In view of the problem that the result accuracy of the research publication recommendations of manuscripts is often low. It is very difficult for many contributors to find the suitable journals from many recommendatio...
详细信息
In allusion to the three problems of conventional D-S(Dempster-Shafer) evidence theory, this paper proposes an improved Dempster fusion rule based on weight preprocessing. By comparing the fusion results with conventi...
详细信息
ISBN:
(纸本)9781510840232
In allusion to the three problems of conventional D-S(Dempster-Shafer) evidence theory, this paper proposes an improved Dempster fusion rule based on weight preprocessing. By comparing the fusion results with conventional method and other improved methods, we conclude that the method in this paper is more superior in dealing with uncertainty, and more reasonable in processing the evidence weight.
The vulnerability of network or information system is the inherent reason for the existence of security risks and security risks. External threats exploit the vulnerability of the network or information system to laun...
详细信息
The vulnerability of network or information system is the inherent reason for the existence of security risks and security risks. External threats exploit the vulnerability of the network or information system to launch attacks. Therefore, in the field of network security risk assessment technology, security vulnerability analysis takes an important position and is the basis for a network security risk assessment. This paper mainly reviews the research status of network security vulnerability analysis methods, network security quantitative evaluation method and real-time evaluation method of network security.
With the increment of the scale of the network, the task of large-scale network data becomes more difficult. In the process of network drawing, it is difficult to fully reflect its internal structure. This study propo...
详细信息
With the increment of the scale of the network, the task of large-scale network data becomes more difficult. In the process of network drawing, it is difficult to fully reflect its internal structure. This study proposes to model the whole network as a multi-particle simulationsystem, experiment results show that the proposed method can effectively reduce the time complexity of the network layout algorithm and efficiently show the network structure characteristics.
This paper proposed a novel attack-defend game based on failure rate and mean time to repair. The game method can exclude irrational strategies and take network availability loss into account. It can also reduce compu...
详细信息
This paper proposed a novel attack-defend game based on failure rate and mean time to repair. The game method can exclude irrational strategies and take network availability loss into account. It can also reduce computation complexity. The experiment validates the application of game model optimization and attack prediction, and discusses further expansion of the method.
The traditional analysis simulations are generally based on the time stepping mechanism in HLA. This method will greatly affect the simulation efficiency due to in a period of time no events occurred. This paper attem...
详细信息
ISBN:
(纸本)9781510840232
The traditional analysis simulations are generally based on the time stepping mechanism in HLA. This method will greatly affect the simulation efficiency due to in a period of time no events occurred. This paper attempts to simulate high-level missile attack and defense using discrete event simulationtechnology, avoiding the idle phenomenon. This paper modifies the state diagram modeling method's shortcomings, that is, events can not be generated from the activities and activities can not be detailed. According to this method, the radar reconnaissance and interference equipments and missiles in missile attack and defense are simulated by discrete events which prove the effectiveness of solving missile attack and defense problems.
Network visualization is a time-honored research direction, which can be traced back to the graph *** data of dynamic network is constantly updated, which brings some challenges to dynamic network visualization. Dynam...
详细信息
Network visualization is a time-honored research direction, which can be traced back to the graph *** data of dynamic network is constantly updated, which brings some challenges to dynamic network visualization. Dynamic network visualization mainly includes network layout, network property visualization and user interaction, therefore, this paper focuses on the research and review of some key technologies,including layout technology, visualization technology and interactive technology. The aim of this paper is to provide some technical support for the research of the key technology of dynamic network visualization.
In multi-criteria collaborative filtering, the data sparsity is a critical factor affecting the effectiveness of the algorithm. Existing solutions generally remove low-efficiency data through dimensionality reduction,...
详细信息
ISBN:
(纸本)9781538683408
In multi-criteria collaborative filtering, the data sparsity is a critical factor affecting the effectiveness of the algorithm. Existing solutions generally remove low-efficiency data through dimensionality reduction, decomposition, etc. While at lower data dimension, they also lose original data information, which impacts the accuracy of predicted ratings. This paper adopts a new processing strategy and proposes to use the matrix filling method to handle the missing data. Firstly, an improved similarity algorithm combined with the Jaccard Similarity Coefficient is used to calculate the predicted rating. Secondly, the Reliable Factor is introduced to prevent the error of filling data. Finally, multiple linear regression is employed for aggregating the ratings of the criteria to eventually yield preferred predicted ratings. A series of experiments show that the proposed method can precisely reflect the user's similarity and achieve better results in predicted ratings, in contrast to traditional methods.
Visual analysis on network security is a new area,it consists methods and technology of visualization and network security analysis,which has new *** on network security visualization have done certain extent research...
详细信息
ISBN:
(纸本)9781467399050
Visual analysis on network security is a new area,it consists methods and technology of visualization and network security analysis,which has new *** on network security visualization have done certain extent research and accumulated *** with the rapid development of visual analysis,visual network security analysis achieved rich results in recent ***,there is less study on basic research framework and principle of security visualization analysis,this dissertation summarizes concerned problems in the field of security analysis,data sources,visual analysis techniques and related overview of visual analysis *** analysis of these systems,network security visualization on the research questions can be tested and directions for future research can be provided.
On the basis of integrating each subsystem in topological structure,implementation function,operation mode and institutional mechanism,this paper has established a comprehensive service system which could manage vario...
详细信息
On the basis of integrating each subsystem in topological structure,implementation function,operation mode and institutional mechanism,this paper has established a comprehensive service system which could manage various heterogeneous resources and handle kinds of complex missions within the architecture to carry out the research of the resource scheduling architecture for service-oriented space-based information ***,this paper analyzes the characteristics of space-based information system from two aspects of diversity and *** on the research,this paper studies the organizational structure of resource scheduling of space-based information system to realize the unified management and scheduling of service-oriented diversification resources following the sequence from resources to ***,this paper has proposed a resource scheduling mode for the service-oriented space-based information system to realize the mapping from resources to missions,and it also has used that mode to block differentiated user requirements and the dynamic changes of the *** the end,the paper has put forward the implementation plan of the resource scheduling for service-oriented space-based information system,and it also provides a reference for the next construction of the space-based information system.
暂无评论