首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 187 毫秒
1.
基于模糊聚类的Web日志挖掘   总被引:10,自引:0,他引:10  
李桂英  李吉桂 《计算机科学》2004,31(12):130-131
本文使用模糊聚类的方法对Web日志进行数据挖掘,实现用户聚类和页面聚类,并设计与实现了一个基于模糊聚类的Web日志挖掘系统。  相似文献   

2.
通过深入研究日志的类型和特点,设计并实现了一套基于并行计算的海量日志文件分析系统。该系统采用集群方式并行地收集日志文件,采用分布式文件系统存储,最终利用并行计算对日志进行分析处理。该系统实现了日志采集、分析的完全自动化处理,在系统部署之后能够有效地进行系统安全的维护、系统性能的优化、系统故障的排查。该系统结合云计算提高了日志分析的效率,解决了海量日志处理过程中存在的问题,为海量日志分析提供了一个完整有效的解决方案。  相似文献   

3.
传统的文件系统日志服务无法满足嵌入式系统异常记录的实时性需求。在国产ReWorks嵌入式实时操作系统中设计实现了一种基于内存的日志服务,通过记录异常信息到日志内存中,在热重启后仍然可以从内存中获取复位前所记录的系统异常日志信息。通过在国产FT2000A/2硬件平台的验证和分析,对其实时性和可用性实现了进一步优化。测试数据表明,内存日志服务记录一条完整异常信息到内存日志平均耗时约为文件日志的0.5%,内存文件系统的写性能近270 MB/s,是SSD硬盘文件系统的6倍,具有高实时性、热重启不丢失、非阻塞等特性,对实时系统的异常分析定位与故障统计排查提供了有力支撑。  相似文献   

4.
Syslog日志作为应用最广的一种网络安全日志协议和格式,在网络运维中发挥着十分重要的作用,通过实时分析日志,可以及时监控用户行为,减少或避免安全事件带来的损失。当前,日志系统主要对多种格式的日志进行综合性分析,而对基于Syslog日志的实时分析能力不足,存在分析结果不准确、针对性不强的问题。针对上述问题,本文首先研究了日志分析面临的挑战,日志实时分析方法的研究现状,最后从两个方面对传统Syslog日志实时分析方法进行了优化和实现,经评估取得了一定效果。  相似文献   

5.
通过深入研究日志的类型和特点,设计并实现了一套基于并行计算的海量日志文件分析系统.该系统采用集群方式并行地收集日志文件,采用分布式文件系统存储,最终利用并行计算对日志进行分析处理.该系统实现了日志采集、分析的完全自动化处理,在系统部署之后能够有效地进行系统安全的维护、系统性能的优化、系统故障的排查.该系统结合云计算提高了日志分析的效率,解决了海量日志处理过程中存在的问题,为海量日志分析提供了一个完整有效的解决方案.  相似文献   

6.
随着互联网的飞速发展,在线各服已经成为了互联网网站的一个必不可少的功能。但是随着系统协同浏览、远程协助等功能的增强,操作的安全性日渐成为了突出的问题。本文设计了一个基于Harris校准和DCT域的抗几何攻击水印算法,将水印信息嵌入到日志系统中,实现了日志系统的唯一性的和不可修改性的技术验证,能够较好的为从法律角度上保障双方对于日志内容的合法性和唯一性提供了保障。最后描述了系统的实现方法,将设计思想加以应用。  相似文献   

7.
Windows平台下安全审计技术的探讨与实现   总被引:7,自引:0,他引:7  
简述了安全审计技术对计算机安全的重要性,通过对Windows日志的分析并利用系统API函数替换法和状态转移分析法提出了基于用户行为的审计技术和基于状态转移法的日志审计技术。最后。在状态转移法的理论指导下实现安全日志的轻型审计系统。  相似文献   

