期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于深度度量学习的异常流量检测方法
1
作者 张强 何俊江 +1 位作者 李汶珊 李涛 《信息网络安全》 CSCD 北大核心 2024年第3期462-472,共11页
网络异常流量识别是目前网络安全的重要任务之一。然而传统流量分类模型是依据流量数据训练得到,由于大部分流量数据分布不均导致分类边界模糊,极大限制了模型的分类性能。为解决上述问题,文章提出一种基于深度度量学习的异常流量检测... 网络异常流量识别是目前网络安全的重要任务之一。然而传统流量分类模型是依据流量数据训练得到,由于大部分流量数据分布不均导致分类边界模糊,极大限制了模型的分类性能。为解决上述问题,文章提出一种基于深度度量学习的异常流量检测方法。首先,与传统深度度量学习每个类别单一代理的算法不同,文章设计双代理机制,通过目标代理指引更新代理的优化方向,提升模型的训练效率,增强同类别流量数据的聚集能力和不同类别流量数据的分离能力,实现最小化类内距离和最大化类间距离,使数据的分类边界更清晰;然后,搭建基于1D-CNN和Bi-LSTM的神经网络,分别从空间和时间的角度高效提取流量特征。实验结果表明,NSL-KDD流量数据经过模型处理,其类内距离显著减小并且类间距离显著增大,类内距离相比原始类内距离减小了73.5%,类间距离相比原始类间距离增加了52.7%,且将文章搭建的神经网络比广泛使用的深度残差网络训练时间更短、效果更好。将文章所提模型应用在流量分类任务中,在NSL-KDD和CICIDS2017数据集上,相比传统的流量分类算法,其分类效果更好。 展开更多
关键词 深度度量学习 异常流量检测 流量数据分布 神经网络
下载PDF
Evaluation of Program Code Caching for Mobile Agent Migrations
2
作者 Masayuki Higashino Kenichi Takahashi Takao Kawamura Kazunori Sugahara 《Computer Technology and Application》 2013年第7期356-363,共8页
Mobile agents are able to migrate among machines to achieve their tasks. This feature is attractive to design, implement, and maintain distributed systems because we can implement both client-side and server-side prog... Mobile agents are able to migrate among machines to achieve their tasks. This feature is attractive to design, implement, and maintain distributed systems because we can implement both client-side and server-side programming in one mobile agent. However, it involves the increase of data traffic for mobile agent migrations. In this paper, we propose program code caching to reduce the data traffic caused by mobile agent migrations. A mobile agent consists of many program codes that define a task executed in each machine they migrate; thus, the mobile agent migration involves the transfer of their program codes. Therefore, our method reduces the number of the transfer of program codes by using program code cache. We have implemented our method on a mobile agent framework called Maglog and conducted experiments on a meeting scheduling system. 展开更多
关键词 Mobile agent agent migration cache.
下载PDF
Breach mechanism and numerical simulation for seepage failure of earth-rock dams 被引量:8
3
作者 CHEN ShengShui ZHONG QiMing CAO Wei 《Science China(Technological Sciences)》 SCIE EI CAS 2012年第6期1757-1764,共8页
In this study,a numerical model,which can capture the full process of the development of seepage passages,the collapse of dams and the failure due to overtopping,is proposed for earth-rock dams.The critical incipient ... In this study,a numerical model,which can capture the full process of the development of seepage passages,the collapse of dams and the failure due to overtopping,is proposed for earth-rock dams.The critical incipient velocity for the occurrence of seepage failure is derived by analyzing the forces acting on soil particles in the seepage passage.The sediment transport formula is proposed to simulate the erosion process and the evolution of breach within the dam.In this model,the grain size distribution,the compaction density and the strength of dam materials are reasonably accounted for.Furthermore,the influences of the direction of seepage paths,the slope of the dam and the velocity of water flow on the amount of erosion are also taken into consideration.The proposed model and the corresponding numerical programs are employed to simulate the development of breaches and discharge of two typical cases due to seepage failure.The development of breaches,the history of discharge and the peak flood flux predicted by the numerical models are rather comparable to the measured data,which confirms the validity of the proposed model and the feasibility of applying the model in evaluating the disaster consequences and preparing the emergency counter measurements in the case of dam collapse. 展开更多
关键词 earth-rock dam seepage failure dam collapse numerical simulation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部