首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 578 毫秒
1.
对网络攻击信号检测中,需要对网络威胁态势预测的抗体虚警概率阈值估计,提高攻击信号检测性能。传统方法采用伪随机时频跳变的信息容量估计方法实现阈值估计和攻击信号检测,当攻击信号为非线性谐振信号时,检测性能不好。提出一种改进的网络威胁态势预测的抗体虚警概率阈值估计算法。构建多路复用器输入输出网络威胁态势预测算法,通过病毒信息特征预处理为免疫性分析提供信息特征数据基础。得到网络跳变向量和观测向量的标准正态阈值,将网络接收端和发送端数据的信息熵作为信道传递向量函数,在人工免疫进化过程中实现对免疫节点的抗体的虚警概率阈值估计,提高网络攻击信号的检测性能,降低网络威胁态势抗体虚警概率。仿真实验得出,该算法得到的估计结果精确,有效提高了攻击信号的检测性能,确保网络安全。  相似文献   

2.
在网络转网和切换中,常会出现不稳定网络跳变信号,其以单频脉冲的形式造成网络波动,影响网络稳定与安全。对该类单频脉冲包络瞬时值有效统计,可以采用脉冲抵消方法抑制波动,提高网络性能。提出一种基于单元散射混响统计学模型的不稳定网络跳变单频脉冲包络瞬时值统计方法。构建网络跳变单频脉冲混响统计模型,进行脉冲信号混响建模,得到混响信号在网络组网及不稳定跳变中产生的脉冲响应。采用单元散射混响统计学方法对传统的包络瞬时值统计算法进行改进。研究结果表明,采用该算法,能有效统计不稳定网络跳变单频脉冲包络的瞬时值,统计结果准确,有效反应包络变化,为下一步采用脉冲抵消方法抑制波动奠定基础,提高网络性能。  相似文献   

3.
在分组交换网络通信系统中,由于带宽频移键控产生谐振干扰,导致信号传输不稳定,甚至产生误码和丢包。提出一种基于连续小波变换与带宽时延-尺度耦合特性构建的复杂网络带宽频间谐振抗干扰算法。对抗干扰模型进行时间-尺度分析,把干扰信号模型分解成一组带宽双曲调频信号,并分析信号时间平移与尺度伸缩等同效应,有效抑制谐振干扰。仿真验证了算法的有效性,时间-尺度建模分析结果准确,有效抑制了网络带宽频间谐振干扰,大幅降低了复杂分组交换网络通信的误码率,对提高网络安全性能具有积极意义。  相似文献   

4.
混合网络下的差异化异常跳频,是一种新的高速短波通信体系,实际的混合网络中存在较高的预测阶数和虚检频率,采用传统跳变频率检测方法,无法精确检测出跳变频率,存在较大的频率失调量。提出一种基于MUSIC方法和Duffing混沌振子的混合网络下差异化异常跳变频率检测方法,分析了混合网络下的差异化异常跳变信号特征,采用MUSIC方法对差异化异常跳变频率进行初步估算,通过Duffing混沌振子对差异化异常跳变频率进行进一步检测,实现混合网络下的差异化异常跳变频率的高精度检测。仿真结果证明了该方法的有效性,具有较高的检测精度和较低的检测误差。  相似文献   

5.
对组合网络谐振信号检测中,对网络谐振信号进行相群合成,是提高网络安全检测精度的捷径。传统方法中采用相速度和群速度均匀分布平移算法实现相群合成,在信号的子带上产生特征畸变,影响对谐振信号的检测。针对此问题,提出一种采用熵权调制的组合网络谐振信号相群合成算法,实现组合网络谐振信号的检测。首先构建谐振信号模型,设计改进的前馈滤波器进行信号滤波前置处理,计算信号的熵权特征,对滤波器的抽头系数采用熵权特征进行自适应调制,实现网络谐振信号的相群合成。仿真实验证明,采用该算法进行相群合成,能准确反映信号的内部信息特征,降低对谐振信号识别的误码率,提高防火墙对谐振信号的识别能力。  相似文献   

