Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 66. Отображено 66.
09-09-2015 дата публикации

Multiprocess parallel processing method for multisystem platform

Номер: CN104899006A
Принадлежит:

The present invention provides a technical scheme of a multiprocess parallel processing method for a multisystem platform. The method of the scheme can be used for typical functional examinations including Internet-surfing record examination, USB record examination, document examination and the like by way of parallel examination. A main process is in asynchronous communication with a plurality of functional processes through local communication pipelines, so that the efficiency is improved. Moreover, the user can freely select the types of the examination. According to the selection condition of the user, the quantity of the functional processes needed to operate can be automatically judged by way of the parallel examination.

Подробнее
02-06-2010 дата публикации

A wavelet analysis boundary processing method based on traffic statistics

Номер: CN0101217378B
Принадлежит:

The invention provides a processing method for wavelet analysis boundary based on the flow statistic and relates to a method used for solving of Hurst parameters based on the wavelet analysis and theinvention is mainly used for solving the problem of exact solving of the Hurst parameters so as to detect the DDoS attack exactly. In the method, the Mallat algorithm is applied to carry out discretewavelet decomposition, and flow statistic is done to signals of every grade in the process of multistage decomposition and the average flow is used as the extension signals; the signals waiting to bedetected after the pretreatment are set to be S is equal to (S1, S2,..., Sn), and the signal length is n, and the S1, S2, ..., Sn are the statistic flows in the same specified time interval, and the length of a wavelet filter is Wlen, and the maximum decomposable level is that MaxLev is equal to (log 2 (n/Wlen-1) rounding in the lower). By using the method provided by the invention, the Hurst parameters ...

Подробнее
24-06-2015 дата публикации

Login authentication method based on linux system

Номер: CN104735082A
Принадлежит:

The invention provides a login authentication method based on a linux system. According to the scheme, authentication management is conducted according to the linux system, a person can have access to and use the system only after passing authentication of the login authentication method, or else, a computer cannot be used; a key in the system is of a plug-in type and can be carried along with a user, safety is improved, even if knowing the pass word, the person cannot have access to the system without the key, and the safety of data of the terminal computer is guaranteed.

Подробнее
12-08-2015 дата публикации

Image Chinese character search method for multi system platform

Номер: CN104834930A
Принадлежит:

The invention provides an image Chinese character search method for multi system platforms; the method uses binary processing to effectively extract Chinese characters in an image, and processing is accurate, so the method is practical; gray level processing is carried out in advance, so the binary processing through a threshold is easy; a user can set a gray threshold according to needs, and cuts the Chinese characters and matches keywords with the Chinese characters in sequence, thus finally obtaining the characters in the image, wherein the gray threshold is convenient to adjust.

Подробнее
15-10-2014 дата публикации

Virtual machine encryption method, decryption method and encryption-decryption control system

Номер: CN104104692A
Принадлежит:

The invention discloses a virtual machine encryption method, a decryption method and an encryption-decryption control system. The virtual machine encryption method comprises the following steps: a user applies for creation of an encrypted virtual machine disk file through a client, and performs a user identity authentication process; after authentication, a virtual machine management sub-system allocates virtual machine resources to the user, and a strategy execution module creates a new virtual machine disk file; the strategy execution module performs identity authentication on a key and the strategy management sub-system, and receives the symmetric encryption key of the virtual machine disk file after the authentication succeeds; the strategy execution module transmits the symmetric encryption key to a file encryption-decryption engine to encrypt the virtual machine disk file; the file encryption-decryption engine submits the encrypted virtual machine disk file to the strategy execution ...

Подробнее
20-04-2011 дата публикации

Implementing method of network security system capable of self-updating letter of representation

Номер: CN0101309146B
Принадлежит:

Disclosed is an implementation method of a grid security system which can update the proxy certificate automatically; the implementation method is a strategic method and adopts a regular check mechanism to check the proxy certificate of the operation continuously; once the overdue proxy certificate is detected and the proxy is updated automatically to ensure the normal running of the operation. The grid security system which can update the proxy certificate automatically is mainly composed of a grid security system client, a grid security system server, a grid security system certificate updating module and a certificate repository; the proxy updating service uses the function provided by the certificate repository. From the logical viewpoint, the service can be considered as a module of the operation management system; the module records and manages the proxy certificates of the submitted operations and the operations require the proxy to be updated; therefore, the operation maintained ...

