期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Recursion-transform method and potential formulae of the m×n cobweb and fan networks 被引量:11
1
作者 谭志中 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第9期82-90,共9页
In this paper, we made a new breakthrough, which proposes a new recursion–transform(RT) method with potential parameters to evaluate the nodal potential in arbitrary resistor networks. For the first time, we found ... In this paper, we made a new breakthrough, which proposes a new recursion–transform(RT) method with potential parameters to evaluate the nodal potential in arbitrary resistor networks. For the first time, we found the exact potential formulae of arbitrary m × n cobweb and fan networks by the RT method, and the potential formulae of infinite and semi-infinite networks are derived. As applications, a series of interesting corollaries of potential formulae are given by using the general formula, the equivalent resistance formula is deduced by using the potential formula, and we find a new trigonometric identity by comparing two equivalence results with different forms. 展开更多
关键词 recursion-transform method network model potential formula exact solution
在线阅读 下载PDF
A Method for Detecting Wide-scale Network Traffic Anomalies
2
作者 Wang Minghua(National Computer Network Emergency Response Technical Team/Coordination Center(CNCERT/CC),Beijing 100029,China) 《ZTE Communications》 2007年第4期19-23,共5页
Network traffic anomalies refer to the traffic changed abnormally and obviously.Local events such as temporary network congestion,Distributed Denial of Service(DDoS)attack and large-scale scan,or global events such as... Network traffic anomalies refer to the traffic changed abnormally and obviously.Local events such as temporary network congestion,Distributed Denial of Service(DDoS)attack and large-scale scan,or global events such as abnormal network routing,can cause network anomalies.Network anomaly detection and analysis are very important to Computer Security Incident Response Teams(CSIRT).But wide-scale traffic anomaly detection requires extracting anomalous modes from large amounts of high-dimensional noise-rich data,and interpreting the modes;so,it is very difficult.This paper proposes a general method based on Principle Component Analysis(PCA)to analyze network anomalies.This method divides the traffic matrix into normal and anomalous subspaces,maps traffic vectors into the normal subspace,gets the distance from detected vector to average normal vector,and detects anomalies based on that distance. 展开更多
关键词 A method for Detecting Wide-scale Network Traffic Anomalies DDOS Security PCA
在线阅读 下载PDF
Ranking important nodes in complex networks by simulated annealing 被引量:3
3
作者 Yu Sun Pei-Yang Yao +2 位作者 Lu-Jun Wan Jian Shen Yun Zhong 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期42-47,共6页
In this paper, based on simulated annealing a new method to rank important nodes in complex networks is presented.First, the concept of an importance sequence(IS) to describe the relative importance of nodes in comp... In this paper, based on simulated annealing a new method to rank important nodes in complex networks is presented.First, the concept of an importance sequence(IS) to describe the relative importance of nodes in complex networks is defined. Then, a measure used to evaluate the reasonability of an IS is designed. By comparing an IS and the measure of its reasonability to a state of complex networks and the energy of the state, respectively, the method finds the ground state of complex networks by simulated annealing. In other words, the method can construct a most reasonable IS. The results of experiments on real and artificial networks show that this ranking method not only is effective but also can be applied to different kinds of complex networks. 展开更多
关键词 complex networks node importance ranking method simulated annealing
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部