This paper discusses a transport protocol and its formal description techniques for local network. The transport layer function, the transport services and a transport protocol design in a local network architecture m...This paper discusses a transport protocol and its formal description techniques for local network. The transport layer function, the transport services and a transport protocol design in a local network architecture model are presented. A transport protocol specification using the finite state automata (FSA) is given. The correctness of the protocol is verified by using the reachability tree technique with respect to the protocol properties of completeness, deadlock and livelock freeness, termination and reachability.展开更多
The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and...The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.(展开更多
Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description met...Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description methods. This paper presents a new hybrid formal method for communication protocol specification. In this method, finite state machine (FSM), communication sequential process (CSP) and abstract data type (ADT) are mixed and the best features of these approaches are offered. In this paper, the main formal description techniques (FDT) for protocol engineering are brieny introduced and a hybrid formal description method based on the FSM, CSP and ADT for communication protocol is described. Finally, this paper presents the formal specification of an example protocol for LAN by using the proposed hybrid formal method. The results of studies show that the hybrid formal description method for communication protocol is an available and effective approach.展开更多
To improve the current GIS functions in describing geographic objects with fuzziness,this paper begins with a discussion on the distance measure of spatial objects based on the theory of sets and an introduction of di...To improve the current GIS functions in describing geographic objects with fuzziness,this paper begins with a discussion on the distance measure of spatial objects based on the theory of sets and an introduction of dilation and erosion operators.Under the assumption that changes of attributes in a geographic region are gradual,the analytic expressions for the fuzzy objects of points,lines and areas,and the description of their formal structures are presented.The analytic model of geographic objects by means of fuzzy fields is developed.We have shown that the 9-intersection model proposed by Egenhofer and Franzosa (1991) is a special case of the model presented in the paper.展开更多
The aims of this paper are to helpunderstand the dendritic cells algorithm (DCA) and re- duce the potential incorrect applications and implementations, to clearly present the formal descrip- tion of the dendritic ce...The aims of this paper are to helpunderstand the dendritic cells algorithm (DCA) and re- duce the potential incorrect applications and implementations, to clearly present the formal descrip- tion of the dendritic cells algorithm, and to theoretically deduce the algorithm' s runtime complexity and detection performance. The entire dendritic cells population of the algorithm is specified using quantitative measures at the functional level. Basic set theory and computational functions, such as addition, multiplication and recursion, are used for clarity and definition, and theoretical analysis is implemented via introduction of three runtime variables in terms of three phases of the algorithm. Consequently, the data structures, procedural operations and pseudocode description of the dendrit- ic cells algorithm are given. The standard DCA achieves a lower bound of ^(n) runtime complexity and an upper bound of O( n2) runtime complexity under the worst case. In addition, the algorithm' s runtime complexity can be improved to O (max( nN, nS)) by utilizing segmentation approach, where n is the number of input instances, N is the population size and 8 is the size of each segment.展开更多
With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature ...With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.展开更多
In this paper we develop several new refinement relations of Z for multiple viewpoints oriented requirements method (MVORM). The original motivation is that we found the standard Z refinement relation is not adequate ...In this paper we develop several new refinement relations of Z for multiple viewpoints oriented requirements method (MVORM). The original motivation is that we found the standard Z refinement relation is not adequate or correct when considering specifications that have temporal relationships of operations. The concept of temporal state variables is introduced into Z. Then new implementation relations are defined and new refinement relations are deduced, mainly for temporal state variables to process temporal relationships of operations. We use state transition systems to abstract the temporal state transitions. A simple example is used to show the procedures of MVORM. Finally some directions of further work are forwarded.展开更多
With the development of researches on the classification quality of remote sensing images, researchers thought that uncertainty is the main factor that influences classification quality. This study puts forward an app...With the development of researches on the classification quality of remote sensing images, researchers thought that uncertainty is the main factor that influences classification quality. This study puts forward an approach to uncertainty repre- sentation, which is developed from two aspects: formalized description and comprehensive evaluation. First, we complete the classification using fuzzy surveillance approach, taking it as a formalized description of classification uncertainty. Then we in- troduce a hybrid entropy model for classification uncertainty evaluation, which can meet the requirement of comprehensive reflection of several uncertainties, while constructing the evaluation index from pixel scale with the full consideration of the different contribution to the error rate of each pixel. Finally, an application example will be studied to examine the new method. The result shows that the evaluation results fully reflect the classification quality, when compared with the conventional evaluation method which constructs models from unitary uncertainty and category scale.展开更多
文摘This paper discusses a transport protocol and its formal description techniques for local network. The transport layer function, the transport services and a transport protocol design in a local network architecture model are presented. A transport protocol specification using the finite state automata (FSA) is given. The correctness of the protocol is verified by using the reachability tree technique with respect to the protocol properties of completeness, deadlock and livelock freeness, termination and reachability.
