Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Heilongjiang Institute of Science and Technology》 2011-02
Add to Favorite Get Latest Update

Application of boundary detection algorithm in invasion pattern classification and feature extraction

JIN Minsuo,SUN Qiu,ZHU Dan(Information Network Center,Heilongjiang Institute of Science & Technology,Harbin 150027,China)  
Adopting the boundary detection method can help the users achieve an effective extraction of the network data and a quick intruding detection in the lack of detective knowledge.It is helpful to establish a theoretical framework and develop a universal method of self-learning as to the limited samples with the boundary detection method,through feature extraction can get rid of the data without the distinguished features in the following intruding detection.Experimental data analysis shows that the number of effective clustering increases along with the increasing original samples and then levels off.Its validity has been demonstrated in the theoretical analysis and simulation experiments in this article.
【Fund】: 黑龙江省教育厅科学技术研究项目(11551439)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 8 Hits
1 ZOU Tao,SUN Hong-wei,TIAN Xin-guang,ZHANG Er-yang(College of Electronic Science and Engineering,National Univ. of Defense Technology,Changsha 410073,China);Data Reduction in Network Based on the Intrusion Detection System[J];Journal of National University of Defense Technology;2003-06
2 HUANG Guang-qiu,LI Xuan(Department of Management,Xi'an University of Architecture and Technology,Xi'an 710055,China);An intrusion detection system based on memory principle[J];Journal of Hebei University of Engineering(Natural Science Edition);2008-01
3 WANG Xiuqin,XIA Hongyang(College of Electrical and Information Engineering,Heilongjiang Institute of Science and Technology,Harbin 150027,China);Ear identification based on improved algorithm of moment invariant[J];Journal of Heilongjiang Institute of Science and Technology;2008-01
4 YANG Xian-dong, YE Shao-zhen (College of Mathematics and Computer Science, Fuzhou University, Fuzhou Fujian350108, China);Content-based feature extraction and retrieval method of MRI brain tumorimage[J];Journal of Computer Applications;2009-S2
5 DENG Qinghua,JIN Cong,ZHANG Qingguo Department of Computer Science,Central China Normal University,Wuhan 430079,China;Dynamic propagation model of network worm[J];Computer Engineering and Applications;2011-06
6 XIN Zhiyun1,2,GU Ming2(1.Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China; 2.School of Software,Tsinghua University,Beijing 100084,China);Complicated financial data time series forecasting analysis based on least square support vector machine[J];Journal of Tsinghua University(Science and Technology);2008-07
7 WEI Qiang,ZHOU Xiaocang(Department of Management Science and Engineering,School of Economics and Management,Tsinghua University,Beijing 100084,China);Discovering functional dependencies with degrees of satisfaction using attribute pre-scanning[J];Journal of Tsinghua University(Science and Technology);2009-06
8 WANG Jin-shui, ZHANG Dong-zhan, SHI Xiu-sheng, LAI Xing-rui (Computer Science Department, Xiamen University,Xiamen 361005, China);Adaptive Web Intrusion Detection Based on Immune and Fuzzy Logic[J];Mind and Computation;2009-01
Chinese Journal Full-text Database 8 Hits
1 LI Juan,LI Cui-ping,LI Zhong-xue School of Civil and Environmental Engineering,University of Science and Technology Beijing,Beijing 100083,China;Grade interpolation in orebody based on support vector regression[J];Journal of University of Science and Technology Beijing;2009-12
2 WANG Yun-hai, LI Juan, LI Chun-min(China Academy of Science and Technology,Beijing 100029,China);Research of selecting the training samples for the infiltration route prediction model in tailing[J];Journal of Safety Science and Technology;2009-05
3 SHI Wei-ren,WANG Yan-xia,TANG Yun-jian,FAN Min(College of Automation,Chongqing University,Chongqing 400030,China);Forecasting method for water quality time series of few and abnormal data[J];Journal of Computer Applications;2010-02
