Cascading failures are a severe threat to inter-domain routing system, while little has been done to detect andreport impacts. To address the problem, we analyze the process of cascading failure in the inter-domain r...
详细信息
ISBN:
(纸本)9781538683408
Cascading failures are a severe threat to inter-domain routing system, while little has been done to detect andreport impacts. To address the problem, we analyze the process of cascading failure in the inter-domain routing system, and find that it is constructed by two stages as key nodes/links failure andrelated nodes/links cascading failure. The first stage is shorter as the onset time is seconds' level, while the second stage is longer as the onset time is at least one hour. Then a two-phase detection method Fd-SP mechanism is put forward, the first stage of which adopts real-time detection methods to identify the initial failure nodes and links and the second stage uses dF 2 -CFM model to predict the damage range of cascade failure before true propagation. To validate Fd-SP, it is applied to security events containing cascading failures and the results of Fd-SP are compared with the datasets collected from rIPE during security events. Using the number of Update messages received by nodes as the metric, the maximum relative error is 1.69 and the average one is 0.92. As our prediction is a little large than reality, the false negative rate of Fd-SP is low.
Eye movements obtainedduring eye tracking include both the fixation location and cognitive activities of the subject when viewing the remote sensing images. Aiming at the problem that the existing region of interest ...
详细信息
ISBN:
(纸本)9781538695722;9781538695715
Eye movements obtainedduring eye tracking include both the fixation location and cognitive activities of the subject when viewing the remote sensing images. Aiming at the problem that the existing region of interest analysis methods based on the eye movement do not determine whether the area contains targets or not, in this paper a method was presented to predict the targets in the regions of interest using cognitive activities from eye movement. The methodrealized the detection and location of targets in remote-sensing images through the combination of fixation location and cognitive activity in eye movements. Experiments showed that the cognitive activities related to fixations make significant contribution to target prediction in the remote sensing image with complex backgrounds.
The manual expert scheduling, currently utilized in shortwave position system, is unable to satisfy the modern scenario of intensive tasks anddeficient resources, thus resulting in the low position accuracy. To addre...
详细信息
ISBN:
(纸本)9781450352895
The manual expert scheduling, currently utilized in shortwave position system, is unable to satisfy the modern scenario of intensive tasks anddeficient resources, thus resulting in the low position accuracy. To address the problem, we propose a shortwave-position-resource scheduling method based on Back Propagating Neural Network(BPNN) anddynamic Weight Adjustment(dWA). Firstly, we conceive a basic centralized optimization model for problem formulation, constructing an objective function consisted by Geometrical dilution of Precision(GdOP) and signal quality via linear weight summation. Furthermore, we study the dynamic adjustment strategy of weights. With weights updated according to the gradients of factors, the objective function inclines to the factor of better performance during iterations, thus leading to a better optimization searching ability. Moreover, by introducing the Bayesian regulation(Br) and Levenberg-Marquardt(LM) algorithm, we make an improvement on the generalization performance of BPNN, then achieving the signal quality estimation in the shortwave channel. Simulations indicate that the proposed method obtains an excellent robustness in scenes of different tasks number. When compared with other scheduling methods, the proposed method can effectively enhance the location accuracy. Experiments also show that the timeliness of the method is relatively low and needs further improvement.
Multi-label learning aims to predict the label sets an instance belongs *** Learning Machine(ELM),as a single-hidden layer feedforward neural network algorithm,has been extended to multi-label scenarios because of fas...
详细信息
ISBN:
(纸本)9781509036202
Multi-label learning aims to predict the label sets an instance belongs *** Learning Machine(ELM),as a single-hidden layer feedforward neural network algorithm,has been extended to multi-label scenarios because of faster learning speed and less human *** at dealing with the problem of ignoring the inter-label dependencies,the proposed method,ELM-LMF,decomposes the label matrix into latent label matrix mapping the label space to the latent space and the k-label dependency matrix preserving the interlabel relationships,classifies in latent space with ELM,and maps the predicted labels back to the original *** on 3 benchmark multi-label data sets with 3 other state-of-art methods prove the feasibility of ELM-LMF.
