会议名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)
会议时间:
2008-07-27
会议地点:
大连
会议论文集名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)论文集
摘要:
This paper presents a method of making network testing system which is used for network performance testing or security system testing and evaluating. The model of this system is designed and implemented and the Libnet is used to build network packet and generate the network traffic in this testing system. The principle of Libnet is discussed and the progress of making the network protocol packets by using Libnet is provided. The method of making amount of protocol packets is presented. An experiment is provided and it shows that it is more portable and flexible.
期刊:
ADVANCES IN MATRIX THEORY AND ITS APPLICATIONS, VOL 1: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON MATRIX THEORY AND ITS APPLICATIONS,2008年:51-54
通讯作者:
Gao, Zunhai
作者机构:
[Gao, Zunhai; Zhao, Kai; Jiang, Qin] Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
通讯机构:
[Gao, Zunhai] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
摘要:
A class of special matrices, examples of Hankel matrix, Toeplitz matrix and r-circulant matrix, are viewed as controllability matrices of linear systems. And their properties are discussed. The invertible condition and the algorithms for finding inverse matrices are obtained. A new method to study these special matrices is presented.
期刊:
2008 INTERNATIONAL SEMINAR ON FUTURE INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING, PROCEEDINGS,2008年:608-611
作者机构:
[Chen Xin; Gao Quan-sheng] Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
摘要:
The optimal parameters of candidate measures established by importance sampling are usually obtained by minimizing the quadratic criterion. To begin with, in this paper a scheme is developed for finding the alternative measure that is optimal in the sense that the p-order relative moment is minimized. Secondly, a necessary and sufficient condition for asymptotic efficiency of the optimal change of drift is demonstrated. Lastly, the change of drift is selected through Robbins-Monro type algorithm. When pricing options via Monte Carlo simulations, several numerical examples contrasting different p values that illustrate the efficiency of the proposed method are also included, as well as an interpretation of their different performances in terms of strike prices.
会议名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)
会议时间:
2008-07-27
会议地点:
大连
会议论文集名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)论文集
关键词:
MIPS;Data Flow;Data Path;Pipeline
摘要:
In this paper, we analyze MIPS instruction format, instruction data path, decoder module function and design theory based on RISC CPUT instruction set. Furthermore, we design instruction fetch(IF) module of 32-bit CPU. based on RISC CPU instruction set. Function of IF module mainly includes fetch instruction and latch module, address arithmetic module, check validity of instruction module, synchronous control module. Function of IF modules are implemented by pipeline and simulated successfully on QuartusII.
会议名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)
会议时间:
2008-07-27
会议地点:
大连
会议论文集名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)论文集
摘要:
This paper presents a method of converting relational database into XML documents, that is de-normalization and synthesis. Both the principle and implementation of the method are discussed. This method involves three steps. Firstly, we revert the normal relation schema to original unnormal one without the functional dependency, transfer functional dependency, multivalued dependency and join dependency. These unnormal relation tables are called connection tables. Then the connection tables are changed to XML documents and XML tree. In the end, all those XML documents are merged. According to the principle, the method is implemented in the case of bank loan. In this example, the data demonstrate the validity and feasibility of the method.
摘要:
The architecture of network intrusion detection system based on network protocol analysis on Linux is provided. The design methods and realization technology of every module are discussed and implemented. The network intrusion detection theory and the IRDL (Intrusion Rules Description Language) based on the network protocol analysis is studied in detail.
摘要:
Floating-Point arithmetic unit is always key factor of restricting microprocessor performance. This paper brings forward a scenario about Floating-Point addition and subtraction ALU which supports IEEE-754 standard. e scenario adopts 4-Level pipelining structure: 0 operation numbers check. match exponent, fraction arithmetic, result normalization and rounding. Each step can be act as a single module. Among these modules, there are some registers which can prepare correct data for next operation.
摘要:
Semantic grid, the cross field of semantic web and grid computing, has received significant attention recently. Our workgroup develops a resource management semantic grid—— RM-Grid to enhance information process accuracy and efficiency in semantic heterogeneity environment. This paper describes the architecture of RM-grid, mainly introduces the data translation service of RM-Grid. It puts forward an ontology based common semantic model and an XML based data model, presents the data translation algorithm between different data sources and an adapter framework for accessing distributed heterogeneous resources as well.
摘要:
With the development of computer technology, PCI peripheral bus is the most popular bus in the Pentium computer because of its excellent performance. But PCI bus criterion is so complicated that it is difficult to do interface decode. PCI data and address time division multiplex and their operation is synchronized with 33MHZ bus clock. Firstly, this paper introduces PCI bus fundamental theory and interface implementation schemes simply. In allusion to PCI interface circuit implement's complication, the paper introduces AMCCS5933 interface chip scheme, and expatiates AMCCS5933 internal structure, working theory. data transfer mode, function characteristics, interface driver and its application in PCI card design with details.
