In [4,7,9,12], classes of nonlinear systems are considered for which observers can be designed. Although observability of nonlinear systems is known to be dependent on the input, the proposed observers have the property that the estimation error decays to zero irrespective of the input. In the first part of this paper, it is shown that this phenomenon follows from a common property of these systems: for all of them, the “unobservable states” with respect to some input, are in some sense “stable” (in the linear case, these systems are called detectable), and for this reason, a reduced order observer can be designed. In the second part is given a more general class of nonlinear systems for which such an observer can be designed. 相似文献
Vicious codes, especially viruses, as a kind of impressive malware have caused many disasters and continue to exploit more vulnerabilities. These codes are injected inside benign programs in order to abuse their hosts and ease their propagation. The offsets of injected virus codes are unknown and their targets usually are latent until they are executed and activated, what in turn makes viruses very hard to detect. In this paper enriched control flow graph miner, ECFGM in short, is presented to detect infected files corrupted by unknown viruses. ECFGM uses enriched control flow graph model to represent the benign and vicious codes. This model has more information than traditional control flow graph (CFG) by utilizing statistical information of dependent assembly instructions and API calls. To the best of our knowledge, the presented approach in this paper, for the first time, can recognize the offset of infected code of unknown viruses in the victim files. The main contributions of this paper are two folds: first, the presented model is able to detect unknown vicious code using ECFG model with reasonable complexity and desirable accuracy. Second, our approach is resistant against metamorphic viruses which utilize dead code insertion, variable renaming and instruction reordering methods. 相似文献
Peer-to-Peer networks attracted a significant amount of interest because of their capacity for resource sharing and content
distribution. Content distribution applications allow personal computers to function in a coordinated manner as a distributed
storage medium by contributing, searching, and obtaining digital content. Searching in unstructured P2P networks is an important
problem, which has received considerable research attention. Acceptable searching techniques must provide large coverage rate,
low traffic load, and optimum latency. This paper reviews flooding-based search techniques in unstructured P2P networks. It
then analytically compares their coverage rate, and traffic overloads. Our simulation experiments have validated analytical
results. 相似文献
Water Resources Management - Change in the spatiotemporal pattern of precipitation is one the most important effects of climate change. This may result in considerable changes in urban flooding and... 相似文献
Engineering with Computers - In the paper, we derive a geometric meshless method for coupled nonlinear sine-Gordon (CNSG) equations. Approximate solutions of the CNSG equations are supposed to be... 相似文献
Piles are widely applied to substructures of various infrastructural buildings. Soil has a complex nature; thus, a variety of empirical models have been proposed for the prediction of the bearing capacity of piles. The aim of this study is to propose a novel artificial intelligent approach to predict vertical load capacity of driven piles in cohesionless soils using support vector regression (SVR) optimized by genetic algorithm (GA). To the best of our knowledge, no research has been developed the GA-SVR model to predict vertical load capacity of driven piles in different timescales as of yet, and the novelty of this study is to develop a new hybrid intelligent approach in this field. To investigate the efficacy of GA-SVR model, two other models, i.e., SVR and linear regression models, are also used for a comparative study. According to the obtained results, GA-SVR model clearly outperformed the SVR and linear regression models by achieving less root mean square error (RMSE) and higher coefficient of determination (R2). In other words, GA-SVR with RMSE of 0.017 and R2 of 0.980 has higher performance than SVR with RMSE of 0.035 and R2 of 0.912, and linear regression model with RMSE of 0.079 and R2 of 0.625.
Engineering with Computers - In this paper, a Lie-group integrator based on $$GL_4(\mathbb {R})$$ and the reproducing kernel functions has been constructed to investigate the flow characteristics... 相似文献
Neural Computing and Applications - Lung cancer is a deadly disease if not diagnosed in its early stages. However, early detection of lung cancer is a challenging task due to the shape and size of... 相似文献
Nowadays malware is one of the serious problems in the modern societies. Although the signature based malicious code detection is the standard technique in all commercial antivirus softwares, it can only achieve detection once the virus has already caused damage and it is registered. Therefore, it fails to detect new malwares (unknown malwares). Since most of malwares have similar behavior, a behavior based method can detect unknown malwares. The behavior of a program can be represented by a set of called API's (application programming interface). Therefore, a classifier can be employed to construct a learning model with a set of programs' API calls. Finally, an intelligent malware detection system is developed to detect unknown malwares automatically. On the other hand, we have an appealing representation model to visualize the executable files structure which is control flow graph (CFG). This model represents another semantic aspect of programs. This paper presents a robust semantic based method to detect unknown malwares based on combination of a visualize model (CFG) and called API's. The main contribution of this paper is extracting CFG from programs and combining it with extracted API calls to have more information about executable files. This new representation model is called API-CFG. In addition, to have fast learning and classification process, the control flow graphs are converted to a set of feature vectors by a nice trick. Our approach is capable of classifying unseen benign and malicious code with high accuracy. The results show a statistically significant improvement over n-grams based detection method. 相似文献