The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The evolutionary development of railway power-supply systems and computer networks and technologies that control these systems are analyzed. It is shown that the optimization of electricity consumption is based on the intellectualization of electricity supply procedures. A graph is constructed whose topology adequately represents the typical architecture of a computer network of control at the layer...
The paper considers problems of developing the parallel hybrid fluid-based model and methods to solve them. The main reasons of falling of GPU performance that had arisen during development and ways to address them are described. The method for describing the structures of networks using routes adjacency matrix is provided. Also several methods to evaluate line matrix summation are considered and...
This paper presents mathematical model of a computer network and then the model has been presented in the form of a flow chart. RED algorithm is a standard in computer network. RED algorithm has been replaced with the PI controller. In the article it has been assumed that a computer network is a particular dynamic system and it can be examined using known methods of the theory of dynamic systems....
In epidemiology, several mathematical models are developed by using the system of differential equations and many of them have used the parameters traditionally as deterministic variables. In this paper, the variables, which are used in the system, are considered as random variables with specified distributions because the equations with random coefficients are well suited in describing the real behavior...
In this article we created the mathematical model of “client to server” communication including the compromised node probabilities and a number of possible routes having an admission to access points, also comparative characteristics of DoS/DDoS attacks in computer network has been provided herewith.
This paper proposes a mathematics model in solving the arrangement of computer network maintenance fashion and designs the Method of Computer Network Maintenance Fashion Arrangement Algorithmic (TMCNMFAA). It analyzes the restrictions existing in TMCNMFAA, provides the update strategy of pheromone when false searching path is found, and calculation method in inspiriting value of function. The results...
While model checking is a powerful technique to analyze the properties of a model, it can be very expensive or even impossible, if the model comprises many states that have to be explored. Simulation-based model checking is an alternative, where the properties defined in temporal logics are not checked on the model itself but on traces produced during model execution. However, for stochastic models...
In most articles dataflow in computer networks is described as a transfer function. Numerators, denominators and delay times give behaviors of these systems. Some systems show linear features, others have non-linear ones. All descriptions have some special results. Some of them present linear aspects of transfers, while other ones look for bottlenecks of the networks or prove stability of the systems...
Hamiltonian cycles play an important role in graph theory and data mining applications. Two Hamiltonian cycles that don't have an edge in common are known as edge-disjoint Hamiltonian cycles (EDHCs). EDHCs are useful in computer networks. They have found applications in improving network capacity, fault-tolerance and collusion resistant mining algorithms. This paper extends previous work on collusion...
In view of the shortage of numerical control(NC) teaching resources and some problems such as high cost and high risk of equipment in current NC training area, with the rapid development of virtual reality, computer network and human-computer interaction technology, a feasible programme of virtual NC simulation system based on browser/server(B/S) was brought forward. Firstly, the development platforms...
We develop a probabilistic framework for global modeling of the traffic over a computer network. The model integrates existing single-link (-flow) traffic models with the routing over the network to capture the global traffic behavior. It arises from a limit approximation of the traffic fluctuations as the time-scale and the number of users sharing the network grow. The resulting probability model...
This paper presents a novel approach to detecting worms based on particle filter. The approach collects data through honeynet and uses CUSUM to detect the abnormal changes of counts of packet source address in a t sampling. If the change rate exceeds a certain threshold, it will activate particle filter to estimate its growth rate in order to confirm the existence of worms. The experimental results...
Fault diagnosis is a key research part in the field of network fault management. In order to make effective fault diagnosis to the increasingly complicated distributed application systems(DAS) which are based on the computer network, Building an accurate and practicable fault propagation model(FPM) is generally the necessary prerequisite of the subsequent tasks such as probabilistic reasoning, fault...
Computer viruses are great threats to the operating system and the computer network. In order to handle those emergent situations might appear in the future and make corresponding policies immediately; thorough researches of computer virus propagation are very important and urgently needed. But the spreading methods of computer viruses are different; one simple model is unable to describe all the...
Flood is one of the greatest disasters against oilfield manufacture. This paper first describes the key problem of oilfield flood control system, established a large oilfield flood control intelligent decision support system. Then the application research of reservoir grouppsilas flood prevention optimizing schedule algorithm was done based on multi-agent theory. According to the neural network mathematical...
In this paper, an method to system identification over networks using 1 bit delta-sigma transformation is proposed and the efficacy of the proposed method is verified based on experimental results. Accurate mathematical models are needed to achieve intelligent control with good performances in control engineering. It is easy to obtain those mathematical models if exact input-output data of a controlled...
Intrusion detection systems have been widely used to overcome security threats in computer networks and to identify unauthorized use, misuse, and abuse of computer systems. Anomaly-based approaches in intrusion detection systems have the advantage of being able to detect unknown attacks; they look for patterns that deviate from the normal behavior. We have proposed an approach of anomaly intrusion...
A simple and yet effective denial of service (DoS) attack on voice over IP (VoIP) proxies that based on session initiation protocol (SIP), is to flood the server with requests that their addresses do not exist and are irresolvable. Different security schemes and possible attacks have studied from the qualitative view on the most of network security researches and these researches are less considered...
This paper describes a new approach to converged communication and computer networks. It was designed a new architecture of nodal active network element that is powerful enough and supports priority processing of different types of connection. It is exactly the missing support of priority processing that constitutes the greatest drawback of the majority of present-day active network elements. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.