首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
在多种类病毒的相互作用下,网络信道破坏程度呈现较强的非线性特点,不能准确约束病毒在相互作用下的破坏性.传统的网络破坏程度估计的过程中,仅仅以单一病毒破坏程度叠加的方式去计算参数,计算具有较强的主观性,没有准确描述不同病毒的破坏作用,对评估结果误差影响较大.为解决上述问题,提出一种基于粒子滤波算法的多种类病毒相互作用下网络信道破坏程度估计方法,利用欧式距离方法对全部病毒进行分类,获取不同类型病毒的网络信道破坏程度值.通过粒子滤波算法对单一个体约束的优势,将每一个不同类型的病毒看作一个粒子,并进行训练.根据训练结果,利用粒子滤波算法对当前时刻网络信道破坏程度进行估计,完成整体评估.实验结果表明,利用改进算法进行多种类病毒相互作用下网络信道破坏程度估计,能够有效提高估计的准确率.  相似文献   

2.
针对分布式传感器网络中多目标随机集状态混合无序估计问题,本文提出了一种基于高斯混合概率假设密度无序估计分布式融合算法.在高斯混合概率假设密度滤波器的框架下,首先基于概率假设密度递推滤波特性,建立适用于多目标随机集状态混合无序估计的最新可利用估计判别机制,然后利用扩展协方差交叉融合算法对经过最新可利用估计判别机制获得的无序概率假设密度强度估计进行融合处理,针对融合过程中高斯分量快速增长的问题,在保证信息损失最小的前提下,对融合过程的不同环节实施高斯混合分量裁剪操作,给出了一种多级分层分量裁剪算法.最后,仿真实验验证了文中所提的算法的有效性和可行性.  相似文献   

3.
在对网络入侵中边界模糊阈值进行确定的过程中,以往都是以入侵数据的单个异常特征为检测基础,没有考虑入侵后数据所表现的阶跃特征,出现网络入侵的判断不确定性,造成获取边界模糊阈值不准确的问题.文章提出一种基于阶跃模糊规则参数训练的网络入侵中边界模糊阈值的确定方法.该方法证明了网络遭到入侵后,数据整体带有阶跃性特征,依据这种阶跃性特征对入侵后的边界模糊阈值进行预测,塑造模糊系统的if-then规则,求出模糊系统的阈值输出,实现网络入侵中边界模糊阈值的确定.实验结果表明,该方法能较为准确地确定入侵模糊阈值,效果明显.  相似文献   

4.
韩红章 《计算机仿真》2015,32(4):273-276
在网络入侵检测优化的研究中,对网络入侵特征进行准确检测,由于在复杂的网络环境中会存在大量噪声,传统的方法只是单一的入侵特征聚类方法,难以在包含大量噪声的复杂网络环境中进行入侵特征聚类.提出一种基于目标协同规划思想的网络入侵特征聚类方法.利用标准化处理过程和归一化处理过程对对网络入侵数据进行预处理,能够将原始的网络入侵特征属性映射到标准属性空间.提取入侵特征构成数据集合,并进行降维处理,为入侵特征的聚类提供了准确数据基础,将可能性模糊聚类算法和聚类中心分离的模糊聚类算法进行入侵特征聚类目标的协同规划,能够得到准确的聚类中心.实验结果表明,改进算法能够提高网络入侵聚类的准确率.  相似文献   

5.
在多源头网络入侵检测的研究中,由于网络中接入不同协议的网络,造成入侵后很难确定入侵源头,传统入侵检测方法是根据单源网络确定入侵来源,进行入侵数据的确认,在多源网络中,无法确定入侵源头,导致多源头分布网络入侵检测模型的数据分类收敛效率低,检测准确率很低.提出了一种无约束聚类关联以及重复博弈因子的多源头网络入侵特征有效分类检测模型,面向多源头网络特征塑造多源头网络入侵模型,按照访问数据的辨识属性完善入侵检测模型,采用无约束聚类关联的入侵检测算法对网络多属性子干扰进行准确分类,在分类概率计算中融入约束计算博弈因子,采用数据博弈过滤网络入侵特征概率匹配过程中的多次概率对比,通过博弈约束计算最优反应函数,使得多源头网络入侵特征分类达到最优.仿真结果说明,所提模型可对网络入侵特征进行有效的分类,并且误检率和检测率都优于传统模型,具有明显的优化效果.  相似文献   