通讯机构:
[Tong, Xiao-Jun] W;[Tong, Xiao-Jun] H;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430074, Peoples R China.;Huazhong Univ Sci & Technol, Dept Control Sci & Engn, Wuhan 430074, Peoples R China.
会议名称:
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
会议时间:
2007-08-19
会议地点:
香港
会议论文集名称:
第六届机器学习与控制论国际会议
关键词:
the structure of pan-operation;semi-group;commutative isotonic semi-ring
摘要:
Based on semi-group theory, special properties of identity element and the idempotent of pan-multiplication, the case of idempotent pan-additions are studied. Our results show the "open problem" posted by Mesiar and Rybarik in 1995 has been settled.
通讯机构:
[Lei, Yun] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430074, Peoples R China.
关键词:
TMS320DM642;video port;video surveillance
摘要:
In this paper, aiming at the needs of high stable and robust digital image capture system, considering the continuously upgrades of processor core, we introduce the architecture and functions of a real time multi-channel digital image capture System based on TMS320DM642, in the system, we emphasizes the hardware design and realization, Philips's SAA7121H and TI's TVP5150 are used to form video channel. We described the details of Video Port hardware design. Then analysis the system's application foreground, the system can be used in varied application field such as medical image process, video surveillance, the system is shown by experiments to have high performance and powerful expansibility.
通讯机构:
[Tong, Xiaojun] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430074, Peoples R China.
关键词:
digital image;entropy;fuzzy bandwidth;threshold segmentation
摘要:
We introduce entropy in fuzzy sets theory into digital image segmentation. According to the fuzzy character plane, firstly we get the segmentation threshold when the fuzzy bandwidth is given based on the maximal entropy principle. Then we develop the traditional binary segmentation to multi-value fuzzy segmentation, make modification of the threshold based on the multi-value fuzzy segmentation. When the difference between the object and the background is great, take the image 'Cameraman' for example, this method can effectively extract the object; When the difference between the object and the background is not great, take the image 'Lena' for example, this method can show plenty of edge information.
会议名称:
8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing/3rd ACIS International Workshop on Self-Assembling Wireless Networks
摘要:
Constructing an effective translation between different representations is the key point to overcome semantic heterogeneity in information integration systems. This paper puts forward an ontology based information representation architecture-SOSRA. It introduces a GAV (global as view) approach to solve the mapping between heterogeneous semi-structured data in the form of service, discusses the semantic representation algorithm and semantic mapping strategy emphatically. The implementation of SOSRA and its application to semantic integration system is given at the end of this paper to enhance information process accuracy and efficiency.
摘要:
This paper analyses structure and algorithm of Floating-Point ALU, and implements multiplication and division operation in the homo-hardware circuit. The Floating-Point multiplication and division ALU supports Floating-Point number according with IEEE-754 standard. This ALU adopts 4-Level pipelining structure: '0' operation number check, exponent addition and subtraction operation, fraction multiplication and division operation, result normalization and round. Each step can act as a single module. Among these modules, there are some registers which can prepare necessary data for next operation.
期刊:
Proceedings of 2006 International Conference on Machine Learning and Cybernetics, Vols 1-7,2006年:1875-1878
通讯作者:
Tong, Xiao-Jun
作者机构:
[Kang, Zhou; Tong, Xiao-Jun; Huang, Qiu-Ming] Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430074, Peoples R China.
通讯机构:
[Tong, Xiao-Jun] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430074, Peoples R China.
会议名称:
2006 International Conference on Machine Learning and Cybernetics(IEEE第五届机器学习与控制论坛)
会议时间:
2006-08-13
会议地点:
大连
会议论文集名称:
IEEE第五届机器学习与控制论国际会议
关键词:
fuzzy set;sigma-entropy;the structure of entropy of fuzzy set
摘要:
Based on special additivity of sigma-entropy and proposition of monotone function, we study the structure of a-entropy of fuzzy set. At first, we describe the structure of a-entropy. Then, with this structure in place, we derive primary propositions of sigma-entropy, and a conclusion of the entropy under l(p)-distance, that is, this entropy of fuzzy set has sigma-additivity only if p equals 1.
摘要:
Outlier detection is a key element for intelligent financial surveillance systems which intend to identify fraud and money laundering by discovering unusual customer behaviour pattern. The detection procedures generally fall into two categories: comparing every transaction against its account history and further more, comparing against a peer group to determine if the behavior is unusual. The later approach shows particular merits in efficiently extracting suspicious transaction and reducing false positive rate. Peer group analysis concept is largely dependent on a cross-datasets outlier detection model. In this paper, we propose a new cross outlier detection model based on distance definition incorporated with the financial transaction data features. An approximation algorithm accompanied with the model is provided to optimize the computation of the deviation from tested data point to the reference dataset. An experiment based on real bank data blended with synthetic outlier cases shows promising results of our model in reducing false positive rate while enhancing the discriminative rate remarkably.