Подробнее
13-08-2008 дата публикации

Grid subjective trust processing method based on simple object access protocol

Номер: CN0101242410A
Принадлежит:

The network subjective trust processing method based on simple object access protocol is a security processing method which comprehensively computes directed at subjective trust, mainly used for solving the security problem of resource node creditability under grid computing environment. The processing method comprises the steps that: after a user logging in a grid system, the system authorizes the identification information of the user, and generates an assertion certificate to realize single-click log after the identification information is authorized; before accessing control modules to strategy match network nodes, trust nodes are selected by trust modules from subjective factors, including two trust processing modules: for eliminating malicious grid nodes with fraudulent intent, auxiary authorizing, access controlling and other objective security technology, and building a trust network under the distributed environment of grid computing.

Подробнее
23-03-2011 дата публикации

Modularization based mobile proxy grid operation migration method

Номер: CN0101308464B
Принадлежит:

A grid operation transfer method of a modular mobile agent is a mobile agent based on modularization; by rationally dividing the operation codes or making modularized design to the operation codes based on functions, the method transfers the project of each module in the codes in a planned way. Based on modularized mobile agent, by rationally dividing the operation codes or making modularized design to the operation codes based on functions, the method can transfer the project of each module in the codes in a planned way, so as to effectively reduce the data transmission amount and enable thenon-data-related code modules to be concurrently executed at each site to improve the utilization rate of grid resources and the operation executing efficiency.

Подробнее
14-04-2010 дата публикации

Dynamic access control method based on community authorisation service

Номер: CN0101257377B
Принадлежит:

A dynamic access control method based on the community authorization service uses the role-based access control RBAC module scheme for reference and proposes a dynamic access control project based onthe community authorization service aiming at the dynamic characteristic of the grid computing environment. The method realizes the resource distribution, monitoring, dynamic access control, modification to the community authorization server and database to change the user role based on the context dynamic environment and realize the dynamic and transparent access to the resource in the gridding environment and seamless integration by interacting with the resource control module. The method can well solve the access control problem brought by dynamic character in the gridding environment and the transparent access to the resource.

Подробнее
11-08-2010 дата публикации

Gridding data transcription generation method based on storage alliance subset partition

Номер: CN0101800768A
Принадлежит:

The invention relates to a gridding data transcription generation method based on storage alliance subset partition, in particular to a gridding data transcription creating and distributing method on a gridding node and according to the gridding user data access behavioral characteristics; the basic thought of the method is that the data gridding node is divided into a plurality of subsets which have good network transmission speed, by utilizing the characteristic that network delay is less in each subset, the transcription creating number is reduced, so as to reduce the gridding system storage expense; meanwhile, caching strategy is utilized, the transcription can be rapidly generated in each gridding node subset; finally, the optimal client strategy is utilized, the position of the data transcription in the gridding node subset is regulated, so as to form a good data transcription layout.

Подробнее
01-09-2010 дата публикации

Authorization trust method based on trust under grid environment

Номер: CN0101242277B
Принадлежит:

An authorization entrusting method based on the degree of belief in grid environment is a security solving scheme for distributed computing. The method is mainly used to solve the security problem for grid computing, and comprises the steps: a resource supply node generates an entrusting policy map following the 6 principles to the entrusting role or authority thereof based on the entrusting policy; requesting the consignor to send an entrusting policy collection as a successor node by an abandonee to a consignor; the consignor synthesizes the entrusting policy collection submitted by the abandonee for the entrusting policy map; if the entrusting policy collection has an entrusting policy that a precursor node is a detected object by a detector, and the degree of belief of the abandonee can satisfy a degree of belief threshold value, a clientage to the abandonee can be formed; if the entrusting policy collection has not an entrusting policy that a precursor node is a detected object by ...

Подробнее
13-08-2008 дата публикации

An efficient filtering method for multi-language network data packets

Номер: CN0101242409A
Принадлежит:

The data packet processing method under multiple programming languages environment is a solution for network security and software development technology, mainly used for solving the development and application problems of a network data packet processing program, and belongs to the field of computer network and software engineering technology. The invention also provides a code implementation of a filter transplantable to a router. The monitoring and processing of network data packet have always been an important and key technology in network security field. The processing scheme of the invention is provided for quickly and effectively processing network data packet, and protecting our server and host from network attack. Therefore, multiple languages are employed for implementation, optimal filtering factors are added, so that the filtering efficiency is maximally improved. The code implementation of the filter can be used on multiple servers and personal hosts under complex network environment ...

