In order to effectively solve the dead-zone and low-precision of T-shaped transmission line fault location,a new T-shaped transmission line fault location algorithm based on phase-angle jump checking is proposed in th...In order to effectively solve the dead-zone and low-precision of T-shaped transmission line fault location,a new T-shaped transmission line fault location algorithm based on phase-angle jump checking is proposed in this paper.Firstly,the 3-terminal synchronous fundamental positive sequence voltage and current phasors are extracted and substituted into the fault branch distance function to realize the selection of fault branch when the fault occurs;Secondly,use the condition of the fundamental positive sequence voltage phasor at the fault point is equal to calculate all roots(including real root and virtual roots);Finally,the phase-angle jump check function is used for checking calculation,and then the only real root can be determined as the actual fault distance,thereby achieving the purpose of high-precision fault location.MATLAB simulation results show that the proposed new algorithm is feasible and effective with high fault location accuracy and good versatility.展开更多
In this paper, we propose a Smooth Quantile Boost Classification (SQBC) algorithm for binary classification problem. The SQBC algorithm directly uses a smooth function to approximate the “check function” of the quan...In this paper, we propose a Smooth Quantile Boost Classification (SQBC) algorithm for binary classification problem. The SQBC algorithm directly uses a smooth function to approximate the “check function” of the quantile regression. Compared to other boost-based classification algorithms, the proposed algorithm is more accurate, flexible and robust to noisy predictors. Furthermore, the SQBC algorithm also can work well in high dimensional space. Extensive numerical experiments show that our proposed method has better performance on randomly simulations and real data.展开更多
The deflection routing protocol is an effective contention resolution in Optical Burst Switching network, However, it can worsen loss performance of non-deflected burst on the deflection route. To improve the burst lo...The deflection routing protocol is an effective contention resolution in Optical Burst Switching network, However, it can worsen loss performance of non-deflected burst on the deflection route. To improve the burst loss performance, a limited deflection routing scheme based on burst loss threshold is proposed to prevent injudicious deflection routing. By using threshold check function, it restrainedly allows the deflected burst to preemptive network resource, consequently, improve the QoS performance of non-deflected burst. Simulation results show that the scheme can efficiently prevent deflected burst contending with non-deflected burst on deflection route, and effectively improve the burst loss performance of entire networks.展开更多
The Linux kernel adopts a large number of security checks to prevent security-sensitive operations from being executed under unsafe conditions.If a security-sensitive operation is unchecked,a missing-check issue arise...The Linux kernel adopts a large number of security checks to prevent security-sensitive operations from being executed under unsafe conditions.If a security-sensitive operation is unchecked,a missing-check issue arises.Missing check is a class of severe bugs in software programs especially in operating system kernels,which may cause a variety of security issues,such as out-of-bound accesses,permission bypasses,and privilege escalations.Due to the lack of security specifications,how to automatically identify security-sensitive operations and their required security checks in the Linux kernel becomes a challenge for missing-check analysis.In this paper,we present an accurate missing-check analysis method for Linux kernel,which can automatically infer possible security-sensitive operations.Particularly,we first automatically identify all possible security check functions of Linux.Then according to their callsites,a two-direction analysis method is leveraged to identify possible security-sensitive operations.A missing-check bug is reported when the security-sensitive operation is not protected by its corresponding security check.We have implemented our method as a tool,named AMCheX,on top of the LLVM(Low Level Virtual Machine)framework and evaluated it on the Linux kernel.AMCheX reported 12 new missing-check bugs which can cause security issues.Five of them have been confirmed by Linux maintainers.展开更多
基金supported by National Nature Science Foundation of China(51507031).
文摘In order to effectively solve the dead-zone and low-precision of T-shaped transmission line fault location,a new T-shaped transmission line fault location algorithm based on phase-angle jump checking is proposed in this paper.Firstly,the 3-terminal synchronous fundamental positive sequence voltage and current phasors are extracted and substituted into the fault branch distance function to realize the selection of fault branch when the fault occurs;Secondly,use the condition of the fundamental positive sequence voltage phasor at the fault point is equal to calculate all roots(including real root and virtual roots);Finally,the phase-angle jump check function is used for checking calculation,and then the only real root can be determined as the actual fault distance,thereby achieving the purpose of high-precision fault location.MATLAB simulation results show that the proposed new algorithm is feasible and effective with high fault location accuracy and good versatility.
文摘In this paper, we propose a Smooth Quantile Boost Classification (SQBC) algorithm for binary classification problem. The SQBC algorithm directly uses a smooth function to approximate the “check function” of the quantile regression. Compared to other boost-based classification algorithms, the proposed algorithm is more accurate, flexible and robust to noisy predictors. Furthermore, the SQBC algorithm also can work well in high dimensional space. Extensive numerical experiments show that our proposed method has better performance on randomly simulations and real data.
基金This workis supported by project of National Science Foundation of China (No.90304004) , National"863"Project Plan (No.2005AA122310) , Keyproject of Science and Technology of National Education Department (No.204125) , project of Science Foundation of Chongqing Science and Technology Commission(No.2005BB2062) , Youth Science and Technology Grant of CQUPT(No.A2005-28) .
文摘The deflection routing protocol is an effective contention resolution in Optical Burst Switching network, However, it can worsen loss performance of non-deflected burst on the deflection route. To improve the burst loss performance, a limited deflection routing scheme based on burst loss threshold is proposed to prevent injudicious deflection routing. By using threshold check function, it restrainedly allows the deflected burst to preemptive network resource, consequently, improve the QoS performance of non-deflected burst. Simulation results show that the scheme can efficiently prevent deflected burst contending with non-deflected burst on deflection route, and effectively improve the burst loss performance of entire networks.
基金supported by the National Nature Science Foundation of China under Grant Nos.61802415,62032019 and 62032024.PDF(PC)23。
文摘The Linux kernel adopts a large number of security checks to prevent security-sensitive operations from being executed under unsafe conditions.If a security-sensitive operation is unchecked,a missing-check issue arises.Missing check is a class of severe bugs in software programs especially in operating system kernels,which may cause a variety of security issues,such as out-of-bound accesses,permission bypasses,and privilege escalations.Due to the lack of security specifications,how to automatically identify security-sensitive operations and their required security checks in the Linux kernel becomes a challenge for missing-check analysis.In this paper,we present an accurate missing-check analysis method for Linux kernel,which can automatically infer possible security-sensitive operations.Particularly,we first automatically identify all possible security check functions of Linux.Then according to their callsites,a two-direction analysis method is leveraged to identify possible security-sensitive operations.A missing-check bug is reported when the security-sensitive operation is not protected by its corresponding security check.We have implemented our method as a tool,named AMCheX,on top of the LLVM(Low Level Virtual Machine)framework and evaluated it on the Linux kernel.AMCheX reported 12 new missing-check bugs which can cause security issues.Five of them have been confirmed by Linux maintainers.