期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
基于COM组件构建枣网上专家系统 被引量:4
1
作者 贺小扬 刘孟军 +2 位作者 李红梅 周桂红 张春雨 《河北农业大学学报》 CAS CSCD 北大核心 2006年第1期97-99,110,共4页
开发出了一种枣的网上智能专家系统,系统在实现后台管理功能的同时通过“制约性安全保护机制”、“共享冲突保护机制”和“非法入侵保护机制”实现了网络安全,设计并实现了基于COM组件的网络推理机。
关键词 专家系统 网络推理机 COM组件 制约性安全保护 共享冲突保护
下载PDF
The design and implementation of web mining in web sites security 被引量:2
2
作者 LI Jian, ZHANG Guo-yin , GU Guo-chang, LI Jian-li College of Computer Science and Technology, Harbin Engineering University, Harbin 150001China 《Journal of Marine Science and Application》 2003年第1期81-86,共6页
The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illeg... The backdoor or information leak of Web servers can be detected by using Web Mining techniques on some abnormal Web log and Web application log data. The security of Web servers can be enhanced and the damage of illegal access can be avoided. Firstly, the system for discovering the patterns of information leakages in CGI scripts from Web log data was proposed. Secondly, those patterns for system administrators to modify their codes and enhance their Web site security were provided. The following aspects were described: one is to combine web application log with web log to extract more information,so web data mining could be used to mine web log for discovering the information that firewall and Information Detection System cannot find. Another approach is to propose an operation module of web site to enhance Web site security. In cluster server session, Density -Based Clustering technique is used to reduce resource cost and obtain better efficiency. 展开更多
关键词 data mining web log mining web sites security density-based clustering
下载PDF
A New Method of Semantic Network Knowledge Representation Based on Extended Petri Net 被引量:1
3
作者 Ru Qi Zhou 《Computer Technology and Application》 2013年第5期245-253,共9页
Abstract: It was discussed that the way to reflect the internal relations between judgment and identification, the two most fundamental ways of thinking or cognition operations, during the course of the semantic netw... Abstract: It was discussed that the way to reflect the internal relations between judgment and identification, the two most fundamental ways of thinking or cognition operations, during the course of the semantic network knowledge representation processing. A new extended Petri net is defined based on qualitative mapping, which strengths the expressive ability of the feature of thinking and the mode of action of brain. A model of semantic network knowledge representation based on new Petri net is given. Semantic network knowledge has a more efficient representation and reasoning mechanism. This model not only can reflect the characteristics of associative memory in semantic network knowledge representation, but also can use Petri net to express the criterion changes and its change law of recognition judgment, especially the cognitive operation of thinking based on extraction and integration of sensory characteristics to well express the thinking transition course from quantitative change to qualitative change of human cognition. 展开更多
关键词 Semantic network Petri net knowledge representation qualitative mapping.
下载PDF
Lossy nodes inference based on end-to-end passive monitoring in wireless sensor networks
4
作者 Yang Yu Xu Yongjun Li Xiaowei 《High Technology Letters》 EI CAS 2011年第4期388-394,共7页
This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth co... This paper presents a passive monitoring mechanism, loss), nodes inference (LoNI), to identify loss), nodes in wireless sensor network using end-to-end application traffic. Given topology dynamics and bandwidth constraints, a space-efficient packet marking scheme is first introduced. The scheme uses a Bloom filter as a compression tool so that path information can bc piggybacked by data packets. Based on the path information, LoNI then adopts a fast algorithm to detect lossy nodes. The algorithm formulates the inference problem as a weighted set-cover problem and solves it using a greedy approach with low complexity. Simulations show that LoNI can locate about 80% of lossy nodes when lossy nodes are rare in the network. Furthermore, LoNI performs better for the lossy nodes near the sink or with higher loss rates. 展开更多
关键词 wireless sensor networks(WSNs) performance monitoring lossy nodes Bloom filter weighted set-cover
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部