6.
传统方法中对WMN网络测度的信息度增益预测采用线性时频分析预测方法,当网络数据吞吐量出现非线性增益时,网格能量发散,预测性能不好。提出一种具有脉冲聚能效应的WMN网络测度信息增益预测方法,以活跃状态节点为顶点,通信范围内的节点之间的边为权形成网络图,以估计到的WMN网格方位角作为初值进行前向跟踪,结合随机近场测度信息增益特征指标,得到脉冲聚能的混叠谱估计值,计算网络测度信号起始时刻码相位和载波频率相位的脉冲聚能路径,实现脉冲聚能,改进预测算法。仿真结果表明,该算法能保证WMN网格能量的聚敛,提高预测性能,提高网络寿命和连通性,较传统方法优越。  相似文献   

7.
移动通信WiFi网络与无线传感网络交叉组网时,容易产生同频干扰,影响通信质量和信道传输性能。在交叉组网过程中需要对同频干扰进行有效抑制,提高通信可靠性。传统的交叉组网同频干扰抑制算法采用盲源分离抗干扰算法,在交叉组网被动相干定位时时延较大,通信出现延迟。针对上述问题,提出一种改进的交叉组网同频干扰抑制算法,采用传统的盲源分离技术进行信道同频带内干扰噪声分离,对WiFi信道进行信息编码,采用OQPSK调制方法让整个网络都切换到选定的无干扰信道上,引入干扰避免机制,实现交叉组网信道优化设计。仿真实验表明,采用该算法进行同频干扰抑制和优化组网设计,有能效抑制重度的同频干扰,提高组网节点的吞吐量,保证了通信的可靠性。  相似文献   

8.
网络入侵信号表现为一种多频非线性微弱信号,传统的随机共振检测方法受弱信号幅度和临界阈值约束,检测性能受限。提出一种采用随机共振概率密度特征确定信号检测临界阈值的方法,建立网络入侵信号自适应随机共振检测系统,把多频网络入侵信号采用EMD分解的方法分解为高频和低频信号两部分,使每个频段满足随机共振条件。采用相轨迹过零周期数相变判别算法提取随机共振概率密度特征,确定检测系统的临界阈值,实现对入侵信号的准确判别和检测。仿真实验表明,采用该算法进行网络入侵信号检测,能有效检测出多频非线性微弱入侵信号,检测概率具有明显提高,漏检和误报概率降低。  相似文献   

9.
新型的网络病毒的入侵和传播以正态谐振方式进行连续攻击,检测困难,需要对病毒攻击进行有效检测。传统的检测方法采用干扰攻击定位状态转移特征提取的层次性检测算法实现对病毒连续攻击的检测,算法没能自适应求解连续攻击下的特征选择参数,检测性能不好。提出一种基于窄带信号频谱偏移修正的正态谐振网络病毒连续攻击下的重叠检测算法。采用链重叠检测和向量化运算模拟正态谐振网络病毒的攻击特征和相关性质,实现对病毒的检测,通过Langevin方程描述,正态谐振网络的病毒连续攻击表现为一种双稳态非线性驱动多频共振模型,采用窄带信号频谱偏移修正方法,计算得到病毒节点连接概率以及个体的感染率,提高检测性能。仿真结果表明,该算法对病毒传播有较好的抑制性,提高了对网络病毒连续攻击下的检测性能和重叠检测能力。  相似文献   

10.
在对数字电路中非正常跳变信号进行检测的过程中,容易出现干扰信号,影响非正常跳变信号的检测,导致传统的基于交错正交幅度调制的正交频分复用系统采用迫零均衡器进行非正常跳变信号检测时,不能完全消除干扰,无法有效实现数字电路中非正常跳变信号的检测,提出一种基于傅里叶转换的非正常跳变信号检测方法,对数字电路中的干扰进行分析及处理,理想情况下,利用频谱在信号变化频率范围内进行搜寻,获取频率同时对其进行锁定。实际应用中,将信号与一个矩形窗相乘,获取矩形窗的幅度谱,通过无限长信号的理想幅度谱和矩形窗幅度谱的卷积求出有限长信号的幅度谱。对信号进行模拟低通滤波后,对其进行采集,求出非正常跳变信号实际频率的估计值,通过牛顿迭代法向实际频率进行逼近后,实际信号进行恢复。仿真实验结果表明,所提方法具有很高的检测精度。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

14.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

17.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号