共查询到20条相似文献,搜索用时 15 毫秒
1.
Neural Processing Letters - Skin diseases have become a challenge in medical diagnosis due to visual similarities. Although melanoma is the best-known type of skin cancer, there are other... 相似文献
2.
数据流量识别技术在应对网络病毒、网络入侵检测和网络管理等方面部有着重要的应用。当前主要的网络流量识别技术主要是DPI(Deep Packet Inspection)和DFI(Deep Flow Inspection),两种技术都各自有优点和缺点。本史提出了一种网络架构,将DPI和DFI技术相结合,并通过数据挖掘技术来辅助发现分类规则,应用FPGA的可编程性和并发性来加速识别和处理过程。 相似文献
3.
4.
1 IntroductionThe explosion in size and complexity of today's computer network means that NetworkManagement (NM) is a critical factor. The ever growing demand for distributed applicationscoupled with increasing corporate globalization often leads to users requiring constant network availability as the network becomes the primary strategic resource. The currellt NMbecomes increasingly inadequate, since the networks to be managed are heterogeneous anddynamic, and manapemellt functions, such as… 相似文献
5.
尽管网络流量会出现异常,但大部分时间里流量变化是有规律的。如果网络流量出现异常,那么对整个网络具有较大的危害性,因此网管人员必须及时发现流量是否异常。在以往的流量检测算法中聚焦的焦点只是如何区分流量是正常还是异常,并未讨论此时是否存在攻击行为,这些是算法的不足之处。为了改进现有算法的不足之处,作者在查阅了有关资料和文献之后,提出了一种新的流量检测算法,该算法使用了相似性计算法算法,MMTD算法和粗糙集中的决策系统,将这三种算法在流量检测中进行应用是本文的创新点。本文解决问题的思路是首先使用MMTD算法对当前的流量是否异常做出判断,如果出现异常,则使用相似性计算算法将此时的流量与预警值进行比较,并且判断此时是否存在攻击行为,在文章的最后使用粗糙集中的决策系统对流量异常的原因做出决策。 相似文献
6.
本文从 A T M 模型出发,介绍了一种基于多 Agent服务的网络体系结构。本结构在硬软件方面提供通信服务、链接许可控制及信令服务等功能;支持以用户为中心的 Qo S 规程,允许多 Agent 满足终端用户的各种服务请求。本结构之原型模拟系统经运行后,初步实现了内部带宽存储等机制,有效地满足了用户的 Qo S需求。 相似文献
7.
本文提出了一种根据业务特性对网络应用进行分类的方法,设计了一种支持流量工程的MPLS网络改进模型,给出了该模型的路由机制、资源分配、服务质量保证和流量工程策略等机制,最后分析了该网络模型的利弊。 相似文献
8.
Leonidas Lymberopoulos Emil Lupu Morris Sloman 《Journal of Network and Systems Management》2003,11(3):277-303
This paper presents a framework for specifying policies for the management of network services. Although policy-based management has been the subject of considerable research, proposed solutions are often restricted to condition-action rules, where conditions are matched against incoming traffic flows. This results in static policy configurations where manual intervention is required to cater for configuration changes and to enable policy deployment. The framework presented in this paper supports automated policy deployment and flexible event triggers to permit dynamic policy configuration. While current research focuses mostly on rules for low-level device configuration, significant challenges remain to be addressed in order to:a) provide policy specification and adaptation across different abstraction layers; and, b) provide tools and services for the engineering of policy-driven systems. In particular, this paper focuses on solutions for dynamic adaptation of policies in response to changes within the managed environment. Policy adaptation includes both dynamically changing policy parameters and reconfiguring the policy objects. Access control for network services is also discussed. 相似文献
9.
This paper presents an integrated framework for describing and implementing quality of network (QoN) concepts. It focuses on identifying a systems engineering framework for better understanding how to specify and implement QoN concepts. We demonstrate, by means of several examples, that the quality of service interfaces between the end user and the underlying network are very important. Finally, we provide insights as to future development efforts needed to realize the goal of high quality networks. 相似文献
10.
11.
QoS体系中流量工程与网络规划的功能框架 总被引:2,自引:1,他引:2
概述了Internet网络的发展趋势,分析了QoS提供体系的研究现状,指出了现有研究的不足,然后,将网络规划引入QoS提供体系架,把网络规划和流量工程结合起来,拓展了原有的QoS提供体系框架,最后,提出了网络规划和流量工程综合框架的系统流程,并且严区分了网络规划,流量工程和网络优化的作用范围。 相似文献
12.
