for the testing and diagnosis of analog circuits. Each of these methods has its advantages and disadvantages. In this paper we propose a novel sensitivity analysis algorithm for the classical parameter identification method and a continuous fault model for the modern test generation algorithm, and we compare the characteristics of these methods. At present, parameter identification based on the component connection model (CCM) cannot ensure that the diagnostic equation is optimal. The sensitivity analysis algorithm proposed in this paper can choose the optimal set of trees to construct an optimal CCM diagnostic equation, and enhance the diagnostic precision. But nowadays increasing attention is being paid to test generation algorithms. Most test generation algorithms use a single value in the fault model. But the single values cannot substitute for the actual faults that may occur, because the possible faulty values vary over a continuous range. To solve this problem, this paper presents a continuous fault model for the test generation algorithm which has a continuous range of parameters. The test generation algorithm with this model can improve the treatment of the tolerance problem, including the tolerances of both normal and faulty parameters, and enhance the fault coverage rate. The two methods can be applied in different situations.  相似文献   

5.
We study power control in optimization and game frameworks. In the optimization framework there is a single decision maker who assigns network resources and in the game framework users share the network resources according to Nash equilibrium. The solution of these problems is based on so-called water-filling technique, which in turn uses bisection method for solution of non-linear equations for Lagrange multipliers. Here we provide a closed form solution to the water-filling problem, which allows us to solve it in a finite number of operations. Also, we produce a closed form solution for the Nash equilibrium in symmetric Gaussian interference game with an arbitrary number of users. Even though the game is symmetric, there is an intrinsic hierarchical structure induced by the quantity of the resources available to the users. We use this hierarchical structure to perform a successive reduction of the game. In addition to its mathematical beauty, the explicit solution allows one to study limiting cases when the crosstalk coefficient is either small or large. We provide an alternative simple proof of the convergence of the Iterative Water Filling Algorithm. Furthermore, it turns out that the convergence of Iterative Water Filling Algorithm slows down when the crosstalk coefficient is large. Using the closed form solution, we can avoid this problem. Finally, we compare the non-cooperative approach with the cooperative approach and show that the non-cooperative approach results in a more fair resource distribution.  相似文献   

6.
In order to analyse the reasons for continuously high failure rates due to electrical overstress (EOS) a large number of publications published over the past 40 years in the field of EOS is investigated and evaluated. It is found that there is no common understanding on EOS. To resolve this problem criteria for a suitable EOS definition are introduced and a corresponding definition is proposed.  相似文献   

7.
Establishing radio communication between military commanders, soldiers and law enforcement officers is an important enabling capability to facilitate interoperability. The Joint Tactical Radio System (JTRS) program is enabling communications within the military by implementing different military radio waveforms on software defined radio (SDR) platforms. It is logical to include a Project 25 (P25) public safety waveform in the JTRS waveform portfolio. This paper describes the rapid development of a P25 waveform on a surrogate JTRS SDR platform. The development process and methodology, which starts from a platform agnostic executable waveform model in Matlab, through an intermediate implementation using open tools on generic platforms, to the final platform-specific implementation, is introduced and discussed. This paper shows that adopting this methodology can speed up waveform development and porting. Furthermore, this paper presents the design and implementation of a three way voice bridge among P25, the future multiband multiwaveform modular tactical radio (FM3TR), and voice over Internet Protocol (VoIP), with software communication architecture (SCA) compliant implementation for both the P25 and FM3TR waveforms. This paper shows that critical issues such as interoperability can be tackled efficiently by leveraging SDR and SCA.  相似文献   

8.
With the development of both optical fiber-based communication and sensation, one interesting topic has been pointed out. How to connect those mountains of sensors to detect the signal in a large area, and how to make the cost of sensing system lower enough should be studied. A network of sensors is a good option. All sensing equipments, including the interrogators and the sensors, will be internetworking together. However, fiber optic communication networks have been developed very well over the past two decades. Is it necessary to rebuild a new network for sensors? In this paper, some new technologies in the two areas of fiber optic sensors and fiber optic communication will be addressed. Then, the available overlay architecture of a fiber optic sensors network will be presented. Finally, a polymorphous optical burst switching (POBS)-based architecture will be proposed, which can support all kinds of services, including digital data optical circuit/burst/packet switching and analog fiber optic sensor signal circuit/burst switching, etc.  相似文献   

9.
10.
A typical application field of Wireless Sensor Networks (WSNs) is the collection of environmental data, which is sent to a base station. Routing protocols are needed to efficiently direct the information flows to the base station. Since sensor nodes have strict energy constraints, data gathering and communication schemes for WSNs need to be designed for an efficient utilization of the available resources. An emergency management scenario is investigated, where a sensor network is deployed as virtual lifeline for fire fighters entering a building. Besides of supporting their navigation, the virtual lifeline is also used for two further purposes. First it enables the exchange of short voice messages between fire fighter and command post. For this, a fast and reliable routing protocol (EMRO) has been developed based on a broadcasting scheme. Second, measuring data, like temperature and gas, in the environment and informing fire fighters and command post about it, is of high importance. For this purpose a network coding based data gathering algorithm has been designed. The feasibility of simultaneously using the virtual lifeline for data gathering and communication and thus the coexistence of a classical routing protocol with a network coding scheme is studied in this paper by means of simulation and real experiments. The resilience to packet loss and node failure, as well as the transmission delay are investigated by means of short voice messages for the communication part and temperature readings for data gathering.  相似文献   