文摘The distributed denial of service (DDoS) attack is one of the dangers in intrusion modes. It's difficult to defense and can cause serious damage to the system. Based on a careful study of the attack principles and characteristics, an object-oriented formalized description is presented, which contains a three-level framework and offers full specifications of all kinds of DDoS modes and their features and the relations between one another. Its greatest merit lies in that it contributes to analyzing, checking and judging DDoS. Now this formalized description has been used in a special IDS and it works very effectively.(
文摘Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description methods. This paper presents a new hybrid formal method for communication protocol specification. In this method, finite state machine (FSM), communication sequential process (CSP) and abstract data type (ADT) are mixed and the best features of these approaches are offered. In this paper, the main formal description techniques (FDT) for protocol engineering are brieny introduced and a hybrid formal description method based on the FSM, CSP and ADT for communication protocol is described. Finally, this paper presents the formal specification of an example protocol for LAN by using the proposed hybrid formal method. The results of studies show that the hybrid formal description method for communication protocol is an available and effective approach.
基金agrantfromtheNationalNaturalScienceFoundationof China (No .4980 1 0 1 6)
文摘To improve the current GIS functions in describing geographic objects with fuzziness,this paper begins with a discussion on the distance measure of spatial objects based on the theory of sets and an introduction of dilation and erosion operators.Under the assumption that changes of attributes in a geographic region are gradual,the analytic expressions for the fuzzy objects of points,lines and areas,and the description of their formal structures are presented.The analytic model of geographic objects by means of fuzzy fields is developed.We have shown that the 9-intersection model proposed by Egenhofer and Franzosa (1991) is a special case of the model presented in the paper.
基金Supported by the National Natural Science Foundation of China(61240023)
文摘The aims of this paper are to helpunderstand the dendritic cells algorithm (DCA) and re- duce the potential incorrect applications and implementations, to clearly present the formal descrip- tion of the dendritic cells algorithm, and to theoretically deduce the algorithm' s runtime complexity and detection performance. The entire dendritic cells population of the algorithm is specified using quantitative measures at the functional level. Basic set theory and computational functions, such as addition, multiplication and recursion, are used for clarity and definition, and theoretical analysis is implemented via introduction of three runtime variables in terms of three phases of the algorithm. Consequently, the data structures, procedural operations and pseudocode description of the dendrit- ic cells algorithm are given. The standard DCA achieves a lower bound of ^(n) runtime complexity and an upper bound of O( n2) runtime complexity under the worst case. In addition, the algorithm' s runtime complexity can be improved to O (max( nN, nS)) by utilizing segmentation approach, where n is the number of input instances, N is the population size and 8 is the size of each segment.
基金Supported bythe 863 High Technology Foundationof China (2004AA112040) and the National Natural Foundation ofChina (60473098)
文摘With the development of middleware technology, there are some new features to be adopted on demand in middleware platform based on container component. Aiming at the adaptation of middleware platform, from the nature of component container, this paper begins with behaviors features of EJB (Enterprise Java Bean) container, extracts general behaviors protocol of container, and defines its formal behaviors specification. In the end, the interactive relationship of components is described by WRIGHT language, and the configuration of whole system is shown. The method proposed in this paper mines the hidden features of framework of component container, and applies to refactor middleware platform in reflection and aspect-oriented programming technology.
基金Supported by Natural Science Foundation of Hubei Province (98J0 75 ) Ziqiang Technical Innovation Foundation ofWuhan Universi
文摘In this paper we develop several new refinement relations of Z for multiple viewpoints oriented requirements method (MVORM). The original motivation is that we found the standard Z refinement relation is not adequate or correct when considering specifications that have temporal relationships of operations. The concept of temporal state variables is introduced into Z. Then new implementation relations are defined and new refinement relations are deduced, mainly for temporal state variables to process temporal relationships of operations. We use state transition systems to abstract the temporal state transitions. A simple example is used to show the procedures of MVORM. Finally some directions of further work are forwarded.
基金Supported by the Provincial Science Research Program in Hubei Province of China (No. ETZ2007A03)
文摘With the development of researches on the classification quality of remote sensing images, researchers thought that uncertainty is the main factor that influences classification quality. This study puts forward an approach to uncertainty repre- sentation, which is developed from two aspects: formalized description and comprehensive evaluation. First, we complete the classification using fuzzy surveillance approach, taking it as a formalized description of classification uncertainty. Then we in- troduce a hybrid entropy model for classification uncertainty evaluation, which can meet the requirement of comprehensive reflection of several uncertainties, while constructing the evaluation index from pixel scale with the full consideration of the different contribution to the error rate of each pixel. Finally, an application example will be studied to examine the new method. The result shows that the evaluation results fully reflect the classification quality, when compared with the conventional evaluation method which constructs models from unitary uncertainty and category scale.