In secure operating system,mechanism of Access and Control is the kernel of security policy realization. As we know,Identification & Authorization is the base and precondition. It is absolutely necessarily in many...In secure operating system,mechanism of Access and Control is the kernel of security policy realization. As we know,Identification & Authorization is the base and precondition. It is absolutely necessarily in many kinds of secure OS evaluation home and aborad[1~3]. This paper will describe the theory bases and realization of the mechanism in detail and expand it to the network.展开更多
This paper studies the problem of radar target recognition based on radar cross section(RCS)observation sequence.First,the authors compute the discrete wavelet transform of RCS observation sequence and extract a valid...This paper studies the problem of radar target recognition based on radar cross section(RCS)observation sequence.First,the authors compute the discrete wavelet transform of RCS observation sequence and extract a valid statistical feature vector containing five components.These five components represent five different features of the radar target.Second,the authors establish a set-valued model to represent the relation between the feature vector and the authenticity of the radar target.By set-valued identification method,the authors can estimate the system parameter,based on which the recognition criteria is given.In order to illustrate the efficiency of the proposed recognition method,extensive simulations are given finally assuming that the true target is a cone frustum and the RCS of the false target is normally distributed.The results show that the set-valued identification method has a higher recognition rate than the traditional fuzzy classification method and evidential reasoning method.展开更多
文摘In secure operating system,mechanism of Access and Control is the kernel of security policy realization. As we know,Identification & Authorization is the base and precondition. It is absolutely necessarily in many kinds of secure OS evaluation home and aborad[1~3]. This paper will describe the theory bases and realization of the mechanism in detail and expand it to the network.
基金supported by the National Natural Science Foundation of China under Grant No.61174042the National Key Basic Research Program of China(973 Program) under Grant No.2014CB845301
文摘This paper studies the problem of radar target recognition based on radar cross section(RCS)observation sequence.First,the authors compute the discrete wavelet transform of RCS observation sequence and extract a valid statistical feature vector containing five components.These five components represent five different features of the radar target.Second,the authors establish a set-valued model to represent the relation between the feature vector and the authenticity of the radar target.By set-valued identification method,the authors can estimate the system parameter,based on which the recognition criteria is given.In order to illustrate the efficiency of the proposed recognition method,extensive simulations are given finally assuming that the true target is a cone frustum and the RCS of the false target is normally distributed.The results show that the set-valued identification method has a higher recognition rate than the traditional fuzzy classification method and evidential reasoning method.