This paper proposes a two-phase intrusion detection algorithm in mixed attributes data stream——KDDCUP99-10% network intrusion data set. The algorithm gains the statistical information in data stream by the incremental clustering. Weighted fuzzy clustering is done based on the statistical information according to proposed weighted fuzzy cluster feature. The number of clusters for fuzzy clustering can change dynamically. Theoretical analysis and experimental results show the algorithm can detect the intrusion behaviors effectively.
This paper proposes a two-layer artificial emotion model has inborn level and learning level according to the emotion psychology theory. The inborn emotion is recurrence through matrix model of state machine to overcome the defect that “event-emotion-behavior” sequence pairs need storage space. A neural cell model named Lapicque is used to describe the transition of emotion state. Simulation result is presented.
In order to solve the problem that close military symbols may shelter each other while reducing scale of map in computer plotting, by analyzing the parameters of neighborhood, this paper uses Density-Based Spatial Clustering of Applications with Noise(DBSCAN) algorithm to seek the symbols sheltering each other, and uses plot instead of symbols in their centroid. Aiming at the shortcomings of DBSCAN algorithm, it proposes an improved algorithm named Based on Density and Irregular Region Clustering of Applications with Noise(BDIRCAN), which considers application conditions and changes the traditional circular neighborhood to the applied irregular polygonal neighborhood. Experimental result shows that BDIRCAN can solve the problem well and avoid clustering the symbols which stay near but do not shelter each other.
This paper designs a service-oriented computing model based on event-driven to solve the bottleneck of traditional Web service computing methods. The computing model adopts an event information component, which introduces the Event Driven Architecture(EDA) into the service oriented computing. EDA adapts and coordinates the invocation of each Web service, builds the semantic interoperability bridge between Web service, uses the complex event processing mechanism to process the information, and sends it to the SOA component. The Web service is presented to the interested subscribers to achieve dynamic collaboration.
This paper uses the Common Language Runtime(CLR), designs and implements a distributed software framework based on the common three-layer structure framework. This framework puts some codes of the business logic layer down to the DataBase Management System(DBMS), and adds the sub-layer of calling stored procedure which can reduce the data traffic of network and enhance the performance of the application in the distributed environment. It takes the expanding division-table module of the task time quota system in a large-scale manufacturing company as an example, expatiates the building process of this framework, and verifies the general adaptability of the framework in improving the running efficiency of the overall application.
Aiming at the problem of the limited power of sensor and redundancy of sensor data, this paper proposes a distributed space-time wavelet transform method which is based on the 5/3 integer wavelet and a package duplication strategy. Simulation experimental results show that the proposed method effectively reduces amount of data on the time and space orientation, and extends the network life by one-quarter compared with wavelet compression method using lifting.
P2P network becomes more and more popular due to its good scalability and robustness. However, because of anonymity and openness, P2P network also becomes an ideal environment for some malicious behaviors. This paper proposes a P2P reputation estimation mechanism based on power-law distribution for identifying good behaviors and resisting malicious behaviors. Simulation results show that computing reputation score for P2P by using the mechanism has less computing cost and better accuracy, it is adaptable to dynamics in peer joining and leaving and robust to disturbance by malicious peers.
Most of one-hop lookups have characteristic that operation amount of any two-node pair decreased with the increases of physical distance, such as multi-media service. This paper designs an efficient two-hop-worst P2P system, which can ensure any lookup is finished within two hops, also with reasonable bandwidth requirement and size of routing table. It applies the model in VoIP system, and finds some valuable results through analysis: in the VoIP system using the model, about 80% customers take one-hop-lookup service, and only about 20% customers take two-hop-lookup service.
QoS requirements are different in different services in middle-and-high-rate sensor networks. Aiming at the circumstance, this paper proposes a multi-parameter self-adaptive cross-layer scheduling algorithm based on Differentiated Services(DiffServ). By dynamically adjusting values of the two parameters of delay compensatory factor and throughput compensatory factor, it can meet the demands of smaller delay in real-time services and larger throughput in non-real-time services. Simulation results show that the algorithm can achieve compromise between system efficiency and users’ QoS satisfaction flexibly, and guarantee fairness among different users.
The Quality of Service(QoS) of Voice over Wireless Sensor Network(VoWSN) is a challenging task because of its large data and complex task processing. This paper summarizes the current research progresses of QoS routing protocols and Admission Control(AC) in WSN. Admission control may be classified into plane admission control and cluster-based admission control according to topological structure of network. The paper provides a new idea of QoS routing protocol combined with admission control for improving the quality of voice transmission over wireless network.
On the basis of the research on WSN in voice communication, this paper discusses a WSN voice communication scheme in which WSN node of JN5139 and CODEC WM8510 is hardware basis. It expounds the process of WSN-based voice communication and the software realization technique, proposes a performance evaluation system of WSN voice communication, and analyzes the results of evaluation based on the practicability criterion.
Aiming at the problem that shellcode threats the security of the operating system, this paper researches on the shellcode attack and the method against the attack. Principle, consisting and process of the shellcode attack are analysed. The GS and ALSR work against the shellcode attack, and the effect of the GS and ALSR protection mechanism is tested. Experimental results show that it needs some conditions when the attacker carries out the shellcode attack, and the new protection mechanism can limit this condition against the attack.
