期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
THE EXISTENCE AND ASYMPTOTIC BEHAVIOR OF SOLUTIONS FOR EVOLUTION EQUATIONS AND APPLICATIONS TO P. D. E.
1
作者 张壮志 《Acta Mathematica Scientia》 SCIE CSCD 1991年第2期231-240,共10页
The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the ex... The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the existence is reduced. 展开更多
关键词 THE EXISTENCE AND ASYMPTOTIC behavior OF SOLUTIONS FOR EVOLUTION EQUATIONS AND applicationS TO P
下载PDF
Network traffic identification in packet sampling environment
2
作者 Shi Dong Yuanjun Xia 《Digital Communications and Networks》 SCIE CSCD 2023年第4期957-970,共14页
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management... With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods. 展开更多
关键词 Network measurement application identification Packet sampling application behavior CHARACTERISTIC Metric correlation Network management
下载PDF
ASYMPTOTIC BEHAVIOR OF UNSTABLE ARMA PROCESSES WITH APPLICATION TO LEAST SQUARES ESTIMATES OF THEIR PARAMETERS 被引量:2
3
作者 安鸿志 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 1989年第2期148-168,共21页
A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic... A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic polynomial A(z)=1-a_1z-a_2z^2-…-a_3z^3 has all roots on the unit circle. Asymptotic behavior of sum form 1 to n (x^2(t)) will be studied by showing somerates of divergence of sum form 1 to n (x^2(t)). This kind of properties Will be used for getting the rates of convergenceof least squares estimates of parameters a_1, a_2,…, a_? 展开更多
关键词 ARMA ASYMPTOTIC behavior OF UNSTABLE ARMA PROCESSES WITH application TO LEAST SQUARES ESTIMATES OF THEIR PARAMETERS
原文传递
Research on Application's Credibility Verification Based on ABD
4
作者 YU Xuejun JIANG Guangzhi +3 位作者 WANG Pu SONG Hongbo WANG Kun LIANG Yong 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第1期63-68,共6页
Software credibility refers to the matching degree between the expected result and system behavior in the real running environment. This paper focuses on the application of software creditability verification method b... Software credibility refers to the matching degree between the expected result and system behavior in the real running environment. This paper focuses on the application of software creditability verification method based on the application behavior declaration (ABD), in which the application of software credibility validation process and the software behavior declaration definition statement are put forward. In the integration of the process and the software development life cycle, the ABD is embedded into the software development phases to make the software behavior be consistent with the judgment and the final realization meet the requirement of trusted software verification. 展开更多
关键词 software credibility application behavior declaration (ABD) whole life cycle
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部