Based on Lyapunov-krasovskii functional method, delay ideological division. Delay first by constructing a new Lyapunov function, and then use the system range segmentation method is divided into N parts range, and int...
详细信息
ISBN:
(纸本)9781467386616
Based on Lyapunov-krasovskii functional method, delay ideological division. Delay first by constructing a new Lyapunov function, and then use the system range segmentation method is divided into N parts range, and introducing free weighting matrices, a class of delay Uncertain Nonlinear Delay Systems.
Texture synthesis is important in producing computer-generated animation. In order to tackle the issue of poor efficiency of traditional serial point matching texture synthesis algorithm, we propose a parallel approac...
详细信息
This paper discusses the subdivision of NURBS curves and quadrics based on matrix representation of NURBS curves. Binary and ternary subdivision rules of quadratic NURBS curves are obtained, error and computation amou...
详细信息
This paper discusses the subdivision of NURBS curves and quadrics based on matrix representation of NURBS curves. Binary and ternary subdivision rules of quadratic NURBS curves are obtained, error and computation amount of subdivision curves are analyzed in detail. Moreover, by applying the subdivision method to the generatrix and ellipse, surfaces of revolution and quadratics are achieved with discrete subdivision models.
Inception stage of devastating attacks like DDoS attacks and botnet hosted attacks includes compromising numerous computers or networks over the Internet. The Port scanning tools are often used by the attackers not on...
详细信息
ISBN:
(纸本)9781424439539
Inception stage of devastating attacks like DDoS attacks and botnet hosted attacks includes compromising numerous computers or networks over the Internet. The Port scanning tools are often used by the attackers not only to identify the vulnerable servers but also to identify the vulnerable network or vulnerable computers over the Internet. If the attackers can identify a single vulnerability then, with the use of malicious codes they can compromise that system and makes it a zombie. By compromising a group of computers the attackers can constitute the malicious botnet or zombie army. These are then used to perform a range of devastating attacks. One possible solution to curb the zombie army or malicious botnet is by detecting and blocking or dropping the reconnaissance scan, otherwise port scan. Numerous port scanning techniques are available today. To detect them all, one single algorithm is not sufficient so we derived a set of heuristics to detect the port scan traffic, even the crafty ones.
The problem of hybrid multi-attribute decision making with real number, interval number and fuzzy number, is studied. First of all, the hybrid vector and the projection of hybrid vector are defined, then a new decisio...
详细信息
The problem of hybrid multi-attribute decision making with real number, interval number and fuzzy number, is studied. First of all, the hybrid vector and the projection of hybrid vector are defined, then a new decision making method based on projection of hybrid vector is presented. Finally, an application decision making example is given to demonstrate the feasibility and rationality of this new method.
Grid protocols and technologies arc being adopted in a wide variety of academic, government, and industrial environments, and there is a growing body of research-oriented literature in grid computing. However, there i...
详细信息
ISBN:
(纸本)9780780390744
Grid protocols and technologies arc being adopted in a wide variety of academic, government, and industrial environments, and there is a growing body of research-oriented literature in grid computing. However, there is a need for educational material that is suitable for classroom use. This paper describes our topics, exercises and experiences of teaching grid computing courses in the fall semester, 2004. to undergraduate computerscience students at Lewis & Clark coll.ge and to a mix of undergraduate and graduate computerscience students at the University of Arkansas. We identify a set of six knowledge areas that can help to structure course material in grid computing. In conclusion, we recommend that a grid computing course cover, or have as prerequisites, material on (1) remote method invocation and (2) security and certificates. Finally, student comments indicate the need for a series of grid programming exercises of increasing complexity.
With the rapid increase of the PDF files in Internet, how to manage and search PDF files efficiently and quickly has become an urgent problem to be solved. The most important step of solving this problem is to extract...
详细信息
With the rapid increase of the PDF files in Internet, how to manage and search PDF files efficiently and quickly has become an urgent problem to be solved. The most important step of solving this problem is to extract information from the PDF files. This paper presents a new method for extracting information from PDF files. It first parses PDF files to get text and format information and injects tags into text information to transform it into semi-structured text, and finally, one pattern match algorithm based on tree model is applied to obtain the solution. A further experiment proved this method was effective.
Consider the second order self-adjoint neutral difference equation of form Δ(an|Δ(xn - pnx τ;n)|αsgnΔ(xn - p nxτn)) + f(n, xgn) = 0. In this paper, we will give the classification of nonoscillatory solutions of ...
详细信息
Consider the second order self-adjoint neutral difference equation of form Δ(an|Δ(xn - pnx τ;n)|αsgnΔ(xn - p nxτn)) + f(n, xgn) = 0. In this paper, we will give the classification of nonoscillatory solutions of the above equation;and by the fixed point theorem, we present some existence results for some kinds of nonoscillatory solutions of the equation.
Fuzzy variable is a function from a possibility space to the real line. By analogy of the independence of random variables, there are similar terms for fuzzy variables such as unrelated fuzzy variables, noninteractive...
详细信息
ISBN:
(纸本)0780384032
Fuzzy variable is a function from a possibility space to the real line. By analogy of the independence of random variables, there are similar terms for fuzzy variables such as unrelated fuzzy variables, noninteractive fuzzy variables, and independent fuzzy variables. The purpose of this work is to discuss the relations among these terms. Toward this end, the work first defines the marginal possibility distributions of a fuzzy vector, and then gives a simple approach to define the independent fuzzy variables. After that, the equivalence of unrelated, noninteractive, and independent fuzzy variables are proved in the framework of possibility theory.
This paper first presents multicriteria fuzzy random expected value models via expected value operators, and variance of fuzzy random variables. Then, three types of minimization (maximization) fuzzy random expected v...
详细信息
ISBN:
(纸本)0780384032
This paper first presents multicriteria fuzzy random expected value models via expected value operators, and variance of fuzzy random variables. Then, three types of minimization (maximization) fuzzy random expected value models are built based on a decision-maker's preference or intention. After that, the interconnections among the three types of optimization problems are discussed. At the end of the paper, a numerical example is provided to illustrate the modeling ideas of the proposed optimization problems.
暂无评论