Enemy air defense weapons are the main threat factors of helicopter *** determine the threat distribution,and establishes the models of threat targets,are the necessary means to avoid the threat and improve *** kinds ...
详细信息
Enemy air defense weapons are the main threat factors of helicopter *** determine the threat distribution,and establishes the models of threat targets,are the necessary means to avoid the threat and improve *** kinds of threat models are established,traditional simple model for visual display of battlefield situation,while,the detailed model for calculating the flight safety index *** method takes full consideration of various parameters,which can be more accurate response to the threat of *** models established in this way can assist helicopter threat avoidance,and provide support for path selection.
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty-network boundary partition and protection. These two problems are discussed in this paper. A method of multidim...
详细信息
ISBN:
(纸本)9781509051557
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty-network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare. Characteristic of network boundary protection technique is analyzed and methods are proposed about how to construct network boundary protection.
A novel scheme based on neural networks for optimizing semantic similarity measure is proposed in this study. This scheme is investigated by using three representative neural networks, i.e., the Back Propagation (BP) ...
详细信息
Matching precision is very important and difficult in accurate photography, remote sensing and 3D reconstruction. After analyzing the advantages and shortcomings of current matching algorithms and the epipolar geometr...
详细信息
In the evaluation of equipmentsystem of systems(So S), equipment data has shown some new characters, such as big volume, wide range sources, and dynamic variance. The paper pointed out the idea to evaluate equipment ...
详细信息
ISBN:
(纸本)9781510803084
In the evaluation of equipmentsystem of systems(So S), equipment data has shown some new characters, such as big volume, wide range sources, and dynamic variance. The paper pointed out the idea to evaluate equipment So S based on big data analysis techniques. The outline of the method is provided from two points of view, namely the big data processing techniques and equipment So S evaluation methods. Based on big data, equipment So S efficiency evaluation, counter evaluation, and other deeper level applications, such as intelligence processing and situation analysis, can be made. The method is a new method in the equipment So S evaluation field.
In order to solve the integrated condition monitoring problem in space information network, there are three works finished including analyzing the characteristics of tasks process and system health monitoring,adopting...
详细信息
In order to solve the integrated condition monitoring problem in space information network, there are three works finished including analyzing the characteristics of tasks process and system health monitoring,adopting the automata modeling method, and respectively establishing the models for state inference and state determination. The state inference model is a logic automaton and is gotten by concluding engineering experiences. The state determination model is a double-layer automaton, the lower automaton is responsible for parameter judge and the upper automaton is responsible for state diagnosis. At last, the system state monitoring algorithm has been proposed, which realizes the integrated condition monitoring for task process and system health, and can avoid the false alarm.
Software vulnerabilities are one of the root causes of network security issues. Software security testing is an essential part of secure software development. Fuzzing has been proven to be an effective dynamic softwar...
详细信息
Software vulnerabilities are one of the root causes of network security issues. Software security testing is an essential part of secure software development. Fuzzing has been proven to be an effective dynamic software security testing method. In this paper we present a guided fuzzing approach based on dynamic taint analysis for security testing of network protocol software. This approach identifies the security sensitive functions of target application affected by network packets via dynamic taint analysis, and generates testcases by mutating these packets with the elements of a fuzz library. Due to the guidance of taint information, it to some extend overcomes the blindness of traditional fuzzing methods and improves efficiency. The approach integrates several successive steps, we currently focus on the taint analysis step and have received interesting preliminary experimental results.
Microservices is a flexible architectural style that has many advantages over the alternative monolithic style. These include better performance and scalability. It is particularly suitable, and widely adopted, for cl...
详细信息
Microservices is a flexible architectural style that has many advantages over the alternative monolithic style. These include better performance and scalability. It is particularly suitable, and widely adopted, for cloud-based applications, because in this architecture a software system consisting of a large suite of services of fine granularity, each running its own process and communicating with the others. However, programming such systems is more complex. In this paper we report on CIDE, an integrated software development environment that helps with this. CIDE supports programming in a novel agent-oriented language called CAOPLE and tests their execution in a cluster environment. We present the architecture of CIDE, discuss its design based on the principles of the DevOps software development methodology, and describe facilities that support continuous testing and seamless integration, two other advantages of Microservices.
Software vulnerabilities are one of the root causes of network security issues. Software security testing is an essential part of secure software development. Fuzzing has been proven to be an effective dynamic softwar...
详细信息
ISBN:
(纸本)9781479983544
Software vulnerabilities are one of the root causes of network security issues. Software security testing is an essential part of secure software development. Fuzzing has been proven to be an effective dynamic software security testing method. In this paper we present a guided fuzzing approach based on dynamic taint analysis for security testing of network protocol software. This approach identifies the security sensitive functions of target application affected by network packets via dynamic taint analysis, and generates testcases by mutating these packets with the elements of a fuzz library. Due to the guidance of taint information, it to some extend overcomes the blindness of traditional fuzzing methods and improves efficiency. The approach integrates several successive steps, we currently focus on the taint analysis step and have received interesting preliminary experimental results.
In visual navigation system,a method of construction and scheduling of multi-resolution LOD terrain is designed according to the influence of terrain precision on super low ***,the tiled pyramid is constituted to mana...
详细信息
In visual navigation system,a method of construction and scheduling of multi-resolution LOD terrain is designed according to the influence of terrain precision on super low ***,the tiled pyramid is constituted to manage the terrain data,which is organized by *** terrain complexity-based node selection criterion is used to select the required blocks for ***,the structural similarity of quadtree nodes is made use of to symmetrically cluster two-level nodes,which is suitable for batch scheduling of terrain *** results show that this method improves the terrain precise from a certain range of the aircraft,reduces the frequency of data scheduling,and enhances the rendering frame rates of navigation scene.
暂无评论