共查询到17条相似文献,搜索用时 62 毫秒
1.
在扩展自相似过程的基础上提出了一种新的业务模型。该业务模型可以实现任意的边缘概率分布,并且可以实现众多形状的相关函数,较之现有的ATM业务模型具有更广的适用范围。 相似文献
2.
为了解决大部分网络流量的自相似性研究中缺少高速真实的数据流的问题,提出了一个使用网络处理器IXP2400建立的自相似流量仿真系统。该系统利用分形布朗运动(FBM)模型产生自相似序列,以该序列作为数据发送带宽的依据;使用基于微引擎的发送控制算法实现高精度数据发送,以减少输出数据流赫斯特参数的误差,并利用IXP2400的硬件资源缩短随机中点置位(RMD)算法的计算时间。实验结果表明,该系统能够根据输入的赫斯特参数产生真实的自相似TCP数据流,最高数据发送速度接近900Mb/s,赫斯特参数的误差控制在5%以内。 相似文献
3.
针对当前虚拟维修过程中模型庞大,维修流程不可反复,部件间关系描述混乱等问题,论文提出一种Petri网和语义网络结合的过程建模方法——TJ(Training Join)网。TJ网上层利用语义网络对部件进行层次结构分解和资源规范聚类,实现子部件间逻辑互联;下层运用Petri网的变迁和触发规则提炼出Petri网元素模型,提高模型的通用性和建模效率。同时模型中的状态收集模块可实现部件属性状态间信息共享。最后,以虚拟维修平台中飞机电子设备架的维护为例,验证了TJ网的有效性。 相似文献
4.
李明亮 《中国新技术新产品》2013,(4):37-38
系统分析的方法多种多样,本文介绍了一种产品系统分析过程,这个过程使用了实体与行为分离的业务建模的思想来完成系统的分析,在文章中仔细分析了每个步骤怎么样做,输出入什么样的内容,得到什么样的输出,经过这样的分析过程后,使系统最核心的业务被固化下来,达到平台无关、具备更强的扩展性,每个领域内部关系及外部关系、系统中的每一个元素都得到集中的管理,对系统的理解不易产生歧义。本文所研究的系统分析过程具有很强的操作性,具备较高推广价值。 相似文献
5.
6.
热电偶在动态温度测量时由于热惯性存在动态误差。为补偿热电偶的动态误差,提出一种基于自回归与长短期记忆网络混合模型的补偿算法。该算法通过自回归模型对热电偶动态响应进行辨识,再由长短期记忆网络作为非线性补偿器校正动态误差。采用不同强度的高斯白噪声模拟噪声环境,仿真构建热电偶模拟测量数据集。在模拟测量数据集上对算法做验证。计算结果表明,该算法在不同噪声环境下均能有效地减少动态误差。搭建热电偶动态温度测量实验平台,以K型镍铬/镍硅热电偶为实验对象,取得实验测量数据集。实验和计算结果表明,经算法补偿后的热电偶动态响应得到改善,平均动态误差为0.002 8,标准差为0.010 2。 相似文献
7.
8.
9.
Jian Yuan Kevin L. Mills 《Journal of research of the National Institute of Standards and Technology》2006,111(3):227-242
Simulating and understanding traffic dynamics in large networks are difficult and challenging due to the complexity of such networks and the limitations inherent in simulation modeling. Typically, simulation models used to study traffic dynamics include substantial detail representing protocol mechanisms across several layers of functionality. Such models must be restricted in space and time in order to be computationally tractable. We propose an alternative simulation approach that uses homogeneous modeling with an increased level of abstraction, in order to explore networks at larger space-time scales than otherwise feasible and to develop intuition and insight about the space-time dynamics of large networks. To illustrate the utility of our approach, we examine some current understandings of the timescale dynamics of network traffic, and we discuss some speculative results obtained with homogeneous modeling. Using a wavelet-based technique, we show correlation structures, and changes in correlation structures, of network traffic under variations in traffic sources, transport mechanisms, and network structure. Our simulation results justify further investigation of our approach, which might benefit from cross-verifications against more detailed simulation models. 相似文献
10.
Mo Chen Xiaojuan Wang Mingshu He Lei Jin Khalid Javeed Xiaojun Wang 《计算机、材料和连续体(英文)》2020,64(2):941-959
Attacks on websites and network servers are among the most critical threats in
network security. Network behavior identification is one of the most effective ways to
identify malicious network intrusions. Analyzing abnormal network traffic patterns and
traffic classification based on labeled network traffic data are among the most effective
approaches for network behavior identification. Traditional methods for network traffic
classification utilize algorithms such as Naive Bayes, Decision Tree and XGBoost.
