With the rapid development of Internet and the expanding application fields of network applications, it is not enough to maintain the network security only depend on those professional network technical administrators...
详细信息
With the rapid development of Internet and the expanding application fields of network applications, it is not enough to maintain the network security only depend on those professional network technical administrators. In this paper a novel visualization tool based on treemap, which is called NetVis, is introduced to bind the network security technique and general network management together in an integrated visualization. NetVis is designed in 2D view. The experiments show that NetVis can not only detect the abnormal activities in the network, but also make the network management more intuitive and efficient
This paper presents a method based on RBF neural networks to predict the specific region cloud cover, which has the feature of time serial and nonlinear. Using this method, we can train the RBF neural networks and fin...
详细信息
Java Code Hierarchical Visualization Tool (JCHVT) is a software visualization system oriented to Java source code, which has been designed on the concept of service and with reference to Class diagram and Polymetric v...
详细信息
Java Code Hierarchical Visualization Tool (JCHVT) is a software visualization system oriented to Java source code, which has been designed on the concept of service and with reference to Class diagram and Polymetric v...
详细信息
ISBN:
(纸本)9781424472352
Java Code Hierarchical Visualization Tool (JCHVT) is a software visualization system oriented to Java source code, which has been designed on the concept of service and with reference to Class diagram and Polymetric view. JCHVT is able to automatically create a hierarchical view of the software system, which can reflect the relationships among classes, structure of the system and even the roles of classes played in the system. Meanwhile, JCHVT provides various methods of human-computer interactions which can help user to understand the graph and identify the useful information in the view.
For the problem of the imprecise estimation of the reference of GPR ground bounce wave and relying on a priori knowledge, the criteria on minimum fractal dimension is introduced to select the reference to the ground b...
详细信息
For the problem of the imprecise estimation of the reference of GPR ground bounce wave and relying on a priori knowledge, the criteria on minimum fractal dimension is introduced to select the reference to the ground bounce wave automatically. First, the detection direction of the fractal dimension curve is achieved by the the box-counting dimension of A-scan for a given ground-penetrating radar B-scan. Compared with the fractal dimension of the average trace of the B-scan, the trace of minimum fractal dimension or the trace which is averaged by the traces whose fractal dimension is less than the one of average trace, is selected as the reference ground bounce wave. Experimental results show that the method can preserve more energy of probable target area and more effective than the one of average trace.
Aiming at shortcomings of traditional image retrieval systems, a new image retrieval approach based on color features of image combining intuitive fuzzy theory with genetic algorithm is proposed. Each image is segment...
详细信息
Aiming at shortcomings of traditional image retrieval systems, a new image retrieval approach based on color features of image combining intuitive fuzzy theory with genetic algorithm is proposed. Each image is segmented into a constant number of sub-images in vertical direction. Color features are extracted from every sub-image to get chromosome coding. It is considered that fuzzy membership and intuitive fuzzy hesitancy degree of every pixel's color in image are associated to all the color histogram bins. Certain feature, fuzzy feature and intuitive fuzzy feature of colors in an image, are used together to describe the content of image. Efficient combinations of sub-image are selected according to operation of selecting, crossing and variation. Retrieval results are obtained from image matching based on these color feature combinations of sub-images. Tests show that this approach can improve the accuracy of image retrieval in the case of not decreasing the speed of image retrieval. Its mean precision is above 80 %.
the research proposed an approach that based on Domain Partitional Markov Decision Process to make decisions about the protection and defense against cyber attacks. We partitioned the network into several security dom...
详细信息
The nude image is an important part in adult images spreading on the Internet. A new recognizing algorithm of nude image based on the navel and body feature is proposed in this paper. The algorithm considers the naked...
详细信息
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireles...
详细信息
ISBN:
(纸本)9781424445196
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireless networks have emerged. Based on the epidemic theory, this paper proposes a general model which predicts how a worm propagates through a wireless ad hoc network. Then the differential equations of the model is presented and a necessary condition for worms to spread in these networks is derived, which may be useful in designing a secure wireless ad hoc network. Simulation results show that the process of worm propagation in these wireless networks is sensitive to the deployment density of nodes and the energy consumption of nodes. Therefore, our study can provide insight into deriving a general model to characterize worm propagation in wireless ad hoc networks. & copy;2009 IEEE.
Intention recognition is the ability to predict an opposing force's high level goals. Knowing an attacker's intention can support the decision-making of the network security administrators. Furthermore Intent ...
详细信息
暂无评论