4 WANG Li-juan,ZHA Wei-xiong (Institute of Transportation and Economics,East China Jiaotong University,Nanchang 330013,China);Prediction Model for Road Traffic Accident Based on Support Vector Regression[J];Transport Standardization;2010-11
5 QI Shen-jun1,2,ZHANG Yun-bo1,DING Lie-yun2(1.College of Civil Engineering,Huaqiao University,Quanzhou 362021,China;2.College of Civil Engineering and Mechanics,Huazhong University of Science and Technology,Wuhan 430074,China);Forecast Model of Activity Duration Based on LS-SVM in Construction Engineering Project[J];Journal of Huaqiao University(Natural Science);2010-05
6 ZHANG Bin~1,WANG Tong~1,GU Chuan-gang~1,DAI Zheng-yuan~2(1.Key Laboratory for Power Machinery and Engineering(the Ministry of Education),Shanghai JiaotongUniversity,Shanghai,200240,China;2.Trane's Asia-Pacific Research Center, Shanghai 200001,China);Algorithm of Reducing the Sample Size of Turbulent Experiment Based on Wavelet Analysis[J];Journal of Shanghai Jiaotong University;2008-11
7 WANG Hao(Engineering Management Department,Luoyang Institute of Science and Technology,Luoyang Henan 471023,China);The Review on Models of Stock Price Forecasting in the Domestic Securities Market[J];Journal of Sichuan College of Education;2009-07
8 SUN Qing-wen,ZHU Xian-ying (School of Business Administration,Hebei university of economics & business number47,xuefu road,shijiazhuang city,Hebei 050061,China);The Study of REM-GM(1,1) Model on Sales Forecast and Cluster Predication Method[J];Mathematics in Practice and Theory;2011-02
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 PU Rong-fu(Network Centre of Mianyang Teachers College,Mianyang Sichuan 612000,China);Abnormal Intrusion Detection System Based on Normal Distribution[J];Journal of ABA Teachers College;2006-03
2 SUN Yan-feng, LIANG Yan-chun, JIANG Jing-qing, WU Chun-guo(College of Computer Science and Technology, Jilin University, Changchun 130012,China);Neural network methods in financial time series forcasting[J];Journal of Changchun Post and Telecommunication Institute;2004-01
3 Yan Hui Cao Yuanda(Dept.of Computer Science and Engineering,Beijing Institute of Technology,Beijing100081);An Intrusion Statistic-based Anomaly Detection Method[J];Computer Engineering and Applications;2002-22
4 ZOU Tao 1,2,SUN Hongwei1,2,TIAN Xinguang1,2,LI Xuechun2(1.College of Electronic Science and Engineering,National University of Defense Technology,Changsha Hunan 410073,China;2.IP Network Technology Institute of Beijing Capitel Co.,Ltd.,Beijing 100016,China);Comparison and Analysis of Two Audit Data Reduction Methods for Intrusion Detection System[J];Computer Applications;2003-07
5 Ding Mingyue Chang Jinling Peng Jiaxiong (Huazhong University of Science and Technology);Research on Moment Invariants Algorithm[J];Journal of Data Acquisition & Processing;1992-01
6 Du Yajuan Zhang Hongcai Pan Quan (Department of Automatic Control,Northwestern Polytechnical Universi ty Xi′an,710072);Three-Dimensional Aircraft Recognition Using Moments[J];JOURNAL OF DATA ACQUISITION & PROCESSING;2000-03
7 ;Style model of memory[J];China Scientific Journal of Hearing and Speich Rehabi;2004-05
8 Liu Zhongwei Zhang Yujin (Department of Electronic Engineering,Tsinghua University,Beijing 100084);Image Retrieval Using Both Color and Texture Features[J];JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS;1999-05
9 XIAO Zheng-hong 1,2 , YIN Hao2 (1 Department of Computer Sciences and Technology, HuNan University of Arts and Science, Changde 415000 China) (2 Department of Computer Sciences and Technology, Tsinghua University, Beijing 100084);A Survey of Research On Intrusion Detection of Statistics Analysis Based on Network Traffic[J];Microelectronics & Computer;2006-05
10 WEI Na, GENG Guo-hua, ZHOU Ming-quan (Department of Computer Science, Northwest University, Xi'an 710069);An Overview of Performance Evaluation in Content-based Image Retrieval[J];Journal of Image and Graphics;2004-11
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved