This paper studies the stability of the six-dimensional Fractional gene regulatory networks(GRNs) with three variables and the bifurcation of second-order system *** paper presents the basic interaction model figure o...
详细信息
This paper studies the stability of the six-dimensional Fractional gene regulatory networks(GRNs) with three variables and the bifurcation of second-order system *** paper presents the basic interaction model figure of three variables GRNs,which contains the relationship between the three ***, in order to improve the accuracy of the study, in analysis of ***, a numerical simulation example is provided to verify the effectiveness and the advantage of the proposed stability and bifurcation criterion.
The growing trend of network virtualization leads to a widespread deployment of virtual switches in virtualized environments. However, virtual switching is confronted with great performance challenges regarding packet...
详细信息
ISBN:
(数字)9781728143286
ISBN:
(纸本)9781728143293
The growing trend of network virtualization leads to a widespread deployment of virtual switches in virtualized environments. However, virtual switching is confronted with great performance challenges regarding packet classification especially in OpenFlow-based software defined networks. This paper takes an insight into network traffic locality from the perspective of exact flows and wildcard flows, and propose a fast packet classification scheme CuckooFlow. In particular, we devise an active exact flow cache with cuckoo hashing to predict the respective flow entry for each arrived packet. Subsequently, we formulate its cache hit rate based on packet-in-batch arrivals, and average search length of the packet classification scheme. Finally, our proposed CuckooFlow scheme is evaluated with real network traffic traces by experiments. The experimental results indicate that our proposed scheme outperforms traditional ones Open vSwitch and CuckooDistributor in terms of cache hit rates and average search length, and contributes to promote virtual OpenFlow switching performance.
Visualization of ontology alignment and ontology entity is becoming a method to help Solve the problem of semantic heterogeneity. This paper first introduces the basic concepts of ontology and ontology matching, and t...
详细信息
During the prediction of software defect distribution, the data redundancy caused by the multi-dimensional measurement will lead to the decrease of prediction accuracy. In order to solve this problem, this paper propo...
详细信息
During the prediction of software defect distribution, the data redundancy caused by the multi-dimensional measurement will lead to the decrease of prediction accuracy. In order to solve this problem, this paper proposed a novel software defect prediction model based on neighborhood preserving embedded support vector machine(NPESVM) algorithm. The model uses SVM as the basic classifier of software defect distribution prediction model, and the NPE algorithm is combined to keep the local geometric structure of the data unchanged in the process of dimensionality reduction. The problem of precision reduction of SVM caused by data loss after attribute reduction is avoided. Compared with single SVM and LLE-SVM prediction algorithm, the prediction model in this paper improves the F-measure in aspect of software defect distribution prediction by 3%~4%.
In view of the problem of how to improve the accuracy of education resources recommendation in Internet era, a recommendation algorithm based on implicit feedback and pairwise education resources are proposed. Firstly...
详细信息
In view of the problem of how to improve the accuracy of education resources recommendation in Internet era, a recommendation algorithm based on implicit feedback and pairwise education resources are proposed. Firstly, the feature extraction of learner-education resource is carried out, and the implicit features of learner-education resource are extracted by implicit semantic model, and the prediction results of factor decomposition are used as input to sorting learning algorithm. Converting sorting problems to classification problems uses the theory of ordering learning. Based on the experiment comparison with the traditional recommendation algorithm, it is compared with the comparison algorithm, which has better effect on the recommendation of educational resources. The algorithm increases by nearly 30% on metrics MAP, NDGG.
The teaching ability of teachers is one of the core abilities of colleges. Its level has gradually become an important indicator for evaluating a school. However, the existing evaluation models of college teachers are...
详细信息
The teaching ability of teachers is one of the core abilities of colleges. Its level has gradually become an important indicator for evaluating a school. However, the existing evaluation models of college teachers are timeconsuming, empirical, complex, subjective and speculative. Therefore, based on the teaching features of colleges in China, this paper constructs a fast and effective college teacher evaluation model by discrete Hopfield neural network technology, and introduces the basic ideas and steps of the model.
In a practical continuous-variable quantum key distribution (CVQKD) system, the optical attenuator can adjust the Gaussian-modulated coherent states and the local oscillator signal to an optimal value for guaranteeing...
详细信息
In a practical continuous-variable quantum key distribution (CVQKD) system, the optical attenuator can adjust the Gaussian-modulated coherent states and the local oscillator signal to an optimal value for guaranteeing the security of the system and optimizing the performance of the system. However, the performance of the optical attenuator may deteriorate due to the intentional and unintentional damage of the device. In this paper, we investigate the practical security of a CVQKD system with reduced optical attenuation. We find that the secret key rate of the system may be overestimated based on the investigation of parameter estimation under the effects of reduced optical attenuation. This opens a security loophole for Eve to successfully perform an intercept-resend attack in a practical CVQKD system. To close this loophole, we add an optical fuse at Alice's output port and design a scheme to monitor the level of optical attenuation in real time, which can make the secret key rate of the system evaluated precisely. The analysis shows that these countermeasures can effectively resist this potential attack.
In cognitive radio networks (CRNs), secondary users need to first discover neighbours and form communication links, referred to as the rendezvous process. Rendezvous between any two secondary users can only be achieve...
详细信息
In cognitive radio networks (CRNs), secondary users need to first discover neighbours and form communication links, referred to as the rendezvous process. Rendezvous between any two secondary users can only be achieved on the same channel. However, the nature of the CRN makes this a challenging problem. Specifically in CRN, not only the network is multi- channel, but the channels available at different nodes may be different. While most of the existing works study pair-wise rendezvous and design channel hopping sequence, in this paper, we focus on the performance improvement of the rendezvous process based on the existing channel hopping sequences with multiple users in CRN. We propose a new strategy, called Group Based Strategy (GBS) to achieve the acceleration, which is flexible to incorporate the existing sequence generation algorithms. Our basic idea is to group the encountered users and schedule rendezvous for them. With the purpose to increase rendezvous diversity, other users or groups can join the group if they get the group rendezvous information. Experiments are conducted to evaluate the proposed scheme. Overall, the performance can be improved by more than 50% under symmetric model or asymmetric model using our accelerating strategy.
In recent years, with the diversified development of education and training in China and the continuous "Internet +", enterprises and society have put forward higher requirements for the ability of skilled t...
详细信息
In recent years, with the diversified development of education and training in China and the continuous "Internet +", enterprises and society have put forward higher requirements for the ability of skilled talents. However, in the vocational specialty colleges that transport a large number of skilled talents, it is increasingly difficult to meet the needs of students' learning and development. At the same time, it is difficult for students to select appropriate content for independent learning in the vast information on the Internet. Hybrid teaching is a teaching mode that combines the advantages of both traditional teaching and networked teaching. The specialty courses teaching system is based on hybrid teaching mode. It uses Java Web technology as the basis for adopting B/S development mode, MySQL database and eclipse, Navicat as Development tools. The research and implementation of the hybrid teaching system is conducive to the school to help bridging the communication between the students and the enterprise, so that students can learn more directly and provide high-skilled talents with basic professional knowledge and skilled skills. On the other hand, through practice, it also helps to promote the development of hybrid teaching reform, thus solving the complexity and particularity of the informationization process in higher vocational colleges.
暂无评论