Подробнее
13-08-2008 дата публикации

Authorization trust method based on trust under grid environment

Номер: CN0101242277A
Принадлежит:

An authorization entrusting method based on the degree of belief in grid environment is a security solving scheme for distributed computing. The method is mainly used to solve the security problem for grid computing, and comprises the steps: a resource supply node generates an entrusting policy map following the 6 principles to the entrusting role or authority thereof based on the entrusting policy; requesting the consignor to send an entrusting policy collection as a successor node by an abandonee to a consignor; the consignor synthesizes the entrusting policy collection submitted by the abandonee for the entrusting policy map; if the entrusting policy collection has an entrusting policy that a precursor node is a detected object by a detector, and the degree of belief of the abandonee can satisfy a degree of belief threshold value, a clientage to the abandonee can be formed; if the entrusting policy collection has not an entrusting policy that a precursor node is a detected object by ...

Подробнее
13-08-2008 дата публикации

Grid secure processing method based on extensive market language security policy

Номер: CN0101242263A
Принадлежит:

A grid security treating method based on an expandable markup language security policy is a security solution for a distributed computing. The method is mainly used to solve a security problem for grid computing, uses expandable markup language key management technology for the transmission and validate of grid key, uses expandable markup language security specifications for data transmitting security among grids, and uses simple point registration for cross-domain access between security domains among grids, specifically comprising: 1) key transmission and expandable markup language data security transmission; 2) actualization of whole system; and the system for actualizing whole grid security based on XML security policy in a grid computing environment, by using the method provided in the invention, can achieve an integrality and a confidentiality of data transmission between grid servers, and achieve a simple point registration for a user.

Подробнее
09-12-2009 дата публикации

Graphical development method used for grid computing

Номер: CN0101599012A
Принадлежит:

A graphical development method used for grid computing is a grid workflow development method based on graphics, and aims at simplifying the verbosity of various workflow developments at present and separating a transaction requirement layer from a transaction realization layer. The development of the grid workflow is displayed in the manner of web page and the dynamic characteristic of the grid workflow by Flex technology. In the process of grid workflow design, a transaction display layer is separated form the transaction realization layer, the transaction display layer is displayed by a graphic interface, and grid resource classification information and grid workflow model information read from a resource pool are displayed simultaneously.

Подробнее
27-10-2010 дата публикации

A construction method for open multi-source data packet capturing

Номер: CN0101242408B
Принадлежит:

The open type multi-source data packet capture construction method is a solution for application-oriented network data packet capture and application process under network environment, used for solving adaptation problem of multiple data format input and multiple data processing output. The method comprises the steps of: dividing a system into a data packet capture layer, a middle data transmission layer and data processing application layers, according to demand analysis; defining a data structure of the middle data transmission layer, deciding a communication interface between the middle data transmission layer and direct interactive data packet extracts in the middle data transmission layer and the data packet capture layer; and defining a communication interface between the data processing application layers and the middle data transmission layer. The data processing application layers are based on data of the middle data transmission layer, need a unified data structure, receive data ...

Подробнее
27-05-2009 дата публикации

Method for playing and enquiring mobile communication terminal image and sound based on mobile grid

Номер: CN0101442560A
Принадлежит:

The invention relates to an audio-video playing inquiry method for a mobile communication terminal based on a mobile grid, in particular to a mechanism which is used in the mobile communication terminal, uses the mobile grid as basis and carries out effective sorting on the mobile communication terminal according to a playing habit of a terminal user. A mobile terminal part adopts PDA of a pre-mounted WIN CE operating system and simultaneously pre-mounts client software of the grid. The mobile terminal is accessed to a grid WEB portal through wireless application based on a WAP protocol. A grid infrastructure part comprises a central server, a storage server, an information server and a digital media server and is provided with a GT4 software package. SS, IS and DMS can belong to different DOMAIN management domains respectively. The central server is realized through a high-performance server; the inside of the central server can realize service registration, management, binding and a series ...

