The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteris...The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed.展开更多
This paper presents the method named acoustic holography which can be used to identify noise sources. A new formula of holography reconstruction is obtained, based on the Kirchhoff integral formula. Some simulating te...This paper presents the method named acoustic holography which can be used to identify noise sources. A new formula of holography reconstruction is obtained, based on the Kirchhoff integral formula. Some simulating tests are carried out using the new formula. The comparison with other reconstruction formulas proves that the new formula is more effective. By using acoustic holography method, some interesting results about the noise of a vehicle are shown. The results proves that acoustic holography is an effective method for the identification of the complex noise sources.展开更多
In order to support scientific evaluation and decision-making,this paper characterizes and identifies core researchers and their research topics by modeling the portrait of core researchers in technical fields.In this...In order to support scientific evaluation and decision-making,this paper characterizes and identifies core researchers and their research topics by modeling the portrait of core researchers in technical fields.In this paper,we constructed a portrait model of core researchers,explained the information attributes and their label data in each dimension of the portrait.Selected six identification indicators that can be measured,used the CRITIC method and gray correlation method to determine the weight coefficient and comprehensive score of the index,and designed quantitative identification methods for core researchers using Price's calculation formula and golden section coefficient.Took the field of artificial intelligence as an example for empirical analysis and result verification,selected representative core researchers to track the changes of research topics at the two levels of their teams and individuals,and characterize them based on the portrait model.展开更多
基金This work was funded by the National Natural Science Foundation of China under Grant60473090.
文摘The Peer-to-Peer(P2P)network traffic identification technology includes Transport Layer Identification(TLI)and Deep Packet Inspection(DPI)methods.By analyzing packets of the transport layer and the traffic characteristic in the P2P system,TLI can identify whether or not the network data flow belongs to the P2P system.The DPI method adopts protocol analysis technology and reverting technology.It picks up data from the P2P application layer and analyzes the characteristics of the payload to judge if the network traffic belongs to P2P applications.Due to its accuracy,robustness and classifying ability,DPI is the main method used to identify P2P traffic.Adopting the advantages of TLI and DPI,a precise and efficient technology for P2P network traffic identification can be designed.
基金This work wassupportedby the Natural Science Foundation of China(No.59775020).
文摘This paper presents the method named acoustic holography which can be used to identify noise sources. A new formula of holography reconstruction is obtained, based on the Kirchhoff integral formula. Some simulating tests are carried out using the new formula. The comparison with other reconstruction formulas proves that the new formula is more effective. By using acoustic holography method, some interesting results about the noise of a vehicle are shown. The results proves that acoustic holography is an effective method for the identification of the complex noise sources.
基金support from the National Social Science Fund of China(16ZDA224)。
文摘In order to support scientific evaluation and decision-making,this paper characterizes and identifies core researchers and their research topics by modeling the portrait of core researchers in technical fields.In this paper,we constructed a portrait model of core researchers,explained the information attributes and their label data in each dimension of the portrait.Selected six identification indicators that can be measured,used the CRITIC method and gray correlation method to determine the weight coefficient and comprehensive score of the index,and designed quantitative identification methods for core researchers using Price's calculation formula and golden section coefficient.Took the field of artificial intelligence as an example for empirical analysis and result verification,selected representative core researchers to track the changes of research topics at the two levels of their teams and individuals,and characterize them based on the portrait model.