This paper deals with the synthesis of Petri net supervisor enforcing the more expressive constraints including marking terms, firing vector terms and Parikh vector terms. The method is developed to handle uncontrolla...This paper deals with the synthesis of Petri net supervisor enforcing the more expressive constraints including marking terms, firing vector terms and Parikh vector terms. The method is developed to handle uncontrollable and unobservable transitions existing in the constraints. The “greater-than or equal” general constraints can also be transformed into “less-than or equal” Parikh constraints. An example is analyzed to show how the problem is solved. General constraint is first transformed into Parikh vector constraints, and Matrix-Transformation is proposed to obtain the admissible constraints without uncontrollable and unobservable transitions. Then the supervisor can be constructed based on constraints only consisting of Parikh vector terms. The method is proved to be more concise and effective than the method presented by Iordache and Moody especially when applied to large scale systems.展开更多
In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network moni...In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network monitoring and keywords spotting. In the part of network monitoring, this paper adopts a method which is based on ARP spoofing technology to monitor the users' data, and to obtain the original audio streams. In the part of keywords spotting, the extraction methods of PLP (one of the main characteristic arameters) is studied, and improved feature parameters- PMCC are put forward. Meanwhile, in order to accurately detect syllable, the paper the double-threshold method with variance of frequency band method, and use the latter to carry out endpoint detection. Finally, keywords recognition module is built by HMM, and identification results are contrasted under Matlab environment. From the experiment results, a better solution for the application of key words recognition technology in network monitoring is found.展开更多
WINDOWS NT 下网络监控程序的开发[刊]//许士博//信息工程大学学报.—2000,1(3).—56~59(C)本文简单地介绍了 Windows 系统中的 NDIS 及应用程序与它的交互,重点介绍了怎样利用一个辅助的开发包(Packet32)直接对网卡进行操作及对接收...WINDOWS NT 下网络监控程序的开发[刊]//许士博//信息工程大学学报.—2000,1(3).—56~59(C)本文简单地介绍了 Windows 系统中的 NDIS 及应用程序与它的交互,重点介绍了怎样利用一个辅助的开发包(Packet32)直接对网卡进行操作及对接收到的数据进行分析的过程。展开更多
基金Project supported by the National Natural Science Foundation of China (No. 60504024), Zhejiang Provincial Education Department(No. 20050905), and "151 Talent Project" of Zhejiang Province,China
文摘This paper deals with the synthesis of Petri net supervisor enforcing the more expressive constraints including marking terms, firing vector terms and Parikh vector terms. The method is developed to handle uncontrollable and unobservable transitions existing in the constraints. The “greater-than or equal” general constraints can also be transformed into “less-than or equal” Parikh constraints. An example is analyzed to show how the problem is solved. General constraint is first transformed into Parikh vector constraints, and Matrix-Transformation is proposed to obtain the admissible constraints without uncontrollable and unobservable transitions. Then the supervisor can be constructed based on constraints only consisting of Parikh vector terms. The method is proved to be more concise and effective than the method presented by Iordache and Moody especially when applied to large scale systems.
基金supported by the Natural Science Foundation of Guangxi Province(No.60961002)
文摘In this paper, the specific application of key words Spotting used in the network monitoring is studied, and the keywords spotting is emphasized. The whole monitoring system is divided into two mod-ules: network monitoring and keywords spotting. In the part of network monitoring, this paper adopts a method which is based on ARP spoofing technology to monitor the users' data, and to obtain the original audio streams. In the part of keywords spotting, the extraction methods of PLP (one of the main characteristic arameters) is studied, and improved feature parameters- PMCC are put forward. Meanwhile, in order to accurately detect syllable, the paper the double-threshold method with variance of frequency band method, and use the latter to carry out endpoint detection. Finally, keywords recognition module is built by HMM, and identification results are contrasted under Matlab environment. From the experiment results, a better solution for the application of key words recognition technology in network monitoring is found.
文摘WINDOWS NT 下网络监控程序的开发[刊]//许士博//信息工程大学学报.—2000,1(3).—56~59(C)本文简单地介绍了 Windows 系统中的 NDIS 及应用程序与它的交互,重点介绍了怎样利用一个辅助的开发包(Packet32)直接对网卡进行操作及对接收到的数据进行分析的过程。