Подробнее
03-09-2008 дата публикации

Dynamic access control method based on community authorisation service

Номер: CN0101257377A
Принадлежит:

A dynamic access control method based on the community authorization service uses the role-based access control RBAC module scheme for reference and proposes a dynamic access control project based on the community authorization service aiming at the dynamic characteristic of the grid computing environment. The method realizes the resource distribution, monitoring, dynamic access control, modification to the community authorization server and database to change the user role based on the context dynamic environment and realize the dynamic and transparent access to the resource in the gridding environment and seamless integration by interacting with the resource control module. The method can well solve the access control problem brought by dynamic character in the gridding environment and the transparent access to the resource.

Подробнее
31-08-2011 дата публикации

Dynamic self-adapting graticule data migration method

Номер: CN0101299198B
Принадлежит:

A dynamic self-adaptive grid data migration method is a dynamic self-adaptive mechanism when the grid data are required to migrate, which is mainly composed of a data migration controller, a target node selector, an index analyzer, a data migration operation kernel, and the like. When the data at a certain node in the grid cannot conform to the data service quality of the current user, or cause the network bandwidth waste, the data at the node are required to migrate at this time, by selecting factors such as the band-width the node reaches, the local management system property of the node, the data access load of the node and the size of the data to be migrated at present, and then preprocessing these factors, using the gene expression programming algorithm idea to dig out the functional relation between the target node and these factors, thereby the selection of the target node can be better executed by the functional relation obtained by digging.

Подробнее
03-08-2011 дата публикации

File fast transmission method based on data grid under campus network circumstance

Номер: CN0101483650B
Принадлежит:

The invention discloses a quick transmitting method of data files of a campus network based on data grids. By adding interference mechanism to the FTP system which is widely used in common campus networks, a transition to a data grid environment can be performed quickly, files can be transmitted quickly by using the advantages of the data grids. Sources of the original FTP system can be imported into the new data grid environment automatically by the running of a system discovering module, a source discovering module, a function discovering module, a conversion module, a request response converting module and the like, and at the same time, existing data transmission software is compatible in the running process of data grids, therefore, the data grid using barrier is reduced, and disadvantages that the data grid has a long period of application development, is hard to combine with existing sources, is difficult for users to master, and the like are overcome.

Подробнее
19-11-2008 дата публикации

Implementing method of network security system capable of self-updating letter of representation

Номер: CN0101309146A
Принадлежит:

Disclosed is an implementation method of a grid security system which can update the proxy certificate automatically; the implementation method is a strategic method and adopts a regular check mechanism to check the proxy certificate of the operation continuously; once the overdue proxy certificate is detected and the proxy is updated automatically to ensure the normal running of the operation. The grid security system which can update the proxy certificate automatically is mainly composed of a grid security system client, a grid security system server, a grid security system certificate updating module and a certificate repository; the proxy updating service uses the function provided by the certificate repository. From the logical viewpoint, the service can be considered as a module of the operation management system; the module records and manages the proxy certificates of the submitted operations and the operations require the proxy to be updated; therefore, the operation maintained ...

Подробнее
09-09-2015 дата публикации

Auditing system and method in virtual machine environment

Номер: CN104899078A
Принадлежит:

The invention provides an auditing system and method in a virtual machine environment, and belongs to the technical field of computer system virtualization. The auditing system in the virtual machine environment comprises a virtualization management platform, an auditing engine, an auditing center, a virtualization management interface and a virtual machine manager; the virtualization management platform sends a management operation from a system administrator to the auditing engine; the auditing engine performs event analysis and event processing on the management operation, forms an auditing event from the processed result and sends the auditing event to the auditing center; the auditing engine and the virtualization management interface are in data communication; the data is sent to the virtual machine manager through the virtualization management interface.

Подробнее
26-08-2015 дата публикации

Monitoring system and method in virtual machine environment

Номер: CN104866407A
Принадлежит:

The invention provides a monitoring system and method in a virtual machine environment. The system comprises a monitoring module, an inter-domain communication module, a rule base, an analyzing module, a response service module, a response accepting module, an event processing module and the like. The monitoring system and method in the virtual machine environment is used for security protection of the virtual machine running environments of users, can manage and control resources used by virtual machines or even monitor processes inside the virtual machines, and also, can correct content of virtual machine disks of the virtual machines, thereby ensuring the monitoring reliability when the monitoring module is deployed inside a virtual machine manager; meanwhile, combined with the virtual machine introspection technology, the monitoring system and method in virtual machine environment can effectively detect the kernel space of monitored virtual machine and further avoid intrusion.