An collaborative filtering algorithm based on denoising Auto-Encoder and item embedding(CdAWE) was proposed to solve the absent analysis of item co-occurrence relation and the cold start of model para
ISBN:
(纸本)9781467389808
An collaborative filtering algorithm based on denoising Auto-Encoder and item embedding(CdAWE) was proposed to solve the absent analysis of item co-occurrence relation and the cold start of model para
The following topics are dealt with: feature extraction; control system synthesis; learning (artificial intelligence); production engineering computing; three-term control; design engineering; optimisation; pattern cl...
详细信息
The following topics are dealt with: feature extraction; control system synthesis; learning (artificial intelligence); production engineering computing; three-term control; design engineering; optimisation; pattern classification; closed loop systems; anddigital simulation.
Improving the performance for VNF (Virtualized Network Function) by hardware acceleration is a hot research topic in SdN/NFV architecture. After introducing the acceleration resource for VNF, how to implement uniform ...
详细信息
Improving the performance for VNF (Virtualized Network Function) by hardware acceleration is a hot research topic in SdN/NFV architecture. After introducing the acceleration resource for VNF, how to implement uniform deployment and allocation of the acceleration resources is an urgent problem to be solved. Thus in this paper, a unifieddeployment architecture of acceleration resource for VNF is proposed firstly. On the basis of architecture, the problem of acceleration resource allocation is modeled. By analyzing the influence of acceleration resource for VNF on deployment of service chains, we propose the evaluation index of acceleration resource allocation algorithm for VNF. Finally, we design a two-stage acceleration resource allocation algorithm to solve the problem. The experimental results show that the proposed algorithm can rationally allocate acceleration resources to nodes in the entire network and improve the efficiency of acceleration resource utilization.
Encoder-to-decoder is a newly architecture for Neural Machine Translation(NMT). Convolutional Neural Network(CNN) based on this framework has gained significant success in NMT task. Challenges remain in the practical ...
详细信息
Encoder-to-decoder is a newly architecture for Neural Machine Translation(NMT). Convolutional Neural Network(CNN) based on this framework has gained significant success in NMT task. Challenges remain in the practical use of CNN model, which is in need of bilingual sentence pairs for training and each bilingual data is designed for CNN translation model needing retraining. Although some successful performance has been reported, it is an important research direction to avoid model overfitting caused by the scarcity of parallel corpus. The paper introduces a simple and efficient knowledge distillation method forregularization to solve CNN training overfitting problems by transferring the knowledge of source model to adapted model on low-resource languages in NMT task. The experiment on English-Czech dataset result shows that our model solve the over fitting problem, get better generalization, and improve the performance of a low-resource languages translation task.
With the continuous development and popularization of network equipment and services, people's dependence on cyberspace is becoming stronger and stronger, and the importance of network security is becoming more an...
详细信息
With the continuous development and popularization of network equipment and services, people's dependence on cyberspace is becoming stronger and stronger, and the importance of network security is becoming more and more prominent. Mimic defense is based on the system architecture of dynamic heterogeneous redundancy. data is sent to multiple heterogeneous functional equivalents through the input agents, and then the response of heterogeneous functional equivalents is judged according to a certain arbitration policy by the output agent. The abnormal output of a functional equivalent can be effectively eliminated, enabling the system to achieve intrusion prevention against unknown system vulnerabilities or backdoors. This paper analyzes the effect of the isomorphism of functional equivalents on system security, and proposes a mimic method based on the equivalence of mimicry maximization. Experiments have shown that the effectiveness of security defense can be significantly improved.
Considering the use of Fully Connected (FC) layer limits the performance of Convolutional Neural Networks (CNNs), this paperdevelops a method to improve the coupling between the convolution layer and the FC layer by ...
详细信息
暂无评论