However, network traffic classification, which is required for network behavior
identification, generally suffers from the problem of low accuracy even with the recently
proposed deep learning models. To improve network traffic classification accuracy thus
improving network intrusion detection rate, this paper proposes a new network traffic
classification model, called ArcMargin, which incorporates metric learning into a
convolutional neural network (CNN) to make the CNN model more discriminative.
ArcMargin maps network traffic samples from the same category more closely while
samples from different categories are mapped as far apart as possible. The metric learning
regularization feature is called additive angular margin loss, and it is embedded in the
object function of traditional CNN models. The proposed ArcMargin model is validated
with three datasets and is compared with several other related algorithms. According to a
set of classification indicators, the ArcMargin model is proofed to have better
performances in both network traffic classification tasks and open-set tasks. Moreover, in
open-set tasks, the ArcMargin model can cluster unknown data classes that do not exist in
the previous training dataset. 相似文献
11.
12.
公交网络换乘问题的一种实现 总被引:8,自引:0,他引:8
公交换乘问题是公共交通信息查询的重要内容。针对公交网络换乘问题构造了公共交通网络模型。基于该模型,提出了基于改进Dijkstra算法的公交网络最短路径问题的求解。将求解最短路径获得的站点作为搜索站点,并将这些站点及经过这些站点的线路构成换乘矩阵,结合换乘次数的要求,给出了换乘的实现算法,确定可行的换乘方案。 相似文献
13.
Numerical results can be conveyed effectively to any one using an object-oriented framework. Therefore, it becomes essential to couple the object-oriented approach with numerical analysis. A simple object-oriented methodology for creating a graphical user interface (GUI) as a framework is presented. This work tries to fill a gap between scientific computer code written in a noninteractive way and interactive programming in materials processing. The GUI interface framework has been created in such a way that at any point of time one need not create a new GUI framework. The user only needs to create the process object and attach it to the framework. Two examples have been presented involving interactive finite volume-based gas carburizing and interactive finite difference-based Acheson process (used for the production of silicon carbide). 相似文献
14.
Jiyuan Liu Yingzhi Zeng Jiangyong Shi Yuexiang Yang Rui Wang Liangzhong He 《计算机、材料和连续体(英文)》2019,60(2):721-739
Recently, TLS protocol has been widely used to secure the application data carried in network traffic. It becomes more difficult for attackers to decipher messages through capturing the traffic generated from communications of hosts. On the other hand, malwares adopt TLS protocol when accessing to internet, which makes most malware traffic detection methods, such as DPI (Deep Packet Inspection), ineffective. Some literatures use statistical method with extracting the observable data fields exposed in TLS connections to train machine learning classifiers so as to infer whether a traffic flow is malware or not. However, most of them adopt the features based on the complete flow, such as flow duration, but seldom consider that the detection result should be given out as soon as possible. In this paper, we propose MalDetect, a structure of encrypted malware traffic detection. MalDetect only extracts features from approximately 8 packets (the number varies in different flows) at the beginning of traffic flows, which makes it capable of detecting malware traffic before the malware behaviors take practical impacts. In addition, observing that it is inefficient and time-consuming to re-train the offline classifier when new flow samples arrive, we deploy Online Random Forest in MalDetect. This enables the classifier to update its parameters in online mode and gets rid of the re-training process. MalDetect is coded in C++ language and open in Github. Furthermore, MalDetect is thoroughly evaluated from three aspects: effectiveness, timeliness and performance. 相似文献
15.
目的 构建产品造型意象设计与产品造型量化间的预测模型,将产品的设计元素与消费者的需求和感知相关联。方法 分析小轿车造型与感性意象之间的关系,基于用户对产品外观形态感受进行打分,采用感性工学方法进行量化;用双BP神经网络训练的思路,建立外观设计元素与感性意象间的对应关系,得到小轿车外观方案的感性意象预测模型。结论 获得产品造型设计方案的感性意象预测模型,能高效解决设计师的产品造型设计方案与消费者的目标达成趋同,通过高效的产品外观设计,为未来轿车及机电类产品的造型设计转向以消费者精神需求为导向提供了一种新的设计方法。 相似文献
16.
在考虑信息不完全的情况下,用灰色模糊数对公交线网优化问题进行了研究。在给出了公交线网优化的约束条件与优化目标的基础上,利用灰色模糊数建立了公交线网优化的决策模型。灰色模糊数是用三参数区间参与优化过程,在允许参数在一定范围内变化的情况下,计算后得到的结果是一个区间向量,其中向量值最大的为所求结果,适用于城市公交线网的优化问题。实例应用分析表明,优化后的公交线网效率提高,可达性良好,可满足城市公交可持续发展的要求。 相似文献