Pub Date : 2013-12-18DOI: 10.3724/SP.J.1087.2013.03368
Yabin Xu, Zhuo Li, Junyi Chen
{"title":"Parallel recognition of illegal Web pages based on improved KNN classification algorithm: Parallel recognition of illegal Web pages based on improved KNN classification algorithm","authors":"Yabin Xu, Zhuo Li, Junyi Chen","doi":"10.3724/SP.J.1087.2013.03368","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03368","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3368-3371"},"PeriodicalIF":0.0,"publicationDate":"2013-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69948259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-17DOI: 10.3724/SP.J.1087.2013.03506
Li Chun, Jianbao Zhao, Xiaoliu Shen
After analyzing and comparing the existing security situation assessment methods,a network security situation assessment method was proposed based on time dimension,which focused on the necessity of using different methods for shortterm and long-term assessment respectively. Based on the alarm information which came from security device such as firewall and Intrusion Detection Systems(IDS),the whole short-term situation was got according to the score of destination host.Combining the result of short-term assessment and static index,the weight of long-term assessment system was determined by entropy method. The proposed assessment method divides network security situation into short-term and long-term,and makes up for the lack of setting situation assessment boundaries in terms.
{"title":"Network security situational awareness method of multi-period assessment","authors":"Li Chun, Jianbao Zhao, Xiaoliu Shen","doi":"10.3724/SP.J.1087.2013.03506","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03506","url":null,"abstract":"After analyzing and comparing the existing security situation assessment methods,a network security situation assessment method was proposed based on time dimension,which focused on the necessity of using different methods for shortterm and long-term assessment respectively. Based on the alarm information which came from security device such as firewall and Intrusion Detection Systems(IDS),the whole short-term situation was got according to the score of destination host.Combining the result of short-term assessment and static index,the weight of long-term assessment system was determined by entropy method. The proposed assessment method divides network security situation into short-term and long-term,and makes up for the lack of setting situation assessment boundaries in terms.","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3506-3510"},"PeriodicalIF":0.0,"publicationDate":"2013-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69948894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-17DOI: 10.3724/SP.J.1087.2013.03449
Jian-zhen Xu, Tingting He, Dan He, Tong Zhou
{"title":"Building algorithm for tree-ring application layer multicast based on ant colony algorithm: Building algorithm for tree-ring application layer multicast based on ant colony algorithm","authors":"Jian-zhen Xu, Tingting He, Dan He, Tong Zhou","doi":"10.3724/SP.J.1087.2013.03449","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03449","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3449-3452"},"PeriodicalIF":0.0,"publicationDate":"2013-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69948612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-17DOI: 10.3724/SP.J.1087.2013.03552
Shuqun Liu, Zhang-ming Pan
{"title":"Fractal image coding method based on Fisher classification and space mapping: Fractal image coding method based on Fisher classification and space mapping","authors":"Shuqun Liu, Zhang-ming Pan","doi":"10.3724/SP.J.1087.2013.03552","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03552","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3552-3554"},"PeriodicalIF":0.0,"publicationDate":"2013-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69949395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-17DOI: 10.3724/SP.J.1087.2013.03600
Peng Wu, Qingyuan Wang, Zhicheng Liang, Jie Wu
{"title":"Precise train stopping method based on predictive control: Precise train stopping method based on predictive control","authors":"Peng Wu, Qingyuan Wang, Zhicheng Liang, Jie Wu","doi":"10.3724/SP.J.1087.2013.03600","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03600","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3600-3603"},"PeriodicalIF":0.0,"publicationDate":"2013-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69949350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-17DOI: 10.3724/SP.J.1087.2013.03457
B. Qiu, Qianqian Zhen, Yaohua Tang
{"title":"Estimation algorithm for missing data in wireless sensor network: Estimation algorithm for missing data in wireless sensor network","authors":"B. Qiu, Qianqian Zhen, Yaohua Tang","doi":"10.3724/SP.J.1087.2013.03457","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03457","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3457-3459"},"PeriodicalIF":0.0,"publicationDate":"2013-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69948788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-17DOI: 10.3724/SP.J.1087.2013.03465
Xiang Ji, Ling Zhuang, Kai Shao, Guangyu Wang
{"title":"Design of multi-carrier transceivers based on modified discrete fourier transform filter bank: Design of multi-carrier transceivers based on modified discrete fourier transform filter bank","authors":"Xiang Ji, Ling Zhuang, Kai Shao, Guangyu Wang","doi":"10.3724/SP.J.1087.2013.03465","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03465","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"47 1","pages":"3465-3468"},"PeriodicalIF":0.0,"publicationDate":"2013-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69948408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-17DOI: 10.3724/SP.J.1087.2013.03531
Hongbing Liu, Ling Du, Hong-Syun Ji
{"title":"Fast geometric resistant video watermarking scheme for gateway copyright protection: Fast geometric resistant video watermarking scheme for gateway copyright protection","authors":"Hongbing Liu, Ling Du, Hong-Syun Ji","doi":"10.3724/SP.J.1087.2013.03531","DOIUrl":"https://doi.org/10.3724/SP.J.1087.2013.03531","url":null,"abstract":"","PeriodicalId":61778,"journal":{"name":"计算机应用","volume":"33 1","pages":"3531-3535"},"PeriodicalIF":0.0,"publicationDate":"2013-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69949171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}