6.
针对传统电力变压器故障检测方法对电力系统中潜藏的故障问题检测水平不足,准确率较低,无法及时准确的发现异常隐患等问题,提出基于贝叶斯网络的变压器局部放电故障检测方法;首先通过传感器获取电力变压器不同状态下运行过程中的参数数据,对局部放电故障发生的概率和范围进行合理性评估,提取评估概率数据综合为样本数据集,构建贝叶斯网络故障树;根据逻辑规则转化为贝叶斯网络,推演计算故障节点之间的算例关系,利用贝叶斯原理抽取故障特征指标与异常概率之间的关联关系,利用模糊描述方法构建故障特征关联函数,计算可得故障特征模糊函数动态变化关系,实现对变压器故障发生的概率与位置信息的判断与确定;实验结果表明,利用贝叶斯网络对电力变压器局部放电故障检测准确率达到85%以上,最高可达96%,说明该方法具有较高的检测准确率,能够有效提高电力变压器放电故障检测的有效性。  相似文献   

7.
对空气中的PM2.5颗粒污染物进行准确测试,有利于控制大气污染.PM2.5颗粒较小,在风速、大气环境等复杂因素的影响下,PM2.5污染物扩散过程在空气中呈现高度的随机性,污染物扩散过程无法约束,污染物在空气中呈现实时不均匀分布.传统的物联网环境下空气PM2.5污染物检测方法,仅仅对小区域的PM2.5测试结果进行测试,通过把不同区域的结果进行加权求平均,完成大区域检测,没有考虑扩散过程中颗粒物的扩散不均匀造成小区域测试结果的实时变化,测试结果不准.提出采用多信号融合估计算法的物联网框架下PM2.5高精度测试模型.建立粗糙集神经网络模型,将所有的物联网框架下PM2.5输入到该模型中,输出的结果是PM2.5高精度测试结果.针对PM2.5高精度测试结果来自于不同的区域,利用多信号融合估计方法对数据进行约束融合,得到PM2.5高精度测试非线性约束下的结果.实验结果表明,利用改进算法进行物联网框架下PM2.5高精度测试,能够极大的提高测试的准确性.  相似文献   

8.
对网络安全态势准确感知能实现对网络攻击的提前拦截和防范,针对传统的匹配检测方法对网络安全态势预测的精度不好的问题,提出一种基于遗传算法的网络安全态势感知模型,首先构建复杂网络环境下的病毒入侵的安全状态分布模型,进行网络安全态势的特征信息提取,然后采用遗传算法对提取的病毒入侵信息流进行相关性检测,实现安全态势预测和准确感知。仿真实验结果表明,该方法进行网络病毒入侵的准确检测概率较高,对安全态势预测的精度较高,保障了网络安全。  相似文献   

9.
针对传统模糊特征检测方法存在的效率低、精度不高等问题,设计了一种新的网络安全防护态势优化模型;对网络安全状态分布进行建模,并利用数据挖掘技术对网络信息进行挖掘;利用新型入侵识别检测方法对所设计的网络安全估计状态进行自适应特征提取,提取网络安全状况的特征数据集和处理单元;采用模糊C平均数据聚类方法(FCM)提取综合信息;对入侵特征信息流进行分类,根据属性分类结果进行网络安全态势预测,实现安全态势评估;基于不同场景下进行实验,结果表明,所提算法适用于网络安全的场景,准确性和鲁棒性都得到了验证。  相似文献   

10.
多层差异网络深度入侵数据挖掘方法研究   总被引:2,自引:0,他引:2  
研究多层差异网络入侵的高效检测问题,保障工业网络控制系统的安全.由于在多层差异网络环境下,不同层次、不同深度的网络空间受到的入侵破坏程度和入侵特征完全不同.传统的入侵检测都是把这些差异化的入侵结果进行加权,计算一个融合后的阀值,衡量是否被入侵,但是这种方法没有对不同层次的入侵特征进行细分,误报率和漏报率较高,提出一种基于模糊C均值聚类算法的多层差异网络深度入侵检测的数据挖掘方法.采集相关数据进行样本特征的提取和分析,利用模糊C均值聚类方法对不同层的入侵数据进一步的分类计算,在分类后的结果中,获取异常数据的行为模式,根据不同模式的结果完成入侵检测.实验结果表明,利用改进算法进行多层差异网络深度入侵检测挖掘,能够提高检测准确率,降低误报率,提高检测效率.  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
蒙古语言是中国蒙古族使用的通用语言,由于蒙古文区别于其他文字的书写方式和其自身变形机制等特点,在很多通用的文字处理引擎中都不被支持。在嵌入式产品开发与应用领域中Linux加QTE已经成为流行方式。该文给出了一种在QTE环境上实现基于标准Unicode的蒙古文点阵显示和变形算法, 并自定义了支持蒙古文的QTE组件,扩展了QTE功能,为在Linux加QTE方式的嵌入式体系结构中处理蒙古文提供了一种解决方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号