A novel algorithm for recovering depth of objects from defocus images is presented, based on the anisotropic heat diffusion model. The defocus process is modeled using the model of anisotropic heat diffusion. The depth recovery problem is converted into the energy functional minimum problem with a regularization term of total variation. The depth information of the object is obtained by iterative procedures. The algorithm avoids recovering a focus image and exerting excess restrictions. Experimental results show that the algorithm is valid with small error.
This paper proposes a face recognition algorithm based on classifiers fusion using fuzzy integral. Wavelet transform is taken on after an appropriate mother wavelet and decomposition layer are chosen by theory and simulation, and the low-frequency component coefficients of the last layer are extracted to make one classifier. 2DPCA is applied to make the other. Fuzzy integral is applied to reach the final decision. Experimental results show the algorithm can obtain complementary information and improve the classification capbility so as to promote the recognition performance.
Prediction of protein-protein interaction sites is a hotspot in current bioinformatics. This paper conducts evolutionary information and conserved score as feature functions based on the influential factors which are crucial to the states of protein interface residues. These kinds of information materialize the influence of short threads and long threads between ammonias of protein sequences. Maximum entropy model is used as the classifier for protein-protein interaction sites. Multi-source information is integrated into a single probability model. Experimental results show that compared with other machine learning methods, this method gets higher specificity by 2%~8% and higher accuracy rate by 3%~11% with higher correlation coefficient.
This paper proposes a new bionics optimization algorithm named Food Truck-Cockroach Swarm Optimization(FT-CSO). Food is thrown by food truck in solution space, and cockroaches crawl to the food and search for optimal solutions. Nest migration, food filtration and equality search are used to enhance global and local search ability of FT-CSO. Simulation experimental result shows that the algorithm has high optimization rate and convergence speed.
This paper proposes a dynamics visual servo method for robot’s grasping moving object. The motion object target position is detected and tracked by dual stereo vision. With CMAC network, a learning visual impedance controller taking the quadratic of vision impedance as training target is adopted. It promotes the adaptability of position controller of the system structure parameters, so the impedance parameters are optimized. Experimental results show that the dynamics characteristics are improved and a flexible trajectory control is obtained with the method.
Based on the study of the RapidIO interconnect standard and TCP/IP protocol, the RapidIO-IP architecture is designed, and the principle of END in VxWorks operating system and the working mechanism of RapidIO bus in SBC8641D platform are analyzed. While solving a number of key technologies which are needed to implement on END driver based on RapidIO bus, this paper implements RapidIO-IP successfully, and provides a basis for the application of RapidIO protocol in the embeded system.
This paper introduces a modeling and implementation procedure for a MIPS32/64 instruction set simulator using software programming method. It simulates the CPU hardware behavior using C++ program language. By choosing different option during the compile time, it can respectively simulate embedded processor MIPS32 and MIPS64 instruction set architecture, and it can decode and execute all the commands except float point commands. The main benefit of this method is that the code is reusable and has a good performance for extending commands.
This paper analyzes and defines application-oriented social networks, it proposes a new social network discovery algorithm through characteristic analysis of application-based communities on the basis of the results of traffic classification and identification. Typical case study is conducted on a real traffic dataset, result shows the effectiveness and efficiency of the algorithm. The algorithm is good for the community- based network operation management and measurement research.
By analyzing the problems while transmitting securities trading data, necessity of data compression is indicated. This paper proposes a hybrid arithmetic coding for messages of Securities Trading Exchange Protocol(STEP). The coding improves adaptive binary arithmetic coding by using template-based binarization scheme and independent source model. Experimental results show that hybrid arithmetic coding provides a much better compression ratio and slightly faster processing time than adaptive binary arithmetic coding.
Based on the analysis of needle forces and deflection, flexible needle insertion into soft tissue is modeled with virtual spring. The trajectory of the flexible needle body and tip is simulated with Matlab software in the different cases. The simulation results show that the elastic deformation of the flexible needle does not affect needle tip trajectory evidently, and the main factors of effects on needle tip trajectory are the controlling coordination of lengthways direction and the initial angle between needle base and level line. Considering the soft tissue deformation during flexible needle insertion, the theories proposed can be used in robot-assisted needle insertion steering, path planning and obstacle avoidance can be realized.
A new Independent Component Analysis(ICA) algorithm is introduced by histogram estimation and maximum likelihood estimation. When estimating the probability density function, the corresponding step function is smoothed using parameter . It is proved that depends on statistical characteristics of signals and total number of samples. Simulation results demonstrate that signal-to-interference ratio has significant improvement.
Considering that 802.11 DCF does not support any Quality of Service(QoS) for real-time traffic, this paper proposes a novel and simple priority-based backoff scheme to provide service differentiation according to different QoS requirements from different classes of traffic. For high-priority data flow, a strategy of reducing retransmissions is adopted. For low-priority data flow, an improved RWBO+BEB backoff algorithm is introduced to make the Probability Distribution of Slot Selection(PDoSS) even, and thus to reduce the packet collision probability. A Markov chain model is deployed and used to analyze and evaluate the mechanism performance. The mathematical analyses demonstrate that the proposed mechanism can support QoS in 802.11 DCF effectively, moreover, improve the overall system performance significantly.