Подробнее
19-11-2008 дата публикации

Self-adapting method of grid environment facing to proxy programming calculation task

Номер: CN0101308463A
Принадлежит:

Disclosed is a self-adapting method for facing the agent programming computing tasks in a grid environment; the method is based on the existing open grid system structure and supports the management and movement of the agent by deploying an agent management service, an agent information service and a GA Container; the agent management service and the agent information service are two grid services which meet the FIPA and WSRF norms. By expanding the existing grid operation types, namely, increasing a new operation type , the invention enables the creating process of a service agent and the creating process of the existing grid task to be completely compatible; at the same time, through the defining of the tasks facing the agent programming, as well as the movement and positioning process of the agent, the agent task is self-adaptive to the changes of grid environment and intelligent mobile decision.

Подробнее
14-07-2010 дата публикации

Grid secure processing method based on extensive market language security policy

Номер: CN0101242263B
Принадлежит:

A grid security treating method based on an expandable markup language security policy is a security solution for a distributed computing. The method is mainly used to solve a security problem for grid computing, uses expandable markup language key management technology for the transmission and validate of grid key, uses expandable markup language security specifications for data transmitting security among grids, and uses simple point registration for cross-domain access between security domains among grids, specifically comprising: 1) key transmission and expandable markup language data security transmission; 2) actualization of whole system; and the system for actualizing whole grid security based on XML security policy in a grid computing environment, by using the method provided in the invention, can achieve an integrality and a confidentiality of data transmission between grid servers, and achieve a simple point registration for a user.

Подробнее
03-09-2008 дата публикации

Dynamic accesses control method based on trust model

Номер: CN0101257386A
Принадлежит:

A dynamic access control method based on the trust model is a security solution of the dynamic access control, which solves the problem how the users screen out the trusty node in the gridding and meets the requirement of the user massive operations by optimized distribution of the mission submitted by users according to the ability of respective resource node. The method applies the trust model and the trust evaluation control mechanism to implement the security protection to the resource provider and resource consumer in the gridding community and provide a quality guarantee to the mission submitted. The method applies the trust model into the access control mechanism and applies trust model to solves the problem how the users screen out the resource node according with the user requirement in the gridding so as to accomplish the emission submitted by users and solve the security of cooperation and resource sharing between the gridding user and gridding entity in the virtual organization ...

Подробнее
23-09-2015 дата публикации

Program self-protection and data leakage preventing method of Linux system

Номер: CN104933356A
Принадлежит:

The invention provides a technical scheme of a program self-protection and data leakage preventing method of a Linux system. According to the method in the scheme, self files are hidden, system files and catalogues are locked so as to be prevented from being deleted, renamed and emptied, and outward data transmission is stopped. Not only the self security of the program is effectively protected to protect the program against the infringement, but also the data leakage in the Linux system can be prevented to protect the data security of a user.

Подробнее
03-08-2011 дата публикации

Method for playing and enquiring mobile communication terminal image and sound based on mobile grid

Номер: CN0101442560B
Принадлежит:

The invention relates to an audio-video playing inquiry method for a mobile communication terminal based on a mobile grid, in particular to a mechanism which is used in the mobile communication terminal, uses the mobile grid as basis and carries out effective sorting on the mobile communication terminal according to a playing habit of a terminal user. A mobile terminal part adopts PDA of a pre-mounted WIN CE operating system and simultaneously pre-mounts client software of the grid. The mobile terminal is accessed to a grid WEB portal through wireless application based on a WAP protocol. A grid infrastructure part comprises a central server, a storage server, an information server and a digital media server and is provided with a GT4 software package. SS, IS and DMS can belong to different DOMAIN management domains respectively. The central server is realized through a high-performance server; the inside of the central server can realize service registration, management, binding and aseries ...

Подробнее
16-03-2011 дата публикации

Grid data copy generation method based on time and space limitation

Номер: CN0101340458B
Принадлежит:

A grid data transcription generation method which is based on time and spatial locality is the method for determining the number of data transcriptions in a grid and the distribution thereof on grid nodes based on behavioral characteristics of data access of a grid user, therefore, the method of the generation of the data transcriptions is carried out. The method determines the number of the datatranscriptions in the grid and the distribution thereof on the grid nodes based on the behavioral characteristics of the data access of the grid user. The basic idea is to utilize the time locality distribution of the user access data to obtain the spatial locality among the data in the grid, then the number of the data transcriptions and the distribution principles are determined based on the spatial locality, and the various transcriptions of the data are further replicated and distributed. Therefore, the number of the transcriptions needed by the data and the distribution method of the transcriptions ...

