Network attacks have become the fundamental threat to today's largely interconnected computer system. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilitie...
详细信息
Network attacks have become the fundamental threat to today's largely interconnected computer system. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. While a number of information visualization software frameworks exist, creating new visualizations, especially those that involve novel visualization metaphors, interaction techniques, data analysis strategies, and specialized rendering algorithms, is still often a difficult process. To facilitate the creation of novel visualizations this paper presents a new framework that is designed with using data visualization technique for analysis and visualizes snort result data for user. The framework suggests PHP and CSS as data visualization technique and snort as intrusion detection system (IDS).
We are witnessing today an exponential growth of internet technology at an accelerating pace. There are increasingly more and more open and free teaching and learning websites of competitively high quality. When compu...
详细信息
In the development stage of the embedded system, the market demand and system development trend will be influence by the Time to Market. Reliable and fast system deployment is not easy to implement. Reduced price and ...
详细信息
In the development stage of the embedded system, the market demand and system development trend will be influence by the Time to Market. Reliable and fast system deployment is not easy to implement. Reduced price and system development time can increase the product value. Thus the component re-use library can help reduce the development time, this kind of design can reduce the emergence of rewriting and raise the efficiency by a wide margin. We design and study the reusable component in this research, proposing a prototype database based on XML. This technique has many advantages like reduces the time required for storage, improves the overall efficiency of the system, shortens the development time, increases reliability and reduces the risks handling etc.
We propose a novel inference framework for finding maximal cliques in a weighted graph that satisfy hard constraints. The constraints specify the graph nodes that must belong to the solution as well as mutual exclusio...
详细信息
ISBN:
(纸本)9781618395993
We propose a novel inference framework for finding maximal cliques in a weighted graph that satisfy hard constraints. The constraints specify the graph nodes that must belong to the solution as well as mutual exclusions of graph nodes, i.e., sets of nodes that cannot belong to the same solution. The proposed inference is based on a novel particle filter algorithm with state permeations. We apply the inference framework to a challenging problem of learning part-based, deformable object models. Two core problems in the learning framework, matching of image patches and finding salient parts, are formulated as two instances of the problem of finding maximal cliques with hard constraints. Our learning framework yields discriminative part based object models that achieve very good detection rate, and outperform other methods on object classes with large deformation.
Many human face-based applications depend on accurate extraction of human faces and their components from complex color digital images. Most existing methods are only based on human skin regions and their adjacency re...
详细信息
Many human face-based applications depend on accurate extraction of human faces and their components from complex color digital images. Most existing methods are only based on human skin regions and their adjacency relations, but do not utilize their subdivision and grouping at multiple levels. This paper presents a hierarchical model to address this. The model contains pixels, runs, regions, and their respective relations for a digital image. Human skin regions are identified by combining multiple color spaces. Adjacent human skin regions are grouped as a patch. Human face candidates are extracted from each refined human skin patch by un-linking adjacent regions of some regions based on a human facial shape model. Non-human skin patches in a human face candidate are identified as human facial internal component candidates according to the attributes and configurations of human facial components. Each human face candidate is further classified as a human face or not based on its component candidates. An extracted human face provides not only an accurate human facial region but also its components. Finally, this paper demonstrates experimental results of extracting various human faces and their components from three databases, showing that the proposed approach is more accurate and robust than other approaches.
In this paper, we proposed the formulation of one timing-driven routing problem with consideration of interference by an efficient geometry-based approach. The objective of this work aims to simultaneously minimize th...
In this paper, we proposed the formulation of one timing-driven routing problem with consideration of interference by an efficient geometry-based approach. The objective of this work aims to simultaneously minimize the maximum length from source to target, and the potential interference nets for the multilayer routing system. Most approaches in the literatures neglected to the interference and most papers commonly improved the routing qualities by using post-processing. A space reservation technique is involved into the timing-driven router to further reduce the interference among on-chip wires and wires of boards. Second, a timing-driven partitioning which divides the entire chip into a set of sub-regions by source position is followed by the center of gravity of each sub-region to reduce the data skew. For each sub-region, the obstacle-avoiding routing algorithm is performed to connect all terminals. Experimental results show that the number of potential crosstalk nets is reduced. Moreover, the maximum length from source to target and data skew in the routing tree are improved by 35.0% and 36.3 %, respectively.
Background: Software engineering practices have evolved considerably over the last four decades, changing the way software systems are developed and delivered. Such evolvement may result in improvements in software pr...
详细信息
In this paper we proposed a cooperative MIMO cognitive network scheme. This scheme is composed of multiple source node users and multiple relay node users. Based on distributed interference alignment technology, the p...
详细信息
In this paper we proposed a cooperative MIMO cognitive network scheme. This scheme is composed of multiple source node users and multiple relay node users. Based on distributed interference alignment technology, the proposed scheme has broken the existing research on cooperative MIMO cognitive network of single source node user. Both encoding and decoding processes of the proposed scheme are of linear complexity. We derived the symbol error rate of the proposed scheme . In the scenarios of Rayleigh flat fading channel and MPSK modulation, we simulated the receiving symbol error rate of relay node user. The simulation result of the proposed scheme showed that the symbol error rate become zero when SNR is higher than 10dB.
In multiple datacenters-based cloud environments, virtual machines migrates across nodes located in the same or different datacenter to provide users with efficient resource provisioning services. Especially, migratio...
详细信息
DC-DC booster converter in PWM switch mode is used for high power white LED. Electromagnetic interference, load disturbance, etc existing in circuits make their analysis and control difficult. Because of this, on the ...
详细信息
ISBN:
(纸本)9781424480364
DC-DC booster converter in PWM switch mode is used for high power white LED. Electromagnetic interference, load disturbance, etc existing in circuits make their analysis and control difficult. Because of this, on the basis of tradition PI controller an adaptive fuzzy logic controller is designed to adjust real time PI parameter through introducing two correction factors. The controller is then obtained through innovative search. The simulation results show that the Controller does not only make driving circuit have stronger response ability, but also effectively depress the overshoot.
暂无评论