关键词:
Remote OS detection;TCP/IP fingerprinting;ICMP detection;Libnet
摘要:
In this paper, the remote operating system detection is discussed and some detection methods which contain active detection and passive detection are studied and compared. The implement of remote operating system detection based on Libnet is provided and the architecture of total system is presented. The principle of Libnet is studied and it can improve detection performance and scalability. The detection that combines TCP/IP fingerprinting with ICMP detection is used in the scanning system and it can get high accuracy of remote operating system detection.
摘要:
Hilditch thinning algorithm is widely used in image pre-processing process. In this paper, we propose an improved Hilditch algorithm to acquire a more stable output. We conclude that the skeletons obtained from our algorithms give better results in Chinese characters and numbers. The advantage of this algorithm corrects the beard by modifying the warp in the part of intersection.
期刊:
DCABES 2009: THE 8TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE, PROCEEDINGS,2009年:382-385
会议名称:
第八届分布式计算及其应用国际学术研讨会(The 8th International Symposium on Distributed Computing and Applications to Business,Engineering and Science)
会议时间:
2009-10-16
会议地点:
武汉
会议论文集名称:
第八届分布式计算及其应用国际学术研讨会(The 8th International Symposium on Distributed Computing and Applications to Business,Engineering and Science)论文集
关键词:
Static Analysis;Defects Description;Syntax Tree Matching
摘要:
As an important software defects analysis method, static analysis is wildly used in software coding and test. But this traditional method is inextensible and inefficient that users have to find defects artificially. A framework is implemented to locate defects called DDS(Defects description system) and an annotation Language was designed to describe defects which named DDL(Defects Description Language). The rules written in DDL will be saved in rule set and can be used by DDS to locate the defects automatically. The experimental results demonstrate that the method is available to identify defects in programs.
通讯机构:
[Tong, Xiaojun] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430074, Peoples R China.
关键词:
FCM;the feature weigh;the center of clustering
摘要:
In the traditional fuzzy C-Means algorithm, each feature relationship and so on. However, owing to various of the samples plays a uniform contribution for clustering. But in fact due to the feature selection are not perfect, and their scalarization have some blindness, each feature of the feature vector is not uniform for clustering contribution, so we have to take into account the different effect of each feature seriously. In this paper, we get a method for calculating the feature weight based on the feature contribution balance principle and the most separate degree principle of intra-cluster. By the IRIS example, we find that the calculation method for weight can not only enhance the calculation speed, and also make the clustering result better than the existing result.
通讯机构:
[Tong, Xiaojun] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
会议名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)
会议时间:
2008-07-27
会议地点:
大连
会议论文集名称:
2008年国际电子商务、工程及科学领域的分布式计算和应用学术研讨会(2008 International Symposium on Distributed Computing and Applications for Business Engineering and Science)论文集
摘要:
This article first used four steps of the compatible examination, the diversity examination, the relevant examination and the principal components analyzes to screen the handwritten digit Zernike moment, then we make use of the Fuzzy C-Mean cluster recognition of the hand-written numerals based on the screened Zernike moment. The example testified this method effective, and provides the theory basis for further establishment of the hand-written numeral recognition standard library. In this process, we have also discovered two reasons which cause the Fuzzy C-Mean cluster to be unefficient.
期刊:
2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31,2008年:10758-10763
通讯作者:
Gao, Quansheng
作者机构:
[Gao, Quansheng] Wuhan Polytech Univ, Dept Math & Phys, Wuhan, Peoples R China.
通讯机构:
[Gao, Quansheng] W;Wuhan Polytech Univ, Dept Math & Phys, Wuhan, Peoples R China.
会议名称:
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)
会议时间:
2008-10-12
会议地点:
大连
会议论文集名称:
The 4th International Conference on Wireless Communications, Networking and Mobile Computing(第四届IEEE无线通信、网络技术及移动计算国际会议)论文集
关键词:
coherent risk measure;importance sampling;ranking and selection
摘要:
Importance sampling is always used to modify the probabilities for rare event occurrences that govern the outcomes of the simulation in a way that allows for low probability events to occur more frequently. In this paper, importance sampling is applied to accelerate the simulation for coherent risk measure based on generalized rare scenarios. Firstly, we show how to combine importance sampling with ranking and selection method provided by Lesnevski, Nalson and Staum to accelerate simulation coherent risk measure directly. Secondly, recursive Robbins-Monro type algorithm is introduced to estimate the parameters of optimal sampling distributions. Finally, computational efficiency of simulated confidence intervals for coherent risk measure is discussed under three simulation settings: Asian call option, Asian options on partial average, down-and-in barrier call option.
