期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
A graph theory model using human nature structure
1
作者 Liu Jia Hu Haimiao +2 位作者 duan miyi Li Wenfa Yuan Jiazheng 《High Technology Letters》 EI CAS 2017年第4期350-359,共10页
A graph theory model of the human nature structure( GMH) for machine vision and image/graphics processing is described in this paper. Independent from the motion and deformation of contours,the human nature structure(... A graph theory model of the human nature structure( GMH) for machine vision and image/graphics processing is described in this paper. Independent from the motion and deformation of contours,the human nature structure( HNS) embodies the most basic movement characteristics of the body. The human body can be divided into basic units like head,torso,and limbs. Using these basic units,a graph theory model for the HNS can be constructed. GMH provides a basic model for human posture processing,and the outline in the perspective projection plane is the body contour of an image. In addition,the GMH can be applied to articulated motion and deformable objects,e. g.,in the design and analysis of body posture,by modifying mapping parameters of the GMH. 展开更多
关键词 articulated motion and deformable objects(AMDO) human nature structure(HNS) graph theory machine vision image/graphics processing
下载PDF
Intrusion detection based on system calls and homogeneous Markov chains 被引量:8
2
作者 Tian Xinguang duan miyi +1 位作者 Sun Chunlai Li Wenfa 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期598-605,共8页
A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain ... A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems. 展开更多
关键词 intrusion detection Markov chain anomaly detection system call.
下载PDF
Detecting network intrusions by data mining and variable-length sequence pattern matching 被引量:2
3
作者 Tian Xinguang duan miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期405-411,共7页
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux... Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 展开更多
关键词 intrusion detection anomaly detection system call data mining variable-length pattern
下载PDF
IMPROVING THE FREQUENCY RESOLUTION OF DIGITALLY SYNTHESIZED PERIODIC SIGNALS BY A SEQUENTIAL ADDRESSING SCHEME 被引量:2
4
作者 Tian Xinguang duan miyi +1 位作者 Sun Chunlai Chen Hong 《Journal of Electronics(China)》 2008年第5期661-666,共6页
In the digital synthesis of wideband periodic signals using an Arbitrary Waveform Gen-erator(AWG),the frequency resolution and spectral complexity of the synthesized signals are com-monly limited by the memory capacit... In the digital synthesis of wideband periodic signals using an Arbitrary Waveform Gen-erator(AWG),the frequency resolution and spectral complexity of the synthesized signals are com-monly limited by the memory capacity and clock frequency of the AWG.This paper proposes a novel sequential addressing scheme and then presents several sequences to improve the frequency resolution of the synthesized periodic signals without changing their spectral envelopes and basic time-domain characteristics under the condition of a fixed memory capacity and a fixed clock fre-quency.The main idea of the scheme is using the address generator in an AWG to program and produce addresses to read fixed waveform data in variable order,and thus to generate waveforms of various periods and profiles.The scheme is applied in simulating signal scenarios for military com-munication countermeasure experiments,and achieves high performance. 展开更多
关键词 Digital synthesis Frequency resolution Spectral envelope Sequential addressing
下载PDF
AN ITERATIVE ALGORITHM FOR OPTIMAL DESIGN OF NON-FREQUENCY-SELECTIVE FIR DIGITAL FILTERS 被引量:1
5
作者 Tian Xinguang duan miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Electronics(China)》 2008年第5期667-672,共6页
This paper proposes a novel iterative algorithm for optimal design of non-frequency-selective Finite Impulse Response(FIR) digital filters based on the windowing method.Different from the traditional optimization conc... This paper proposes a novel iterative algorithm for optimal design of non-frequency-selective Finite Impulse Response(FIR) digital filters based on the windowing method.Different from the traditional optimization concept of adjusting the window or the filter order in the windowing design of an FIR digital filter,the key idea of the algorithm is minimizing the approximation error by succes-sively modifying the design result through an iterative procedure under the condition of a fixed window length.In the iterative procedure,the known deviation of the designed frequency response in each iteration from the ideal frequency response is used as a reference for the next iteration.Because the approximation error can be specified variably,the algorithm is applicable for the design of FIR digital filters with different technical requirements in the frequency domain.A design example is employed to illustrate the efficiency of the algorithm. 展开更多
关键词 Finite Impulse Response (FIR) digital filters Optimal design Windowing method Approximation error Iterative algorithm
下载PDF
DDFS spurious signals due to amplitude quantization in absence of phase-accumulator truncation
6
作者 Tian Xinguang Liu Xin +1 位作者 Chen Hong duan miyi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期485-492,共8页
Spurious signals in direct digital frequency synthesizers (DDFSs) are partly caused by amplitude quantization and phase truncation, which affect their application to many wireless telecommunication systems. These si... Spurious signals in direct digital frequency synthesizers (DDFSs) are partly caused by amplitude quantization and phase truncation, which affect their application to many wireless telecommunication systems. These signals are deterministic and periodic in the time domain, so they appear as line spectra in the frequency domain. Two types of spurious signals due to amplitude quantization are exactly formulated and compared in the time and frequency domains respectively. Then the frequency spectra and power levels of the spurious signals due to amplitude quantization in the absence of phase-accumulator truncation are emphatically analyzed, and the effects of the DDFS parameter variations on the spurious signals are thoroughly studied by computer simulation. And several important conclusions are derived which can provide theoretical support for parameter choice and spurious performance evaluation in the application of DDFSs. 展开更多
关键词 spurious signal direct digital frequency synthesizer amplitude quantization phase truncation power level.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部