Подробнее
15-07-2009 дата публикации

File fast transmission method based on data grid under campus network circumstance

Номер: CN0101483650A
Принадлежит:

The invention discloses a quick transmitting method of data files of a campus network based on data grids. By adding interference mechanism to the FTP system which is widely used in common campus networks, a transition to a data grid environment can be performed quickly, files can be transmitted quickly by using the advantages of the data grids. Sources of the original FTP system can be imported into the new data grid environment automatically by the running of a system discovering module, a source discovering module, a function discovering module, a conversion module, a request response converting module and the like, and at the same time, existing data transmission software is compatible in the running process of data grids, therefore, the data grid using barrier is reduced, and disadvantages that the data grid has a long period of application development, is hard to combine with existing sources, is difficult for users to master, and the like are overcome.

Подробнее
03-12-2008 дата публикации

Gridding resource intelligent monitoring method based on feedback

Номер: CN0101316280A
Принадлежит:

The invention discloses an intelligent monitoring method based on network resources fed back, which utilizes a vague mathematics method to analyze data fed back, sets a new polling period according to processing results and leads resource real-time and load to be well balanced on the basis of adopting fixed period polling monitoring. Therefore, the problems of the decrease of the performance of a system or poor monitoring real-time caused by fixed period monitoring in a grid monitoring system are solved, performance data stored in a directory service is more accurate, and resource consumption and the updating operation times of resource monitoring are reduced.

Подробнее
09-07-2008 дата публикации

A wavelet analysis boundary processing method based on traffic statistics

Номер: CN0101217378A
Принадлежит:

The invention provides a processing method for wavelet analysis boundary based on the flow statistic and relates to a method used for solving of Hurst parameters based on the wavelet analysis and the invention is mainly used for solving the problem of exact solving of the Hurst parameters so as to detect the DDoS attack exactly. In the method, the Mallat algorithm is applied to carry out discrete wavelet decomposition, and flow statistic is done to signals of every grade in the process of multistage decomposition and the average flow is used as the extension signals; the signals waiting to be detected after the pretreatment are set to be S is equal to (S1, S2,..., Sn), and the signal length is n, and the S1, S2, ..., Sn are the statistic flows in the same specified time interval, and the length of a wavelet filter is Wlen, and the maximum decomposable level is that MaxLev is equal to (log 2 (n/Wlen-1) rounding in the lower). By using the method provided by the invention, the Hurst parameters ...

Подробнее
13-04-2011 дата публикации

Threshold and key-based authorization method in software as a service (SaaS)

Номер: CN0102012989A
Принадлежит:

The invention discloses a threshold and key-based authorization method in software as a service (SaaS), which is a solution of data security in application of enhancement software as a service (SaaS). The authorization method is mainly used for providing objective security insurance for an SaaS user from technical means so as to solve the problems in protecting data security of SaaS enterprise users. By using the authorization method provided by the invention, a very good method can be naturally provided for solving SaaS security problems. The authorization method is a strategic method, and in the method, keys are divided and an SaaS client masters part of the keys so that an SaaS software provider and an SaaS operator cannot perform certain advanced data operation without the participation of the SaaS client. The authorization method aims to convert key authentication of the client into client authorization, thereby improving security information of the user, and increasing the safety ...

Подробнее
09-05-2012 дата публикации

A flood request attaching filtering method based on the stateless open source core

Номер: CN0101217547B
Принадлежит:

The invention relates to an open source kernel based filtration method of stateless flooding request attacks, which comprises the following steps: the rule list of the filtration of an open source firewall is initialized to generate a white list and a blacklist; a main control module distinguishes and processes the request message and the reset message respectively; the Cookie value of the request message is calculated and is added to a text document library, and a confirmation message is sent back to the message origin; as for the reset message, the confirmation number value thereof is extracted and searched in the text document library after being subtracted by one; a text document library maintenance module deletes the expired information record in every interval t, and informs a firewall operation module to add the address of the origin to the blacklist; the firewall operation module gathers list items when the number of the list items in the white list or the blacklist are very large ...

