首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
The threat of cyber attacks motivates the need to monitor Internet traffic data for potentially abnormal behavior. Due to the enormous volumes of such data, statistical process monitoring tools, such as those traditionally used on data in the product manufacturing arena, are inadequate. “Exotic” data may indicate a potential attack; detecting such data requires a characterization of “typical” data. We devise some new graphical displays, including a “skyline plot,” that permit ready visual identification of unusual Internet traffic patterns in “streaming” data, and use appropriate statistical measures to help identify potential cyberattacks. These methods are illustrated on a moderate-sized data set (135,605 records) collected at George Mason University.  相似文献   

2.
3.
This paper contains a security analysis of the construction of a public key steganographic system based on chaos theory and the Euler theorem (PKS-CE) as proposed by Lou and Sung in a previous issue of this transactions. Our analysis results in attack strategies on two different layers: first, we identify weaknesses of the embedding function, which allow a passive warden to tell steganographic images from clean carriers apart. Second, we show that the allegedly asymmetric trap-door function in fact can be efficiently inverted solely with the knowledge of its public parameters, thus revealing the secret message as plain text to a passive adversary. Experimental results from a re-implementation further indicate that the claimed robustness of the embedded message against transformations of the carrier medium was far too optimistic. Finally, we demonstrate that a secure alternative system can easily be constructed from standard primitives if the strong assumptions made in PKS-CE for the mutual key exchange can actually be fulfilled.  相似文献   

4.
5.
6.
7.
Past development of small batch production has led to advanced horizontal and vertical division of labor, job shop manufacturing, and the use of NC machines. This has caused serious difficulties such as long and variant throughput times, an unfavorable ratio of unproductive to productive workers, and low quality of work. Additionally confronted with deeply changed market conditions, the management is split over the right answer to this challenge. Most managers and production planners try to replace human work still further by enforced use of computers on the shop floor and in the technical office in an integrated manner (CIM). Since this strategy is very likely to create new severe problems, the minority seeks to avoid them by reorganizing production and rearranging the division of functions between humans and machines profoundly (skill based manufacturing). This position is outlined in this paper in some detail and examples of realized subsystems, as first steps on this development path, are included. Finally, reasons for its superiority and resistance to implement it are discussed.  相似文献   

8.
9.
10.
11.
Computer integrated manufacturing (CIM) is creating unexpected problems for a growing number of manufacturing companies. Manufacturers are finding it especially difficult to attract programmers who are both willing and able to develop the highly complex software that integrates existing accounting, sales, production, engineering, and quality control information subsystems. Consequently, many companies abdicate their responsibility for manufacturing information systems and seek third party support ranging from consulting assistance to a total takeover of the company's information resources and operations. Companies that “give away” their internal information system capabilities to third parties will ultimately lose control of their enterprise information, a danger to be avoided. Off-the-shelf software for desktop computers has become sufficiently powerful to help solve a major portion of this serious problem. We hypothesize that manufacturing engineers (and others) can be trained to use packaged software to leverage their company's systems programming capabilities. In effect they would become “paraprogrammers” who would help design, develop, and maintain manufacturing information systems. This new type of professional would not require a computer science or similar educational background, but could be trained to satisfy many specialized programming needs in a manner similar to how paramedics and paralegals are trained and used in the medical and legal professions, respectively. This paper reports on the early stages of research to determine whether or not product design engineers can use a desktop relational database management system and its various command languages to develop a master bill of material information system (BOMIS). The purpose of the research is to evaluate the amount of programming complexity reduction and increased operational effectiveness that can be achieved through paraprogramming by manufacturing engineers.  相似文献   

12.
13.
14.
15.
The problem of maximum depth of monotone Boolean functions is investigated when k-input AND and OR gates are used for realisation.  相似文献   

16.
Let g be any local property (e.g., gray level or gradient magnitude) defined on a digital picture. Let pg(z) be the relative frequency with which g has value z. At each point (x,y) of the picture we can display pg[g(x,y)], appropriately scaled; the result is called the pg transform of the picture. Alternatively, we can use joint or conditional frequencies of pairs of local properties to define transforms. This note gives examples of such transforms for various gs and discusses their possible uses and limitations.  相似文献   

17.
This paper describes the information system used to search for a potential matrimonial partner. The search is based on comparison of the subject's record, which consists of his/her answers to about 400 items of a specially designed questionnaire, to the records of the potential partners. The basic principle of the system is representation of the set of candidates for the client with psychological warnings about potential “conflict zones” in relationships between client and candidate rather than a ranking of candidates based on hypothetical “psychological compatibility” indices.  相似文献   

18.
Problems that are non-quantitative and not bound to a narrow knowledge domain have been served unsatisfactorily by decision support and expert systems. Alternative techniques that address this type of problem are explained here using two key concepts: problem type dependent process support and domain related knowledge. Process support refers to the program steps and the data items useful in finding the solution. Domain related knowledge is knowledge drawn from a specific domain, yet through abstraction applicable to a wider range of problems. Results of preliminary empirical analyses suggest that both concepts are useful.  相似文献   

19.
20.
Eight VDTs of different trademarks were analysed in relation to the following properties:

( a) Contrasts of luminance between the screens on the one hand and source documents, as well as other surfaces of the VDT, on the other.

(b) Oscillation degree, sharpness and stability of characters.

( c) Face and legibility of characters.

( d) Dimensions, mobility and reflection degrees of the keyboards.

Special equipment was developed and standardized conditions were applied to the measurements.

The eight VDTs showed essential differences for all the parameters, which might be partially responsible for eye strain and postural complaints. It can be concluded that customers should pay more attention to ergonomic qualities when choosing a VDT. But such an endeavour remains useless if the customer does not, at the same time, look for a proper design of the whole workstation including the working environment.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号