Incentives and penalties for healthcare providers as laid out in the American Recovery and Reinvestment Act of 2009 have caused tremendous growth in the development and installation of electronic health record (EHR) s...
详细信息
Interlocking tables,as the function specification of the computer Based Interlocking System (CBI),play an important role in ensuring safe train movements at a railway *** development and verification of interlocking t...
详细信息
Interlocking tables,as the function specification of the computer Based Interlocking System (CBI),play an important role in ensuring safe train movements at a railway *** development and verification of interlocking tables is entirely manual process currently,which is inefficient and error-prone due to the complexity of the CBI and the human *** order to tackle these problems,we introduce a toolset based on Domain Specific Language for computer Based Interlocking Systems (DSL-CBI) to automatically generate and verify the interlocking *** this paper,we address how to use the algorithm to automatically generate the interlocking table by inputting the XML file of the railway station designed by DSL-CBI,and how to use model checking to verify whether there are any conflicting settings in *** also discuss the advantages of the toolset and the significant contribution in developing CBI based on the proposed toolset.
To obtain overlay network traffic and delay information between two hosts is important for network management, monitoring, design, planning and assessment. Traffic matrix and delay matrix represent the traffic and del...
详细信息
ISBN:
(纸本)9783037851555
To obtain overlay network traffic and delay information between two hosts is important for network management, monitoring, design, planning and assessment. Traffic matrix and delay matrix represent the traffic and delay information between two hosts, so introduce the concept of the overlay network traffic matrix and delay matrix. Compressive sensing theory restores traffic matrix and delay matrix but is not suitable for overlay network. This paper improves compressive sensing algorithm to make it more applicable to overlay network traffic matrix and delay matrix restoration. After calculating the traffic matrix and delay matrix this paper quantifies overlay network congestion, which reflect the current network security situation. The experimental results show the restoration effect of traffic matrix and delay matrix is well and the congestion degree reflects the actual network state.
To solve the problem of blind source separation,a robust algorithm based on generalized variance is presented by exploiting the different temporal structure of uncorrelated source *** contrast to higher order cumulant...
详细信息
To solve the problem of blind source separation,a robust algorithm based on generalized variance is presented by exploiting the different temporal structure of uncorrelated source *** contrast to higher order cumulant techniques,this algorithm is based on second order statistical characteristic of observation signals,can blindly separate super-Gaussian and sub-Gaussian signals successfully at the same time without adjusting the contrast function,and the computation burden of it is relatively *** results confirm that the algorithm is efficient and feasible.
With the rapid development of Internet, many network applications (e.g., P2P) use dynamic ports and encryption technology, which makes the traditional port and payload-based classification methods ineffective. Hence, ...
详细信息
With the rapid development of Internet, many network applications (e.g., P2P) use dynamic ports and encryption technology, which makes the traditional port and payload-based classification methods ineffective. Hence, it is important and necessary to find the more effective ones. Currently the machine learning (ML) techniques provide a promising alternative one for IP traffic classification. In this work, we use the ML-based classification method to identify the classes of the unknown flows using the payload-independent statistical features such as packet-length and arrival-interval. In order to improve the efficiency of the classification methods, the feature reduction techniques are further adopted to refine the selected features for attaining a best group of features. Finally we compare and evaluate the ML classification algorithms based on the BRASIL data source in terms of the three metrics such as overall accuracy, average precision and average recall. Our experiments show that the decision-tree algorithm is the best ML one for IP traffic classification and is able to construct the real-time classification system.
Starting from semantic composition of services, ac E service flow as architecture researching point, this paper has designed and argued dynamic flow evolution mechanism. First of all, the architecture service topology...
详细信息
Starting from semantic composition of services, ac E service flow as architecture researching point, this paper has designed and argued dynamic flow evolution mechanism. First of all, the architecture service topology concept is raised, to achieve dynamic composition of participation granularities and adaptive evolution for flow, the corresponding model expression and flow composition rule' collection is given;Then, equivalent service logic and flow evolution relation is organized, π-calculus mechanism is extended, and is to complete opening flexible architecture requirement and autonomous migration process driven by membrane activity. Finally, the decision-making and planning mechanism about ac E service flow is finished analyzed, and furthermore, the validity and feasibility of this researching project is verified.
The whole error permutation problem is one of the most important questions in combinatorial mathematics. It was transformed into the SAT problem in previous surface-based computing models. Though surface-based model o...
详细信息
The whole error permutation problem is one of the most important questions in combinatorial mathematics. It was transformed into the SAT problem in previous surface-based computing models. Though surface-based model overcomes many shortcomings of the test tube fashion, the transformation has much limitation and it is hard to generalize an ecumenic conclusion from the models. The paper gives an improved surfacebased DNA computing model, and with an artful encoding it not only inherits many advantages of surface-based model, but casts off many disadvantages of the previous model. At one time our design uses fluorescence hardening technology, it makes key ascertainment simple, effective and the algorithm is an effective method. At last the paper proposes the extending model to the partial error permutation problem through clever coding.
In the System of Target Tracking Recognition, infrared sensors and visible light sensors are two kinds of the most commonly used sensors;fusion effectively for these two images can greatly enhance the accuracy and rel...
详细信息
In the System of Target Tracking Recognition, infrared sensors and visible light sensors are two kinds of the most commonly used sensors;fusion effectively for these two images can greatly enhance the accuracy and reliability of identification. Improving the accuracy of registration in infrared light and visible light images by modifying the SIFT algorithm, allowing infrared images and visible images more quickly and accurately register. The method can produce good results for registration by infrared image histogram equa-lization, reasonable to reduce the level of Gaussian blur in the pyramid establishment process of sift algorithm, appropriate adjustments to thresholds and limits the scope of direction of sub-gradient descriptor. The features are invariant to rotation, image scale and change in illumination.
The Traditional Chinese Medicine(TCM) Prescription include king drug,ministerial drug,assistant drug,sacrifice *** information may be reflected in the significance of the *** the paper put forward data mining the sign...
详细信息
The Traditional Chinese Medicine(TCM) Prescription include king drug,ministerial drug,assistant drug,sacrifice *** information may be reflected in the significance of the *** the paper put forward data mining the significance of the TCM Prescription for Pharmacodynamic effect indexs based on artificial neural networks *** aim to data mining the significance of the Gegen Qinlian Decoction(Radix Puerariae,Radix Scutellariae,Rhizoma Coptidis,Glycyrrhiza uralensis) for the pharmacodynamic effect indexs(Hb A1 c,CHOL,TG,XHDL,LD,INS),the method is to use artificial neural networks,the result indicate the method can mining the different significance according different Pharmacodynamic effect indexs.
To protect critical resources in networked environments, it is important to quantify the likelihood of potential multistep attacks in attack graphs. Aimed at the problems that probabilistic incorrect computing caused ...
详细信息
To protect critical resources in networked environments, it is important to quantify the likelihood of potential multistep attacks in attack graphs. Aimed at the problems that probabilistic incorrect computing caused by shared dependencies in nodes, a methodology for security risk analysis that is based on the model of attack graphs and the Common Vulnerability Scoring System(CVSS) was presented, and the problem of probabilistic incorrect computing was solved successfully by proposing the probabilistic computing approach of accurate calculation and approximate calculation, While ensuring the accuracy of the probability of attack graph-based nodes, quickly Calculated the probability of each node, which can be adapted to a large-scale network. Reasonableness and effectiveness of proposed method was verified in the simulation. Compared with the related research, our approach can be adapted to a more complex attack graph, and had good scalability.
暂无评论