Подробнее
08-12-2010 дата публикации

An efficient filtering method for multi-language network data packets

Номер: CN0101242409B
Принадлежит:

The data packet processing method under multiple programming languages environment is a solution for network security and software development technology, mainly used for solving the development and application problems of a network data packet processing program, and belongs to the field of computer network and software engineering technology. The invention also provides a code implementation ofa filter transplantable to a router. The monitoring and processing of network data packet have always been an important and key technology in network security field. The processing scheme of the invention is provided for quickly and effectively processing network data packet, and protecting our server and host from network attack. Therefore, multiple languages are employed for implementation, optimal filtering factors are added, so that the filtering efficiency is maximally improved. The code implementation of the filter can be used on multiple servers and personal hosts under complex networkenvironment ...

Подробнее
23-03-2011 дата публикации

Self-adapting method of grid environment facing to proxy programming calculation task

Номер: CN0101308463B
Принадлежит:

Disclosed is a self-adapting method for facing the agent programming computing tasks in a grid environment; the method is based on the existing open grid system structure and supports the management and movement of the agent by deploying an agent management service, an agent information service and a GA Container; the agent management service and the agent information service are two grid services which meet the FIPA and WSRF norms. By expanding the existing grid operation types, namely, increasing a new operation type , the invention enables the creating process of a service agent andthe creating process of the existing grid task to be completely compatible; at the same time, through the defining of the tasks facing the agent programming, as well as the movement and positioning process of the agent, the agent task is self-adaptive to the changes of grid environment and intelligent mobile decision.

Подробнее
04-03-2009 дата публикации

Method for selecting data grid copy

Номер: CN0101378406A
Принадлежит:

The invention relates to a selection method of a data grid copy, under data grid environment, different data are abstracted as data elements, each copy of which has different physical copy name respectively; after the copies are positioned, a best copy is selected for being used by grid for operation and execution, which has crucial influence on the performance of the grid. The elements such as data path, node loading, nodal distance and the like are comprehensively considered, and a copy selection proposal is provided. The implementation procedure is as follows: each copy name is coded and distributed to each initial population, objective functions are generated for each individual of the initial population, and the objective functions are combined with direct probability to educe fitness functions, according to which the degree of the copy is judged. Middle populations are produced by intersection and are mutated. Part of optimum solution of the current population is selected and combined ...

Подробнее
16-02-2011 дата публикации

Method for detecting dynamic gridding instruction based on artificial immunity

Номер: CN0101299691B
Принадлежит:

A method for detecting dynamic gridding instruction based on artificial immunity, is a method for detecting instruction facing to gridding which takes use the artificial immunity technique for reference. According to the dynamic and real time requirement of the instruction detection under gridding surroundings, the method takes the prior clonal selection algorithm as main body, combines negative selection, clonal selection, affinity maturation and memory detector gene bank method, so at to dynamic handle the instruction detection under gridding surroundings. The method includes a dynamic detector evolvement process and a gridding instruction detection process which are based on artificial immunity, which is characterized in by using the artificial immunity technique for reference, and combining the negative selection, clonal selection, affinity maturation and memory detector gene bank method; firstly obtaining an evolvement matured detector; and then dynamically handling the instruction ...

Подробнее
05-03-2014 дата публикации

Multi-mechanism hierarchical attribute-based encryption method applied to cloud storage

Номер: CN103618729A
Принадлежит:

The invention discloses a multi-mechanism hierarchical attribute-based encryption method applied to cloud storage. The method comprises the steps that authorization centers determine recursion depths, select bilinear mappings and bilinear groups, generate a system MK and a PK, reserve the MK, and disclose the PK; the authorization centers allocate a master key authorized at the next stage (the step is executed when a subcenter exists); the central authorization center receives a user identity file and generates an attribute set A for the user identity file; the authorization centers generate a secret key SK for a user and distribute the SK to the user; a data owner DO generates an access strategy tree, the file is encrypted through an Encrypt method, and a ciphertext CT is uploaded to the cloud end; the user sends a request to the cloud end to have access to the file, the CT of the file is sent back through the cloud end, the user decrypts the file by means of the SK, and only when the ...

