Pub Date : 2014-03-01DOI: 10.3969/j.issn.1672-7843.2014.03.001
P. Holme
Network epidemiology has become a core framework for investigating the role of human contact patterns in the spreading of infectious diseases. In network epidemiology, one represents the contact st ...
网络流行病学已成为研究人类接触方式在传染病传播中的作用的核心框架。在网络流行病学中,1代表接触点。
{"title":"Model Versions and Fast Algorithms for Network Epidemiology","authors":"P. Holme","doi":"10.3969/j.issn.1672-7843.2014.03.001","DOIUrl":"https://doi.org/10.3969/j.issn.1672-7843.2014.03.001","url":null,"abstract":"Network epidemiology has become a core framework for investigating the role of human contact patterns in the spreading of infectious diseases. In network epidemiology, one represents the contact st ...","PeriodicalId":146599,"journal":{"name":"Journal of Logistical Engineering University","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127673331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2006-08-01DOI: 10.1142/9789812772763_0096
Chuanrong Xu, Rongrui Chen, Xiu-wen Yang, Jie Zhang
{"title":"Flow Shop Scheduling with Deteriorating Processing Time and Chains Constraint","authors":"Chuanrong Xu, Rongrui Chen, Xiu-wen Yang, Jie Zhang","doi":"10.1142/9789812772763_0096","DOIUrl":"https://doi.org/10.1142/9789812772763_0096","url":null,"abstract":"","PeriodicalId":146599,"journal":{"name":"Journal of Logistical Engineering University","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121949809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1142/9789812701695_0166
Xie Hong-tao
At present, wavelet analysis is an active and rapidly developing domain in the field of signal information acquisition and processing (particularly in failure diagnostic analysis and detecting technology), and it is an international research hotspot. It has double significance of both profound theory and wide application. The authors conduct the research of network protocol fingerprint recognition based on wavelet analysis, which decomposes the primary signal to multi-frequency signal through wavelet transformation, decomposes the signal in the tower pattern, calculate and obtain all the related Wi information and pick up the characteristic information of the fingerprint. This article has proposed the detecting method and the system structure of fingerprint recognition, and has made a beneficial attempt to solve the problem of network security that is increasingly serious day by day.
{"title":"Research on Network Protocol Fingerprint Recognition Based on Wavelet Analysis","authors":"Xie Hong-tao","doi":"10.1142/9789812701695_0166","DOIUrl":"https://doi.org/10.1142/9789812701695_0166","url":null,"abstract":"At present, wavelet analysis is an active and rapidly developing domain in the field of signal information acquisition and processing (particularly in failure diagnostic analysis and detecting technology), and it is an international research hotspot. It has double significance of both profound theory and wide application. The authors conduct the research of network protocol fingerprint recognition based on wavelet analysis, which decomposes the primary signal to multi-frequency signal through wavelet transformation, decomposes the signal in the tower pattern, calculate and obtain all the related Wi information and pick up the characteristic information of the fingerprint. This article has proposed the detecting method and the system structure of fingerprint recognition, and has made a beneficial attempt to solve the problem of network security that is increasingly serious day by day.","PeriodicalId":146599,"journal":{"name":"Journal of Logistical Engineering University","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114442933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}