In simulation grid, information sharing is very important for the grid units to cooperate with each other effectively and efficiently. In this paper, to resolve the problem of semantic heterogeneity, an ontology-based...
详细信息
ISBN:
(纸本)9780889869264
In simulation grid, information sharing is very important for the grid units to cooperate with each other effectively and efficiently. In this paper, to resolve the problem of semantic heterogeneity, an ontology-based approach is proposed. In this approach, firstly, the local ontologies are merged into a global ontology based on their similarities. Then, with the merged global ontology, the semantic heterogeneity is resolved by comparing the classes and attributes of the local information source schemas. An example of how to resolve semantic heterogeneity in the E-government simulation grid is presented to illustrate this approach.
This paper describes the design and demonstration of a hybrid integrated 210260 GHz self-biased frequency tripler based on planar Schottky diodes. Two Schottky diodes are placed in reversed parallel on the circuit. Th...
详细信息
Software vulnerabilities are one of the root causes of network security issues. Software security testing is an essential part of secure software development. Fuzzing has been proven to be an effective dynamic softwar...
详细信息
Software vulnerabilities are one of the root causes of network security issues. Software security testing is an essential part of secure software development. Fuzzing has been proven to be an effective dynamic software security testing method. In this paper we present a guided fuzzing approach based on dynamic taint analysis for security testing of network protocol software. This approach identifies the security sensitive functions of target application affected by network packets via dynamic taint analysis, and generates testcases by mutating these packets with the elements of a fuzz library. Due to the guidance of taint information, it to some extend overcomes the blindness of traditional fuzzing methods and improves efficiency. The approach integrates several successive steps, we currently focus on the taint analysis step and have received interesting preliminary experimental results.
In order to solve the integrated condition monitoring problem in space information network, there are three works finished including analyzing the characteristics of tasks process and system health monitoring,adopting...
详细信息
In order to solve the integrated condition monitoring problem in space information network, there are three works finished including analyzing the characteristics of tasks process and system health monitoring,adopting the automata modeling method, and respectively establishing the models for state inference and state determination. The state inference model is a logic automaton and is gotten by concluding engineering experiences. The state determination model is a double-layer automaton, the lower automaton is responsible for parameter judge and the upper automaton is responsible for state diagnosis. At last, the system state monitoring algorithm has been proposed, which realizes the integrated condition monitoring for task process and system health, and can avoid the false alarm.
Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D s...
详细信息
Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D space(3D-Parallel Coordinates)consisted of attribute,range and time *** that timevarying multidimensional data can be displayed as polygonal line cluster for recording and analyzing.A technique called clipping shade is taken to highlight datasets around the current time,and results reveal that 3D-Parallel Coordinates can effectively analyze attribute's time-varying character.
With the increment of the scale of the network, the task of large-scale network data becomes more difficult. In the process of network drawing, it is difficult to fully reflect its internal structure. This study propo...
详细信息
With the increment of the scale of the network, the task of large-scale network data becomes more difficult. In the process of network drawing, it is difficult to fully reflect its internal structure. This study proposes to model the whole network as a multi-particle simulationsystem, experiment results show that the proposed method can effectively reduce the time complexity of the network layout algorithm and efficiently show the network structure characteristics.
This paper proposed a novel attack-defend game based on failure rate and mean time to repair. The game method can exclude irrational strategies and take network availability loss into account. It can also reduce compu...
详细信息
This paper proposed a novel attack-defend game based on failure rate and mean time to repair. The game method can exclude irrational strategies and take network availability loss into account. It can also reduce computation complexity. The experiment validates the application of game model optimization and attack prediction, and discusses further expansion of the method.
complexsimulationsystems usually need to satisfy the credibility requirements and the credibility of complexsimulationsystems is inextricably linked to the credibility of simulation sub-systems. Hence, in order to...
详细信息
Motif provides a local high-order substructure angle for the analysis of network structure evolution, which is of great significance for the study of the interaction between satellite network structure and function. T...
详细信息
The traditional analysis simulations are generally based on the time stepping mechanism in HLA. This method will greatly affect the simulation efficiency due to in a period of time no events occurred. This paper attem...
详细信息
ISBN:
(纸本)9781510840232
The traditional analysis simulations are generally based on the time stepping mechanism in HLA. This method will greatly affect the simulation efficiency due to in a period of time no events occurred. This paper attempts to simulate high-level missile attack and defense using discrete event simulationtechnology, avoiding the idle phenomenon. This paper modifies the state diagram modeling method's shortcomings, that is, events can not be generated from the activities and activities can not be detailed. According to this method, the radar reconnaissance and interference equipments and missiles in missile attack and defense are simulated by discrete events which prove the effectiveness of solving missile attack and defense problems.
暂无评论