8.
基于Agent技术的多源日志采集系统的设计与实现   总被引:2,自引:0,他引:2  
在分析Agent技术以及4种日志采集技术的基础上,本文提出了一个基于Agent技术的多源日志采集系统,来实现采集各种类型的系统日志。本文详细分析了系统的基本架构以及日志采集Agent的结构模型和工作流程。最后探讨了基于正则表达式的日志数据的识别与抽取以及日志XML格式化的实现技术。  相似文献   

9.
操作日志是各种应用系统非常重要的一部分,它记录了用户在系统中进行的操作,为系统管理者进行审计跟踪提供了数据支撑。本文介绍一种基于struts2拦截器模式的操作日志系统设计,它在实现操作日志记录的同时,以极其优雅及简洁的方式降低了业务逻辑与操作日志记录之间的耦合性,是实现操作日志的理想选择。  相似文献   

10.
本文提出一种基于rsyslog来收集分析*nix系统里面产生的各种日志的大规模日志收集与分析的方法,最终实现一个基于Web架构的完善的系统级日志和应用级日志处理分析系统。实验表明该系统能有效解决大规模日志收集与分析中出现的各类问题。  相似文献   

11.
This article discusses the history and design of the special versions of the bombe key-finding machines used by Britain’s Government Code & Cypher School (GC&CS) during World War II to attack the Enigma traffic of the Abwehr (the German military intelligence service). These special bombes were based on the design of their more numerous counterparts used against the traffic of the German armed services, but differed from them in important ways that highlight the adaptability of the British bombe design, and the power and flexibility of the diagonal board. Also discussed are the changes in the Abwehr indicating system that drove the development of these machines, the ingenious ways in which they were used, and some related developments involving the bombes used by the U.S. Navy’s cryptanalytic unit (OP-20-G).  相似文献   

12.
13.
Multisim8是一款优秀仿真软件,使用该软件可对电路进行各种参数分析。我们在享受其便利的同时,也遇到因缺少元器件导致电路仿真无法进行的阻力。解决此问题的方法就是为元件建立仿真模型并新建或扩充已有的元器件库。在不熟悉Spice编程原理的情况下,我们可通过相关网址查找到元件厂商提供的元件模型,利用模型导入的方法来建立需要的新元件。通过对新元件应用电路的仿真分析,新元件完全符合要求。在此基础上,使用元件的导入与导出功能还可对新元件进行文件备份并实现新元件在不同用户间的资源共享。  相似文献   

14.
针对追踪器使用卷积网络提取出来的特征模板进行目标位置匹配时,易产生响应噪声的问题,本文提出一种联合外形响应和卷积响应的深度目标追踪方法。在当前帧中,由前一帧提供的目标信息先分别提取卷积特征和外形信息,然后获得相应的卷积位置响应和外形位置响应;最后利用外形位置响应对卷积位置响应进行修正,从而有效地抑制响应噪声。实验表明:这种方法具有较高的位置精度,能够提高目标跟踪的准确性。  相似文献   

15.
The new method of defuzzification of output parameters from the base of fuzzy rules for a Mamdani fuzzy controller is given in the paper. The peculiarity of the method is the usage of the universal equation for the area computation of the geometric shapes. During the realization of fuzzy inference linguistic terms, the structure changes from the triangular into a trapezoidal shape. That is why the universal equation is used. The method is limited and can be used only for the triangular and trapezoidal membership functions. Gaussian functions can also be used while modifying the proposed method. Traditional defuzzification models such as Middle of Maxima − MoM, First of Maxima − FoM, Last of Maxima − LoM, First of Suppport − FoS, Last of Support − LoS, Middle of Support − MoS, Center of Sums − CoS, Model of Height − MoH have a number of systematic errors: curse of dimensionality, partition of unity condition and absence of additivity. The above-mentioned methods can be seen as Center of Gravity − CoG, which has the same errors. These errors lead to the fact that accuracy of fuzzy systems decreases, because during the training root mean square error increases. One of the reasons that provokes the errors is that some of the activated fuzzy rules are excluded from the fuzzy inference. It is also possible to increase the accuracy of the fuzzy system through properties of continuity. The proposed method guarantees fulfilling of the property of continuity, as the intersection point of the adjustment linguistic terms equals 0.5 when a parametrized membership function is used. The causes of errors and a way to delete them are reviewed in the paper. The proposed method excludes errors which are inherent to the traditional and non- traditional models of defuzzification. Comparative analysis of the proposed method of defuzzification with traditional and non-traditional models shows its effectiveness.  相似文献   