Yustus Eko Oktian Sang-Gon Lee JunHuy Lam 《Journal of Network and Systems Management》2018,26(1):147-168
Implementing REST API for SDN is quite challenging compared to conventional web services. First, the state transfers in SDN are more complex among network devices, controllers, and applications. Second, SDN provides more granular resources in both the controller and the network device itself. Those challenges require SDN to have a proper REST API security definition, which is currently not available in most of the SDN controllers. In this paper, we propose and implement a REST API security module for SDN controller based on OAuth 2.0. We answer the SDN REST API security challenges by presenting novel access control parameters to cope with the granular resources introduced by SDN. Our prototype maintains the best trade-off between performance and safety by generating a maximum value of 15% overhead during our benchmark. It also offers a customizable and flexible access control for the network in various use cases. 相似文献
13.
Xue He Tiancheng Zhang Minghe Yu Ge Yu Yuhai Zhao 《International Journal of Software and Informatics》2022,12(4):501-515
Knowledge tracing is of great significance for providing better personalized learning guidance and has thus attracted extensive research attention in recent years. The task of knowledge tracing is to model students'' learning process on the basis of historical exercise records and trace students'' knowledge proficiency, thereby predicting students''
performance on future exercises or recommending exercises for better proficiency. Existing methods focus on either the skill level or the exercise level, ignoring the relationships among exercises and Knowledge Components (KCs). The classical single-factor models include the Deep Knowledge Tracing (DKT) {model} and the Dynamic Key-Value Memory Network (DKVMN) model. Although a few models, such as the Bayesian Knowledge Tracing (BKT) model and the Knowledge Proficiency Tracing (KPT) model, utilize the Q-matrix to improve model performance, most of them ignore the interaction among KCs, not to mention models that do not use the Q-matrix. Inspired by the recent success of network embedding, this paper presents a heterogeneous network embedding framework for knowledge tracing called HNEKT that takes both exercises and KCs into account. To adapt to the application of knowledge tracing, this paper also proposes several meta-paths to generate meaningful node sequences for network embedding. Besides, it explores other side information as well to improve the extensibility and effectiveness of the proposed model. Extensive experiments on three real-world datasets demonstrate the effectiveness of the HNEKT model. 相似文献
14.
介绍了当前IP网络流量监控的主要方法,提出了一种运用移动代理技术来实现对IP网络流量有效监控的方法,阐述了移动代理环境,运用移动代理进行流量监控的过程,以及移动Agent和SNMPAgent的交互操作。 相似文献
15.
16.
17.
18.
Ronaldo M. Salles Jeronymo M. A. Carvalho 《Journal of Network and Systems Management》2011,19(3):367-393
This paper proposes an architecture capable of reducing network congestion caused by the intense use of non-cooperative traffic.
A charging scheme is imposed to all traffic that is carried over the UDP protocol (non-cooperative) given its intrinsic priority
over TCP. Prices are calculated according to the degree of starvation undergone by cooperative TCP flows. When TCP flows experience
a low performance, charges are high for non-cooperative flows and so the architecture tends to block new incoming UDP traffic.
Knowledge about flows status is obtained through the use of flow protocol technology. Resources are reserved using firewall
rules and custom-queueing mechanisms. An implementation of the architecture is made and tests show the effectiveness of our
proposal in a real network scenario. 相似文献
19.
提出了一种基于概率论观点的归一量化算法,该算法通过将网络繁忙程度归一量化,从而完成对当前网络性能的评价,并将评价结果用曲线记录下来,用随机变量的数字特征描述该曲线。这种有记忆怕归一量化标准能够体现网络的实际情况,具有简单、全面的特点。在程序设计中,还采用了多线程的设计思想,使系统能快速地响应Windows消息。 相似文献
20.
胡孟杰 《计算机与数字工程》2009,37(6):44-46
网络流量监控是实现网络性能分析和监控的重要手段,文章阐述了采用排队论建立网络流量分析的基本模型,得出网络的流量预测方式和稳态拥塞率求解公式,结合常用的网络流量监控参数,合理的实现对网络流量的估算和监控过程。 相似文献