Resource Reservation is an important technology to gurantee Quality of Service of users ' requirements, the faults could lead reservation to *** paper put forward a method of resource reservation which constructin...
详细信息
This paper presents a fuzzy sliding mode controller for the Buck converter by a novel method, the novel method considers system and designs the controller on the three-dimensional space, and thinks over the dynamic in...
详细信息
ISBN:
(纸本)7900719229
This paper presents a fuzzy sliding mode controller for the Buck converter by a novel method, the novel method considers system and designs the controller on the three-dimensional space, and thinks over the dynamic information of all elements in the buck circuit adequately. At the same time, the method adopts the exponent tendency arithmetic to descend chatter, and employs fuzzy theory to improve performance of the controller, the system can arrive the stability state further more quickly. Lastly this controller is applied on the Buck converter by the simulation experiments, and the result is excellent.
Traditional Intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and they raise alerts independently, though there may be logical connections between them. With the development of network securi...
详细信息
Traditional Intrusion detection systems (IDSs) focus on low-level attacks or anomalies, and they raise alerts independently, though there may be logical connections between them. With the development of network security infrastructure and technology, it seems that attackers continuously adjust and upgrade their intrusion methods to escape from security inspection. Some kinds of intricate intrusion mode are widely used now. When meeting with these intricate intrusions such as Distributed denial of service (DDoS), network administrator may find alerts with unmanageable amount and true alerts mixed with false alerts. As a result, it is difficult for intrusion response systems and users to understand the alerts and take appropriate actions. This is why alert correlation technology has developed with such a striking speed in recent years. As is motivated by the urgent requirement to process alerts efficiently and correctly, in this paper we present a logical causality analysis method to apply correlation operation to the alerts generated in cooperative intrusion detection framework, in which we try to discover the implicit logical causality between alerts and make use of the causality to combine the alerts with logical causality and generate higher - level alerts. To verify the performance of the alert correlation operation in practice, we also give an implementation of the system prototype and illustrate the experiment results, from which we can find out that the alert correlation operation can achieve a good compromising point between the efficiency and correctness of the correlation process.
Broadcast Scheduling of large-scale wireless sensor networks (WSNs) are highly hards because they consist of numerous resource-constrained devices and communicate via wireless links. The broadcast scheduling problem (...
详细信息
According to the optical image, the layered model for image degradation is established on the basis of imaging mechanism. Some key factors (diffraction effect and down-sample etc.) resulting in the low resolution are ...
详细信息
ISBN:
(纸本)7900719229
According to the optical image, the layered model for image degradation is established on the basis of imaging mechanism. Some key factors (diffraction effect and down-sample etc.) resulting in the low resolution are pointed out. A method of super-resolution image restoration based on separation is proposed and the algorithm of ally-template is introduced. This separation method reduces the complexity of calculation. The experiment proves the effectiveness of the proposed algorithm.
To meet increasing QoS requirements of Web applications it is vital to design an efficient web server. This article describes a pipeline server architecture, which can get intra-request parallelism. Based on control t...
详细信息
ISBN:
(纸本)9789536114931
To meet increasing QoS requirements of Web applications it is vital to design an efficient web server. This article describes a pipeline server architecture, which can get intra-request parallelism. Based on control theory, we adopt predictor and feedback control methods to allocate threads of each stage dynamically. As a result, server can satisfy variant workloads adaptively. With the help of these ideas, we implement a novel kernel web server, KETA. Experiment results prove that KETA is an efficient kernel web server with high performance.
In order to predict the danger of coal and gas outburst in mine coal layer correctly, on the basis of the VLBP and LMBP algorithm in Matlab neural network toolbox, one kind of modified BP neural network was put forth ...
详细信息
In order to predict the danger of coal and gas outburst in mine coal layer correctly, on the basis of the VLBP and LMBP algorithm in Matlab neural network toolbox, one kind of modified BP neural network was put forth to speed up the network convergence speed in this paper. Firstly, according to the characteristics of coal and gas outburst, five key influencing factors such as excavation depth, pressure of gas, and geologic destroy degree were selected as the judging indexes of coal and gas outburst. Secondly, the prediction model for coal and gas outburst was built. Finally, it was verified by practical examples. Practical application demonstrates that, on the one hand, the modified BP prediction model based on the Matlab neural network toolbox can overcome the disadvantages of constringency and, on the other hand, it has fast convergence speed and good prediction accuracy. The analysis and computing results show that the computing speed by LMBP algorithm is faster than by VLBP algorithm but needs more memory. And the resuits show that the prediction results are identical with actual results and this model is a very efficient prediction method for mine coal and gas outburst, and has an important practical meaning for the mine production safety. So we conclude that it can be used to predict coal and gas outburst precisely in actual engineering.
Fragile watermarking techniques for digital content have been studied in the past few *** watermarks are used to determine if a piece of watermarked digital content has been tampered,and distinguish tampered areas fro...
详细信息
ISBN:
(纸本)9780972147903
Fragile watermarking techniques for digital content have been studied in the past few *** watermarks are used to determine if a piece of watermarked digital content has been tampered,and distinguish tampered areas from non-tampered areas without referring to the original digital *** this paper,a novel fragile watermarking scheme for image authentication is *** the initial value of the chaotic mapping,the fragile watermark is obtained by iterating several times of the chaotic *** watermark is then inserted into the two least significant bit(LSB) planes of the host *** proposed scheme can localize the tampers on the watermarked image by using to the high sensitivity on initial value of the chaotic ***,no host image is needed in watermark *** simulation results show the effectiveness,sensitivity and localization of tamper-proofing of this algorithm.
We contribute two new algorithms in this paper called PImGA and PIrIEA respectively in which we construct populations online in each iteration. Every iteration process in these two algorithms does not like the normal ...
详细信息
The new system studied in this paper is made of late-model single chip microcomputer and personal computer. It not only can monitor networks' frequency in real-time but also can calculate frequency variable then d...
详细信息
暂无评论