11.
This study expanded transactive memory theory by incorporating affective influences on processes that have been primarily examined through a cognitive lens. Drawing on J. P. Forgas' (1995) affect infusion model, the research developed a multilevel model of the role of individual‐ and group‐level state positive affect for individual transactive communication, operationalized as information seeking and sharing. A test of the model using 25 student groups showed that (a) both individual‐ and group‐level positive affect were positively related to individual volume of transactive communication; (b) affective homogeneity among members of a group had a significant relationship to information sharing, but not information seeking; and (c) the interaction between affective homogeneity and group positive affect did not impact either transactive communication process.  相似文献   

12.
13.
The above paper, by AH A. Al-Shaikhi and Jacek Ilow, claimed to have developed a tighter upper bound on post- decoding erasure rate for binary product codes by deriving the exact number of unrecoverable erasure patterns over some range of the number of erasures. We show that (Equations 9 -12) are inaccurate, and hence the resultant tighter upper bound is questionable.  相似文献   

14.
This paper is concerned with the H filtering problem for a class of nonlinear Markovian switching genetic regulatory networks (GRNs) with time-delays, intrinsic fluctuation and extrinsic noise. The delays, which exist in both the translation process and feedback regulation process, are not dependent on the system model. The intrinsic fluctuation is described as a state-dependent stochastic process, while the extrinsic noise is modeled as an arbitrary signal with bounded energy, and no exact statistics about the noise are required to be known. The aim of the problem addressed is to design a Markovian jump linear filter to estimate the true concentrations of mRNA and protein through available measurement outputs. By resorting to the Lyapunov functional method and some stochastic analysis tools, it is shown that if a set of linear matrix inequalities (LMIs) is feasible, then the desired linear filter exists. The designed filter ensures asymptotic mean-square stability of the filtering error system and two prescribed L 2-induced gains from the noise signals to the estimation errors. Finally, an illustrative example is given to demonstrate the effectiveness of the approach proposed.  相似文献   

15.
A wide bandwidth continuous time sigma delta analog-to-digital conversion is implemented in 130?nm process. The circuit is targeted for wide bandwidth applications such as video or wireless base-stations. The third-order continuous time sigma delta modulator comprises a third-order RC operational-amplifier-based loop filter and 3-bit internal quantizer operated at 512?MHz clock frequency. To reduce the clock jitter sensitivity, nonreturn-to-zero DAC pulse shaping is used. The excess loop delay is set to half the sampling period of the quantizer, and the degradation of modulator stability due to excess loop delay is avoided with this architecture. The sigma delta ADC achieves a 60?dB SNR and a 59.3?dB signal-to-noise-plus-distortion ratio over a 16?MHz signal band at an oversampling ratio of 16. The power consumption of the continuous time sigma delta modulator is 22 mW from the 1.2?V supply.  相似文献   

16.
Medical intervention by electrical current as applied to humans or animals may have tremendous therapeutic impact if delivered while being carefully controlled. Otherwise, the situation can be harmful in terms of injury or even become lethal. These consequences demand close inspection of all relevant biological and technical factors. Regarding methods to counter fibrillation of the heart substantial progress has been made, but defining a gold standard for the waveshape and energy delivery remains a serious challenge. The anticipated answer is not simply a range somewhere between a maximum and a minimum, but most likely an "intelligently" selected case-specific optimum, delicately positioned between effective and unsafe. Combining insight from theory with pertinent experimental findings may offer a clearer view on an unresolved issue that often points to a cross-road of life and death.  相似文献   

17.
The increasing number of radio access technologies and the availability of multi-radio devices boost the need for novel resource allocation schemes in cellular networks. This paper uses a cooperative game theoretic approach for resource allocation at the network level, while utilizing simultaneous use of available radio interfaces at the device level. We model resource allocation management using the well known bankruptcy model and apply Kalai-Smorodinsky bargaining solution method to find a distribution rule, based on which we propose resource allocation and call admission control schemes. Performance analysis of our allocation and control schemes demonstrates significant improvements over previous approaches in terms of utilization of the available bandwidth and the number of call drops. We also study the performance of proposed approach for different operator policies.  相似文献   

18.
19.
This paper reports comparisons between RTW VCO and LC QVCO 12?GHz PLLs, designed in a 130?nm CMOS technology for satellite communication applications. The phase noise at 1?MHz offset from the carrier is ?102?dBc/Hz for the RTW VCO PLL and ?98?dBc/Hz for the LC QVCO PLL, and the power consumption is 39 and 17?mW, respectively.  相似文献   

20.
The performance of non-data-aided feedback-loop symbol timing synchronization operating with the raised-cosine (RC) and the ?better than? raised-cosine (BTRC) pulses is investigated. The individual effects of additive channel noise, selfnoise, and their product on the variance of the jitter are studied for the two pulses. The BTRC pulse is shown to have better synchronization performance than the conventional RC pulse, except when the signal-to-noise ratio is very large and the excess bandwidth is large. Furthermore, in the case where a prefilter removing self-noise is employed, the BTRC pulse always has a performance gain over the RC pulse. The gain is, for example, as much as 1.4 dB for excess bandwidth of 0.35 without a prefilter and is larger when the excess bandwidth is smaller or a prefilter is employed.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号