The network information system is a military information network system with evolution characteristics. Evolution is a process of replacement between disorder and order, chaos and equilibrium. Given that the concept o...
详细信息
Crowdsourced testing has become an effective alternative to traditional testing. However, crowdsourced testing is inherently difficult to manage. In this paper, objective information such as defect count is considered...
Crowdsourced testing has become an effective alternative to traditional testing. However, crowdsourced testing is inherently difficult to manage. In this paper, objective information such as defect count is considered to evaluate the task process. We researched how the capture-recapture model estimates the total number of defects in a crowdsourced testing scenario. By comparing the difference between crowdsourced testing and traditional testing, incremental sampling methodology and the best estimator for crowdsourced testing were proposed to estimate the number of defects, so as to improve the ability to evaluate the completion degree of crowdsourced testing task.
Cross-modal entity resolution aims to find semantically similar items from objects of different modalities(e.g. image and text). The core way to solve the problem is to construct a shared space where multi-modal examp...
详细信息
Fractal tubular structures(FTSs)can greatly increase the anti-crushing and energy absorption capacity of the *** reveal this mechanism,fractal hexagonal tubes(FHTs)with self-similar fractal structure were designed and...
详细信息
Fractal tubular structures(FTSs)can greatly increase the anti-crushing and energy absorption capacity of the *** reveal this mechanism,fractal hexagonal tubes(FHTs)with self-similar fractal structure were designed and *** experiments were carried out to verify the crushing modes of structures with different scale *** with the single-cell structure,FHTs have much greater mean crushing force(MCF).According to the experiments and the numerical simulations,when the side length of the second-order hexagon is 0.3 times of the length of the first-order primary hexagon,the FTS has the greatest peak force(PF)and MCF as well as the most excellent energy-absorbing *** folding styles were revealed by the experiments and the numerical simulation when changing the scale factor,including the overall folding mode,the local foaling mode and the hybrid folding *** plastic models were built,which consistently predicted the MCF.
Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network *** Linux Container provides a method to simulate the behavior of large-scale users u...
详细信息
Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network *** Linux Container provides a method to simulate the behavior of large-scale users under the constraints of limited physical *** a container-based virtualization environment,container networking is an important *** evaluate the impact of different networking methods between the containers on the simulation performance,the typical container networking methods such as none,bridge,macvlan were analyzed,and the performance of different networking methods was evaluated according to the throughput and latency *** experiments show that under the same physical resource constraints,the macvlan networking method has the best network performance,while the bridge method has the worst *** result provides a reference for selecting the appropriate networking method in the user behavior simulation process.
This paper investigates secure transmission in a wireless powered cooperative communication network (WPCCN), where multiple intermediate energy harvesting (EH) nodes are deployed to assist the secure transmission betw...
详细信息
Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network har...
详细信息
Attack surfaces, as one of the security models, can help people to analyse the security of systems in cyberspace, such as risk assessment by utilizing various security metrics or providing a cost-effective network hardening solution. Numerous attack surface models have been proposed in the past decade,but they are not appropriate for describing complex systems with heterogeneous components. To address this limitation, we propose to use a two-layer Hierarchical Attack Surface Network(HASN) that models the data interactions and resource distribution of the system in a component-oriented view. First, we formally define the HASN by extending the entry point and exit point framework. Second, in order to assess data input risk and output risk on the HASN, we propose two behaviour models and two simulation-based risk metrics. Last, we conduct experiments for three network systems. Our experimental results show that the proposed approach is applicable and effective.
This paper presents an effective method to address the inverse problem of Mel-frequency cepstral analysis, and describes how to reconstruct the speech waveforms from Mel-frequency cepstral coefficients (MFCCs) directl...
详细信息
The wargame deduction is the application of wargame. It refers to the use of boards and wargame pieces representing the battlefield and its military power, or based on the virtual battlefield environment and force of ...
详细信息
暂无评论