Intra-pulse features extraction of radar is of great research significance in electronic reconnaissance technology. With continuous development and equipment of the new system radar, the characteristics of the modern ...
详细信息
Discriminant analysis is an important analytical method in cryptanalysis. When only known ciphertext, the encryption algorithm for identifying and classifying is an important part of distinguishing analysis. In this p...
Discriminant analysis is an important analytical method in cryptanalysis. When only known ciphertext, the encryption algorithm for identifying and classifying is an important part of distinguishing analysis. In this paper, a random forest classifier is used to classify eight block ciphers of ECB mode and eight block ciphers of CBC mode. By designing a feature based on ciphertext recombination and location-specific, the results show that the designed features can effectively extract the information of ciphertext data. In ECB mode, 8 algorithms can be successfully classified with an accuracy of more than 87%. In CBC mode, it can also be classified with higher accuracy than random.
With the popular use of network application services and the growing number of users, web services have become the main target of hackers. Traditional single software has insufficient security protection against unkno...
With the popular use of network application services and the growing number of users, web services have become the main target of hackers. Traditional single software has insufficient security protection against unknown threats and is prone to various vulnerabilities. In this paper, we adopt a new type of active defense strategy in java web services. At different application layers, we use existing components based on the natural software diversity to form different software stacks, and use dynamic scheduling mechanisms to change the attack surface at all times to obtain security protection. Our analysis shows that the flexibility of java web services using this defense strategy is enhanced, and the exploitability of its vulnerabilities is effectively reduced.
The flourish of deep learning frameworks and hardware platforms has been demanding an efficient compiler that can shield the diversity in both software and hardware in order to provide application portability. Among t...
详细信息
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic...
详细信息
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic search with a probabilistic search, requires less memory and can be implemented on ordinary multicore computers. Experiments show that certain semiprimes of 27 to 46 decimal-bits can be validly factorized with the approach on personal computer in expected time.
The article proves several inequalities derived from nodal multiplication on T3 tree. The proved inequalities are helpful to estimate certain quantities related with the T3 tree as well as examples of proving an inequ...
详细信息
The article proves several inequalities derived from nodal multiplication on T3 tree. The proved inequalities are helpful to estimate certain quantities related with the T3 tree as well as examples of proving an inequality embedded with the floor functions.
The revolution of biotechnology has pushed forward life sciences into the Big Data ***,high-throughput bio-techniques have greatly accelerated the integration of biology,computing and informatics,and hence substantial...
详细信息
The revolution of biotechnology has pushed forward life sciences into the Big Data ***,high-throughput bio-techniques have greatly accelerated the integration of biology,computing and informatics,and hence substantially pushed forward the development of bioinformatics and computational *** to the latest report of data deposition within National Centre for Biotechnology Information(NCBI),the genome sequencing projects have increased 49.94%.
The article investigates some properties of square root of T3 tree’s nodes. It first proves several inequalities that are helpful to estimate the square root of a node, and then proves several theorems to describe th...
详细信息
The article investigates some properties of square root of T3 tree’s nodes. It first proves several inequalities that are helpful to estimate the square root of a node, and then proves several theorems to describe the distribution of the square root of the nodes on T3 tree.
With the rapid development of the internet, applications of recommendation systems for online shops and entertainment platforms become more and more popular. In order to improve the effectiveness of recommendation, ex...
详细信息
With the rapid development of the internet, applications of recommendation systems for online shops and entertainment platforms become more and more popular. In order to improve the effectiveness of recommendation, external information has been incorporated into various algorithms, such as location and social relationship. However, most algorithms only focus on the introduction of external information without depth analysis of the intrinsic mechanism in the external information. This paper proposed a transfer model of social trusted relationship, and optimized the reliability of the transfer model using pruning algorithm based on original trust recommendation. A credible social relationship macro-transfer model based on iterations of new credible relationships is defined by the similarity of social relationships. With a certain interest topic as a source of information, a micro-transfer model achieves the theme of interest and credibility of the expansion using social information dissemination algorithm. To demonstrate the effectiveness of the macro and micro credible transfer models, we used the Mantra search tree pruning algorithm and the optimization algorithm of similar category replacing similar products. The experimental results show that the proposed method based on the macroscopic and microscopic transfer models of the trusted relationship enhances the success rate and stability of the recommended system.
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which h...
详细信息
Due to advances in semiconductor techniques, many-core processors have been widely used in high performance computing. However, many applications still cannot be carried out efficiently due to the memory wall, which has become a bottleneck in many-core processors. In this paper, we present a novel heterogeneous many-core processor architecture named deeply fused many-core (DFMC) for high performance computing systems. DFMC integrates management processing ele- ments (MPEs) and computing processing elements (CPEs), which are heterogeneous processor cores for different application features with a unified ISA (instruction set architecture), a unified execution model, and share-memory that supports cache coherence. The DFMC processor can alleviate the memory wall problem by combining a series of cooperative computing techniques of CPEs, such as multi-pattern data stream transfer, efficient register-level communication mechanism, and fast hardware synchronization technique. These techniques are able to improve on-chip data reuse and optimize memory access performance. This paper illustrates an implementation of a full system prototype based on FPGA with four MPEs and 256 CPEs. Our experimental results show that the effect of the cooperative computing techniques of CPEs is significant, with DGEMM (double-precision matrix multiplication) achieving an efficiency of 94%, FFT (fast Fourier transform) obtaining a performance of 207 GFLOPS and FDTD (finite-difference time-domain) obtaining a performance of 27 GFLOPS.
暂无评论