The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the ex...The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the existence is reduced.展开更多
With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management...With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods.展开更多
A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic...A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic polynomial A(z)=1-a_1z-a_2z^2-…-a_3z^3 has all roots on the unit circle. Asymptotic behavior of sum form 1 to n (x^2(t)) will be studied by showing somerates of divergence of sum form 1 to n (x^2(t)). This kind of properties Will be used for getting the rates of convergenceof least squares estimates of parameters a_1, a_2,…, a_?展开更多
Software credibility refers to the matching degree between the expected result and system behavior in the real running environment. This paper focuses on the application of software creditability verification method b...Software credibility refers to the matching degree between the expected result and system behavior in the real running environment. This paper focuses on the application of software creditability verification method based on the application behavior declaration (ABD), in which the application of software credibility validation process and the software behavior declaration definition statement are put forward. In the integration of the process and the software development life cycle, the ABD is embedded into the software development phases to make the software behavior be consistent with the judgment and the final realization meet the requirement of trusted software verification.展开更多
文摘The main purpose of this paper is to discuss the existence and asymptotic behavior of solutions for [GRAPHICS] and for which the sufficient conditions of asymptotic behavior are obtained and the restriction for the existence is reduced.
基金supported by Key Scientific and Technological Research Projects in Henan Province(Grand No 192102210125)Key scientific research projects of colleges and universities in Henan Province(23A520054)Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2020-2-01).
文摘With the rapid growth of network bandwidth,traffic identification is currently an important challenge for network management and security.In recent years,packet sampling has been widely used in most network management systems.In this paper,in order to improve the accuracy of network traffic identification,sampled NetFlow data is applied to traffic identification,and the impact of packet sampling on the accuracy of the identification method is studied.This study includes feature selection,a metric correlation analysis for the application behavior,and a traffic identification algorithm.Theoretical analysis and experimental results show that the significance of behavior characteristics becomes lower in the packet sampling environment.Meanwhile,in this paper,the correlation analysis results in different trends according to different features.However,as long as the flow number meets the statistical requirement,the feature selection and the correlation degree will be independent of the sampling ratio.While in a high sampling ratio,where the effective information would be less,the identification accuracy is much lower than the unsampled packets.Finally,in order to improve the accuracy of the identification,we propose a Deep Belief Networks Application Identification(DBNAI)method,which can achieve better classification performance than other state-of-the-art methods.
文摘A time series x(t), t≥1, is said to be an unstable ARMA process if x(t) satisfies an unstableARMA model such asx(t)=a_1x(t-1)+a_2x(t-2)+…+a_8x(t-s)+w(t)where w(t) is a stationary ARMA process; and the characteristic polynomial A(z)=1-a_1z-a_2z^2-…-a_3z^3 has all roots on the unit circle. Asymptotic behavior of sum form 1 to n (x^2(t)) will be studied by showing somerates of divergence of sum form 1 to n (x^2(t)). This kind of properties Will be used for getting the rates of convergenceof least squares estimates of parameters a_1, a_2,…, a_?
基金Supported by Foundation of the National Public Scientific Research(201210262)
文摘Software credibility refers to the matching degree between the expected result and system behavior in the real running environment. This paper focuses on the application of software creditability verification method based on the application behavior declaration (ABD), in which the application of software credibility validation process and the software behavior declaration definition statement are put forward. In the integration of the process and the software development life cycle, the ABD is embedded into the software development phases to make the software behavior be consistent with the judgment and the final realization meet the requirement of trusted software verification.