Network visualization is a time-honored research direction, which can be traced back to the graph *** data of dynamic network is constantly updated, which brings some challenges to dynamic network visualization. Dynam...
详细信息
Network visualization is a time-honored research direction, which can be traced back to the graph *** data of dynamic network is constantly updated, which brings some challenges to dynamic network visualization. Dynamic network visualization mainly includes network layout, network property visualization and user interaction, therefore, this paper focuses on the research and review of some key technologies,including layout technology, visualization technology and interactive technology. The aim of this paper is to provide some technical support for the research of the key technology of dynamic network visualization.
To solve the security of data transmission in network, a secure communication method based on time-delayed hyperchaotic synchronization is presented. By selecting the typical hyperchaotic system, the communication sys...
To solve the security of data transmission in network, a secure communication method based on time-delayed hyperchaotic synchronization is presented. By selecting the typical hyperchaotic system, the communication system synchronization scheme is designed to realize the recovery of the encrypted signal, and the security performance of the method is analyzed by simulation. The simulation results show that the synchronization method has the characteristics of high security and is easy to implement.
Visual analysis on network security is a new area,it consists methods and technology of visualization and network security analysis,which has new *** on network security visualization have done certain extent research...
详细信息
ISBN:
(纸本)9781467399050
Visual analysis on network security is a new area,it consists methods and technology of visualization and network security analysis,which has new *** on network security visualization have done certain extent research and accumulated *** with the rapid development of visual analysis,visual network security analysis achieved rich results in recent ***,there is less study on basic research framework and principle of security visualization analysis,this dissertation summarizes concerned problems in the field of security analysis,data sources,visual analysis techniques and related overview of visual analysis *** analysis of these systems,network security visualization on the research questions can be tested and directions for future research can be provided.
On the basis of integrating each subsystem in topological structure,implementation function,operation mode and institutional mechanism,this paper has established a comprehensive service system which could manage vario...
详细信息
On the basis of integrating each subsystem in topological structure,implementation function,operation mode and institutional mechanism,this paper has established a comprehensive service system which could manage various heterogeneous resources and handle kinds of complex missions within the architecture to carry out the research of the resource scheduling architecture for service-oriented space-based information ***,this paper analyzes the characteristics of space-based information system from two aspects of diversity and *** on the research,this paper studies the organizational structure of resource scheduling of space-based information system to realize the unified management and scheduling of service-oriented diversification resources following the sequence from resources to ***,this paper has proposed a resource scheduling mode for the service-oriented space-based information system to realize the mapping from resources to missions,and it also has used that mode to block differentiated user requirements and the dynamic changes of the *** the end,the paper has put forward the implementation plan of the resource scheduling for service-oriented space-based information system,and it also provides a reference for the next construction of the space-based information system.
Parallel computer architectures bring synchronization problem which bog down the *** the speed gap between CPU and memory keeps growing,making data operation more *** some data-intensive applications,there are similar...
详细信息
ISBN:
(纸本)9781467399050
Parallel computer architectures bring synchronization problem which bog down the *** the speed gap between CPU and memory keeps growing,making data operation more *** some data-intensive applications,there are similar or coincident child operations in parallel threads,which take unnecessary *** effectively exploit parallelization,reduce the price of data operation,the concept of data-centered computing is *** considering the similarity and relations between data and merging them into unions as threads' input,data-centered computing can eliminate data operation redundancy of data-intensive *** implementation in web service proves that data-centered computing can effectively improve performance.
Flow is one of the most fundamental physical process in natural *** visualization can give an intuitive view of flow fields and contribute to the observation and analysis of *** flow fields are all dynamic while tradi...
详细信息
ISBN:
(纸本)9781467399050
Flow is one of the most fundamental physical process in natural *** visualization can give an intuitive view of flow fields and contribute to the observation and analysis of *** flow fields are all dynamic while traditional visualization approaches are not able to reflect the trends of flows or the diversity inside *** on the research of Lagrangian Coherent Structures in Computational Fluid Dynamics,the concept of flow field topology is redefined,two typical 2D dynamic vector fields are selected for topology analysis,and the results are used to optimize the visual effects of geometric *** show that visualization of 2D dynamic vector fields based on topology analysis can extract the coherent structures of flows which are helpful to the comprehension of flow for researchers and description of characteristic difference inside flows.
Satellite orbit prediction is a basic requirement in satellite applications. The current orbit prediction mainly depends on the dynamic model. Because of the limitations of the detection equipment and the satellite or...
详细信息
Satellite orbit prediction is a basic requirement in satellite applications. The current orbit prediction mainly depends on the dynamic model. Because of the limitations of the detection equipment and the satellite orbit data cannot be updated in time, which cause the dynamical model long-term orbit divergence to be serious. Using deep neural network as a method of orbit prediction which can predict the future data by training the satellite orbit data and grasp the implicit relationship between the data. The neural network model is optimized and the prediction data is compared with the actual data. The error of 20 days forecast is reduced to 2 km, which improves the accuracy of neural network forecasting satellite orbit.
Based on the survey about the criterion of network visualization, some visualization challenges for multilayer networks are introduced. After a brief overview of the strategies and the previous work on multilayer netw...
详细信息
Based on the survey about the criterion of network visualization, some visualization challenges for multilayer networks are introduced. After a brief overview of the strategies and the previous work on multilayer networks visualization, some weaknesses and promising research directions are discussed.
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to dete...
详细信息
Software vulnerabilities are the root cause of various information security incidents while dynamic taint analysis is an emerging program analysis technique. In this paper, to maximize the use of the technique to detect software vulnerabilities, we present SwordDTA, a tool that can perform dynamic taint analysis for binaries. This tool is flexible and extensible that it can work with commodity software and hardware. It can be used to detect software vulnerabilities with vulnerability modeling and taint check. We evaluate it with a number of commonly used real-world applications. The experimental results show that SwordDTA is capable of detecting at least four kinds of softavare vulnerabilities including buffer overflow, integer overflow, division by zero and use-after-free, and is applicable for a wide range of software.
Because hyperspectral images have the characteristics of high correlation between bands and strong information redundancy, the reduction in dimension of hyperspectral images is an important step in the pre-processing ...
Because hyperspectral images have the characteristics of high correlation between bands and strong information redundancy, the reduction in dimension of hyperspectral images is an important step in the pre-processing of hyperspectral images. Band selection can preserve the physical meaning of the original data while reducing dimension and has application in many aspects. Affinity Propagation Clustering (AP) is a clustering method proposed by Fray et al. in 2007. AP clusters based on the correlation between data points and treats all data points as potential cluster centers. This paper proposes a band selection method based on AP clustering, which introduces wavelet transform into the calculation of similarity and preference value in clustering algorithm. The dimensionality reduction results are input into the minimum distance classifier for classification, and the classification accuracy was calculated. The dataset is validated by the Indiana Pines dataset. The experimental results verify the effectiveness of the proposed method.
暂无评论