In order to understand the complexity of information systems deeply,the paper designed a kind of analysis method of "Network Structural Characteristics Analysis— Network Topology Model — Statistical Analysis Al...
详细信息
ISBN:
(纸本)9781509001668
In order to understand the complexity of information systems deeply,the paper designed a kind of analysis method of "Network Structural Characteristics Analysis— Network Topology Model — Statistical Analysis Algorithm Design" based on complex Network *** application and analysis,the method could reflect accurately the complexity of information systems and support further research.
Network visualization is a time-honored research direction, which can be traced back to the graph *** data of dynamic network is constantly updated, which brings some challenges to dynamic network visualization. Dynam...
详细信息
Network visualization is a time-honored research direction, which can be traced back to the graph *** data of dynamic network is constantly updated, which brings some challenges to dynamic network visualization. Dynamic network visualization mainly includes network layout, network property visualization and user interaction, therefore, this paper focuses on the research and review of some key technologies,including layout technology, visualization technology and interactive technology. The aim of this paper is to provide some technical support for the research of the key technology of dynamic network visualization.
Enemy air defense weapons are the main threat factors of helicopter flight. To determine the threat distribution, and establishes the models of threat targets, are the necessary means to avoid the threat and improve s...
详细信息
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to dete...
详细信息
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to detect software vulnerabilities, we present SwordDTA, a tool that can perform dynamic taint analysis for binaries. This tool is flexible and extensible that it can work with commodity software and hardware. It can be used to detect software vulnerabilities with vulnerability modeling and taint check. We evaluate it with a number of commonly used real-world applications. The experimental results show that SwordDTA is capable of detecting at least four kinds of softavare vulnerabilities including buffer overflow, integer overflow, division by zero and use-after-free, and is applicable for a wide range of software.
Satellite orbit prediction is a basic requirement in satellite applications. The current orbit prediction mainly depends on the dynamic model. Because of the limitations of the detection equipment and the satellite or...
详细信息
Satellite orbit prediction is a basic requirement in satellite applications. The current orbit prediction mainly depends on the dynamic model. Because of the limitations of the detection equipment and the satellite orbit data cannot be updated in time, which cause the dynamical model long-term orbit divergence to be serious. Using deep neural network as a method of orbit prediction which can predict the future data by training the satellite orbit data and grasp the implicit relationship between the data. The neural network model is optimized and the prediction data is compared with the actual data. The error of 20 days forecast is reduced to 2 km, which improves the accuracy of neural network forecasting satellite orbit.
Based on the survey about the criterion of network visualization, some visualization challenges for multilayer networks are introduced. After a brief overview of the strategies and the previous work on multilayer netw...
详细信息
Based on the survey about the criterion of network visualization, some visualization challenges for multilayer networks are introduced. After a brief overview of the strategies and the previous work on multilayer networks visualization, some weaknesses and promising research directions are discussed.
To solve the security of data transmission in network, a secure communication method based on time-delayed hyperchaotic synchronization is presented. By selecting the typical hyperchaotic system, the communication sys...
To solve the security of data transmission in network, a secure communication method based on time-delayed hyperchaotic synchronization is presented. By selecting the typical hyperchaotic system, the communication system synchronization scheme is designed to realize the recovery of the encrypted signal, and the security performance of the method is analyzed by simulation. The simulation results show that the synchronization method has the characteristics of high security and is easy to implement.
Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D s...
详细信息
Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D space(3D-Parallel Coordinates)consisted of attribute,range and time *** that timevarying multidimensional data can be displayed as polygonal line cluster for recording and analyzing.A technique called clipping shade is taken to highlight datasets around the current time,and results reveal that 3D-Parallel Coordinates can effectively analyze attribute's time-varying character.
Analized the task and general form of the software management;pionted out the shortages of the software repository on *** introduced the Role-Based Access Control model(RBAC model) which was introduced into the constr...
详细信息
Analized the task and general form of the software management;pionted out the shortages of the software repository on *** introduced the Role-Based Access Control model(RBAC model) which was introduced into the construction of software repository service by combining with the requirement of security management about software repository.A hierarchical access control model based on RBAC was proposed,and it database of the software repository based on RBAC was *** effective application of this model in the process of software management can ensure the convenience of software distribution;and meanwhile it can effectively improve the security of the software packages.
Because hyperspectral images have the characteristics of high correlation between bands and strong information redundancy, the reduction in dimension of hyperspectral images is an important step in the pre-processing ...
Because hyperspectral images have the characteristics of high correlation between bands and strong information redundancy, the reduction in dimension of hyperspectral images is an important step in the pre-processing of hyperspectral images. Band selection can preserve the physical meaning of the original data while reducing dimension and has application in many aspects. Affinity Propagation Clustering (AP) is a clustering method proposed by Fray et al. in 2007. AP clusters based on the correlation between data points and treats all data points as potential cluster centers. This paper proposes a band selection method based on AP clustering, which introduces wavelet transform into the calculation of similarity and preference value in clustering algorithm. The dimensionality reduction results are input into the minimum distance classifier for classification, and the classification accuracy was calculated. The dataset is validated by the Indiana Pines dataset. The experimental results verify the effectiveness of the proposed method.
暂无评论