This paper is concerned with the iterative learning control(ILC) problem for discrete-time systems with iterationvarying *** the so-called super-vector approach to ILC,the discrete domain bounded real lemma is employe...
详细信息
This paper is concerned with the iterative learning control(ILC) problem for discrete-time systems with iterationvarying *** the so-called super-vector approach to ILC,the discrete domain bounded real lemma is employed to develop a sufficient condition ensuring both the stability and the desired H∞ performance of the ILC *** is shown that this sufficient condition can be presented in terms of linear matrix inequalities(LMIs),which can also determine the learning gain matrix.A numerical simulation example is included to validate the theoretical results.
This paper is devoted to the consensus control for a network of autonomous agents with high-dimension linear coupling dynamics and subject to external disturbances. By transforming the consensus control problem into a...
详细信息
This paper is devoted to the consensus control for a network of autonomous agents with high-dimension linear coupling dynamics and subject to external disturbances. By transforming the consensus control problem into an H infin control problem, we propose a distributed state feedback protocol, and obtain conditions in terms of linear matrix inequalities (LMIs) to ensure the consensus with a prescribed H infin performance level for networks with zero and nonzero communication delays, respectively. Furthermore, the undetermined feedback matrix of the proposed protocol is also solved. A numerical example is included to validate the theoretical results.
This paper proposes an adaptive multi-class support vector machine for simultaneous microarray classification and gene selection. By evaluating the gene ranking significance, the adaptive multi-class support vector ma...
详细信息
This paper proposes an adaptive multi-class support vector machine for simultaneous microarray classification and gene selection. By evaluating the gene ranking significance, the adaptive multi-class support vector machine is shown to encourage an adaptive grouping effect in the process of building classifiers, thus leading a sparse multi-classifiers with enhanced interpretability. Based on a reasonable correlation between the two regularization parameters, an efficient solution path algorithm is developed for solving the proposed support vector machine. Experiments performed on the leukaemia data set are provided to verify the obtained results.
A dynamic page view based drive-by download detection method was developed to address the challenge hidden drive-by downloads which abuse inline linking dynamics creation and obfuscation. The method uses a script engi...
详细信息
A dynamic page view based drive-by download detection method was developed to address the challenge hidden drive-by downloads which abuse inline linking dynamics creation and obfuscation. The method uses a script engine to execute page scripts with tools to reveal the script's actions and inline linking identification mechanisms and rebuilds the dynamic page view of the visited page by recursively analyzing the inline pages. The system then detects drive-by downloads based on the rebuilt dynamic page view. Tests on a prototype based on the open-sourced PHoneyC framework to detect 89 drive-by download samples showed that single page views in this paper had a detection rate of 29.2%, static page views had a detection rate of 43.8%, and the dynamic page views had a detection rate of 70.8%. Thus, the dynamic detection method has a much higher detection rate.
Based on the weakness of ZG off-line TTP(trusted third party) non-repudiation protocol because of using protocol deadline, the improvement of the ZG off-line TTP non-repudiation protocol was given, which eliminated th...
详细信息
Based on the weakness of ZG off-line TTP(trusted third party) non-repudiation protocol because of using protocol deadline, the improvement of the ZG off-line TTP non-repudiation protocol was given, which eliminated the delaying resolve request attack and ensured non-repudiation and fairness. Therefore, two kinds of improvement of ZG off-line TTP non-repudiation protocol were given, which had different point of focus. Among them, the first one could eliminate delaying message attack in ZG protocol;the second one also had the property of preventing the abuse of sub-protocol besides eliminating delaying message attack. The first one is suitable for electronic payment and certified email, but the second one is suitable for digital contract signature.
This paper presents a new support vector machine for simultaneous gene selection and microarray classification. By introducing the adaptive elastic net penalty which is a convex combination of weighted 1-norm penalty ...
详细信息
ISBN:
(纸本)9781424445233
This paper presents a new support vector machine for simultaneous gene selection and microarray classification. By introducing the adaptive elastic net penalty which is a convex combination of weighted 1-norm penalty and weighted 2-norm penalty, the proposed support vector machine can encourage an adaptive grouping effect and reduce the shrinkage bias for the large coefficients. According to a reasonable correlation between the two regularization parameters, the optimal coefficient paths are shown to be piecewise linear and the corresponding solving algorithm is developed. Experiments are performed on leukaemia data that verify the research results.
security situational awareness has become a hot topic in the area of network security research in recent years, which attracts the interest of more and more domestic and foreign researchers. The existing security situ...
详细信息
security situational awareness has become a hot topic in the area of network security research in recent years, which attracts the interest of more and more domestic and foreign researchers. The existing security situational awareness methods are analyzed and compared in detail. Considering the characteristics of multi-source information in network security research, a new network security situational awareness model based on information fusion is proposed. This model fuses multi-source information from a mass of logs by introducing the modified D-S evidence theory, gets the values of nodes security situational awareness by situational factors fusion using attacks threat and vulnerability information which network nodes have and successful attacks depend on, computes the value of network security situational awareness by nodes situation fusion using service information of the network nodes, and draws the security-situation-graph of network. Then, it analyzes the time series of the computing results by ARMA model to forecast the future threat in network security. Finally an example of actual network datasets is given to validate the network security situational awareness model and algorithm. The results show that this model and algorithm is more effective and accurate than the existing security situational awareness methods.
This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm. First, nodes theoretic s...
详细信息
This paper analyzes and compares the existing situational awareness methods and proposes a network security situational awareness model based on log audit and performance correction algorithm. First, nodes theoretic security threat is got by log audit and the value of nodes security situation is computed by performance correction algorithm. Then the value of network security situation is computed using service information, the future threat is predicted by several prediction models, and the security Situational Graph (SSG) is drawn. Finally an example is given to validate the network security situational awareness model and algorithm by simulation software. The example proves that the model is more effective and accurate to reflect the network security situational and its trends than traditional methods.
As the development of security operating system, the formal analysis and verification of the security models has been one of the hottest topics now. A new method to verify the correctness of security models is propose...
详细信息
As the development of security operating system, the formal analysis and verification of the security models has been one of the hottest topics now. A new method to verify the correctness of security models is proposed in this paper based on the study of predecessors' work, which made use of the Unified Modeling Language (UML) and model checking. This approach first used the UML to specify the security model in the form of finite state machine diagrams and the class diagrams, and then translated these UML diagrams to the input language of model checkers. And it used the model checker to verify the model's correctness or the violation of security properties for the last step. The authors demonstrate the violation of confidentiality of the DBLP and SLCF model by the new approach.
In the field of ray-tracing based photo-realistic rendering, kd-tree is used as an important acceleration structure. This paper focuses on the effective construction of kd-tree, and proposes a novel and fast construct...
详细信息
In the field of ray-tracing based photo-realistic rendering, kd-tree is used as an important acceleration structure. This paper focuses on the effective construction of kd-tree, and proposes a novel and fast construction method which is based on the binning algorithm. The method is composed of two main steps. Firstly, by analyzing the SAH cost function, the method determines the most-likely sub-span which holds the splitting plane. Secondly, sub-sampling is used on the resulted span to get much better approximation to the optimal splitting plane. Moreover, the paper discusses the exiting schemes on binning termination condition, points out their problems, and proposes a more reasonable termination condition. The experimental results show that the novel approach is effective. Compared with the previous works, it decreases the construction overhead, improves the quality of generated kd-tree, and the construction procedure is more robust as well.
暂无评论