摘要:
Infinite generalized block Hankel matrix is associated with controllability matrix and transfer function matrix of multi-input and multi-output linear system, the finite rank and decomposition of infinite generalized block Hankel matrix are discussed, it is obtained the necessary and sufficient condition of that infinite generalized block Hankel matrix has finite rank and that any infinite. generalized block Hankel matrix could be decomposed a product of two matrices, which are the infinite block observability matrix and the infinite block controllability matrix of the minimal realization system in its corresponding strictly proper rational fraction function matrix. In addition, the invertibility of finite block Hankel matrix is also discussed. A new method to study this class of matrices and their relative matrices is presented.
摘要:
The objective of this paper is to study the effect of efficient importance sampling (EIS) techniques on simulating the distribution-invariant convex risk measures: utility-based shortfall risk measures (USR). We firstly introduce EIS to simulate USR based on nonlinear Generalized Least Squares and demonstrate how to choose a candidate density in the context of multi-normal distributions. After presenting the construction of our algorithm, we apply our efficient scheme for calculating Entropic risk measure under the setting of the mixed Poisson model of CreditRisk(+). We furthermore make an improvement for EIS so that we can calculate USR with piecewise polynomial function loss functions. Finally, the method is applied to an example to demonstrate its performance and flexibility.
摘要:
The objective of knowledge processing system is to promote knowledge integration, sharing and retrieval in distributed and heterogeneous environment. This paper Puts forward an ontology-based model-OBKPM for knowledge processing, which promises better access to relevant knowledge by producing a global domain ontology that is used for establishing semantic connections among the local ontologies of autonomous knowledge sources as well as for retrieving those sources. In OBKPM, a bottom-up integration approach with two-stage mapping process is proposed to solve both the semantic heterogeneities and the query answering problems. In this approach, local ontologies and the global ontology are all treated in graph-based representation, and the overall integration and access process will be briefly illustrated through examples.
摘要:
This paper introduces architecture and feature of 32-bit micro-processor, and describes internal data path in processor. Through analysis of function and theory of RISC CPU instruction decoder module, we design instruction decoder (ID) module of 32-bit CPU by pipeline theory. The instruction decoder includes register file, write back data to register file, sign bit extend, relativity check, and it is simulated on QuartusII successfully. Static time sequence shows the instruction decode module completing required function.
期刊:
2008 INTERNATIONAL CONFERENCE ON RISK MANAGEMENT AND ENGINEERING MANAGEMENT, ICRMEM 2008, PROCEEDINGS,2008年:536-541
通讯作者:
Gao, Q.-S.(gqsh0101@yahoo.com.cn)
作者机构:
[Gao Quan-sheng] Wuhan Polytech Univ, Dept Math & Phys, Wuhan 430023, Peoples R China.
通讯机构:
Department of Mathematics and Physics, Wuhan Polytechnic University, China
摘要:
A framework of combining importance sampling with Structured Database Monte Carlo strategy is developed. The proposed method attempts to devise a generic method for designing importance sampling method. Firstly, evaluation function and objective function are expressed in a way that there is a linear relation between response estimator and majorized function. Order structure is imposed not only on sample paths but also on parameters of candidate density. Then the parameters are estimated by surrogate maximization algorithm. Secondly, cut-off point at which response function can maintain the same sample paths structure is obtained. Based on the low quadratic bound principle and the convexity of the second moment of the estimator, a quadratic surrogate function for objective function is derived. Finally, empirical results show that our approach is straightforward to implement and flexible to be applied in a generic Monte Carlo setting.
摘要:
This paper first shows the relationship and its characteristics of logistics outsourcing based on the supply chain management environment. According to the theory of interface management, the interrelation in logistics outsourcing is treated as a kind of interface. After analyzing the all kinds of interface in logistic outsourcing, the relationship of them is expounded, and corresponding methods, measures are put forward.