It always adopts the direct hierarchy analysis to value the exploitation conditions of surface mining areas. This way has some unavoidable shortcomings because it is mainly under the aid of experts and it is affected ...It always adopts the direct hierarchy analysis to value the exploitation conditions of surface mining areas. This way has some unavoidable shortcomings because it is mainly under the aid of experts and it is affected by the subjective thinking of the experts. This paper puts forwards a new approach that divides the whole exploitation conditions into sixteen subsidiary systems and each subsidiary system forms a neural network system. The whole decision system of exploitation conditions of surface mining areas is composed of sixteen subsidiary neural network systems. Each neural network is practiced with the data of the worksite, which is reasonable and scientific. This way will be a new decision approach for exploiting the surface mining areas.展开更多
Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are in...Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks.展开更多
文摘It always adopts the direct hierarchy analysis to value the exploitation conditions of surface mining areas. This way has some unavoidable shortcomings because it is mainly under the aid of experts and it is affected by the subjective thinking of the experts. This paper puts forwards a new approach that divides the whole exploitation conditions into sixteen subsidiary systems and each subsidiary system forms a neural network system. The whole decision system of exploitation conditions of surface mining areas is composed of sixteen subsidiary neural network systems. Each neural network is practiced with the data of the worksite, which is reasonable and scientific. This way will be a new decision approach for exploiting the surface mining areas.
基金supported by Natural Science Foundation of China under award No.61303024Natural Science Foundation of Jiangsu Province under award No.BK20130372+3 种基金National 973 Program of China under award No.2014CB340600National High Tech 863 Program of China under award No.2015AA016002supported by Natural Science Foundation of China under award No.61272452supported in part by ARO Grant # W911NF-12-1-0286 and NSF Grant #1111925
文摘Despite the tremendous effort made by industry and academia,we are still searching for metrics that can characterize Cyberspace and system security risks. In this paper,we study the class of security risks that are inherent to the dependence structure in software with vulnerabilities and exhibit a "cascading" effect. We present a measurement framework for evaluating these metrics,and report a preliminary case study on evaluating the dependence-induced security risks in the Apache HTTP Server. The experiment results show that our framework can not only clearly analyze the root cause of the security risks but also quantitatively evaluate the attack consequence of the risks.