16.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

17.
面向查询的多文档摘要技术有两个难点 第一,为了保证摘要与查询密切相关,容易造成摘要内容重复,不够全面;第二,原始查询难以完整描述查询意图,需进行查询扩展,而现有查询扩展方法多依赖于外部语义资源。针对以上问题,该文提出一种面向查询的多文档摘要方法,利用主题分析技术识别出当前主题下的子主题,综合考虑句子所在的子主题与查询的相关度以及子主题的重要度两方面因素来选择摘要句,并根据词语在子主题之间的共现信息,在不使用任何外部知识的情况下,进行查询扩展。在DUC2006评测语料上的实验结果表明,与Baseline系统相比,该系统取得了更高的ROUGE评价值,基于子主题的查询扩展方法则进一步提高了摘要的质量。  相似文献   

18.
A method of synthesis of fuzzy stabilization systems for a broad class of dynamic objects under the assumption that the mathematical model of the object is not known a priori is proposed. The control is formulated in the form of a proportional law of adjustment as a function of a macro-variable; the square of the Euclidean norm of the phase variables is adopted as the macro-variable. An analogous variable characterizes the distance of the object from the equilibrium position. Despite the simplicity of the control law, its sign remains constant due to the fact that the macro-variable is positive-definite over the entire phase space. The switching times of the signals are determined by fuzzy identification of the system’s dynamic modes on the basis of measurement of the derivatives of the macro-variable.  相似文献   

19.
CCD camera modeling and simulation   总被引:2,自引:0,他引:2  
In this paper we propose a modeling of an acquisition line made up of a CCD camera, a lens and a frame grabber card. The purpose of this modeling is to simulate the acquisition process in order to obtain images of virtual objects. The response time has to be short enough to permit interactive simulation. All the stages are modelised: in the first phase, we present a geometric model which supplies a point to point transformation that provides, for a space point in the camera field, the corresponding point on the plane of the CCD sensor. The second phase consists of modeling the discrete space which implies passing from the continous known object view to a discrete image, in accordance with the different orgin of the contrast loss. In the third phase, the video signal is reconstituted in order to be sampled by the frame grabber card. The practical results are close to reality when compared to image processing. This tool makes it possible to obtain a short computation time simulation of a vision sensor. This enables interactivity either with the user or with software for the design/simulation of an industrial workshop equipped with a vision system. It makes testing possible and validates the choice of sensor placement and image processing and analysis. Thanks to this simulation tool, we can control perfectly the position of the object image placed under the camera and in this way, we can characterise the performance of subpixel accuracy determining methods for object positioning.  相似文献   

20.
程康明  熊伟丽   《智能系统学报》2019,14(4):689-696
针对一些工业过程中存在的有标签样本少,而传统的半监督学习无法保证对无标签样本准确预测的问题,提出一种双优选的半监督回归算法。首先,确定有标签样本密集区中心,并计算无标签样本与该中心的相似度,实现对无标签样本的优选,同时根据有标签样本间相似度优选有标签样本;然后,利用高斯过程回归方法对选出的有标签样本建立辅学习器,以对优选出的无标签样本预测标签;最后,利用这些伪标签样本提升主学习器的预测效果。通过数值例子以及实际脱丁烷塔过程数据进行建模仿真,证明了所提方法在有标签样本较少的情况下有良好的预测性能。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号