Подробнее
07-01-2009 дата публикации

Grid data copy generation method based on time and space limitation

Номер: CN0101340458A
Принадлежит:

A grid data transcription generation method which is based on time and space locality is the method for determining the number of data transcriptions in a grid and the distribution thereof on grid nodes and carrying out the generation of the data transcriptions based on behavioral characteristics of data access of a grid user. The method determines the number of the data transcriptions in the grid and the distribution thereof on the grid nodes based on the behavioral characteristics of the data access of the grid user. The basic idea is to utilize the time locality distribution of the user access data to obtain the space locality among the data in the grid, then the number of the data transcriptions and the distribution principles are determined based on the space locality and the various transcriptions of the data are further replicated and distributed. Therefore, the number of the transcriptions needed by the data and the distribution method of the transcriptions can be obtained according ...

Подробнее
09-07-2008 дата публикации

A detecting method of distributed denial of service attacking based on improved sequence scale regulation

Номер: CN0101217377A
Принадлежит:

The invention provides a detection method for distributed denial of service attack based on the adjustment of improved sequence scales and the method is a solution to the network security and software development technology and is mainly used for solving the problem of detection and prevention of DDoS attack. The detection method comprises the following steps that the invention is realized in the Linux operating system environment by adopting a compatible C/C++ encoding mode according to the requirements of software projects and a detector having the realization characteristics of other modules data interaction; the detector obtains data from a bottom packet catcher every time interval, otherwise the implementation is done in the 3) step; the detector calls the detection method to calculate the Hurst value; the detector judges whether the attack exists by comparing the model of distributed denial of service attack according to the present calculated Hurst value; if attack exists, a related ...

Подробнее
27-10-2010 дата публикации

Data index method for schoolyard grid data transmission service

Номер: CN0101442496B
Принадлежит:

The invention discloses an index method for data in data transmission service in campus grid, which provides an index mechanism in campus GridFTP under network environment and is convenient for the discovery of resources and the inquiry of the data. A system structure under the mechanism comprises a data transmission log, a monitor and an index server. The key point comprises that the relation among a resource server, the index server and a GridFTP server is established. A data resource list acquired after MDS and ganglia are integrated is shown in figure 5, a GridFTP site is established in the index server, and information of the data resource list is mapped into the GridFTP site to be convenient for the GridFTP server to inquire data resources.

Подробнее
28-09-2011 дата публикации

Triple play broadband access equipment embedded management method

Номер: CN0102201956A
Принадлежит:

The invention discloses a triple play broadband access equipment embedded management method. In the method, intensive study is made based on the research and development of a plurality of products such as optical network unit (ONU), multimedia over coax alliance (MOCA), home plug power line alliance Ethernet over coax (HomePlug EOC) and the like, an isomerism-oriented extensible embedded method for a plurality of pieces of fiber access equipment is researched and developed based on general characteristics in the functions of a plurality of pieces of broadband access equipment of triple play, and unified management over the plurality of pieces of equipment such as the ONU, EOC, a Cable Modem, a local area network and the like can be realized.

Подробнее
17-02-2010 дата публикации

Dynamic accesses control method based on trust model

Номер: CN0100591015C
Принадлежит:

A dynamic access control method based on the trust model is a security solution of the dynamic access control, which solves the problem how the users screen out the trusty node in the gridding and meets the requirement of the user massive operations by optimized distribution of the mission submitted by users according to the ability of respective resource node. The method applies the trust model and the trust evaluation control mechanism to implement the security protection to the resource provider and resource consumer in the gridding community and provide a quality guarantee to the mission submitted. The method applies the trust model into the access control mechanism and applies trust model to solves the problem how the users screen out the resource node according with the user requirement in the gridding so as to accomplish the emission submitted by users and solve the security of cooperation and resource sharing between the gridding user and gridding entity in the virtual organization ...

Подробнее
03-02-2010 дата публикации

Grid load predicting method based on support vector regression machine

Номер: CN0101639793A
Принадлежит:

The invention relates to a grid load predicting method based on a support vector regression machine. The method comprises the following steps: firstly, carrying out automatic regression (AR) modelingon history property data of nodes by a time sequence method; evaluating dimensions of the input vector in SVR according to orders of an AR model; performing SVR learning on the history data, and constructing a regression function of SVR; predicting the property of the node at the next time according to the regression function and the measured history property data, and regulating the regression function of SVR on line according to the regression function. The method can provide a data reference for dispatch, property optimization and the like of grid resources, avoid passive and blind task dispatch and enhance the efficiency of the grid environment.

Подробнее
27-05-2009 дата публикации

Data index method for schoolyard grid data transmission service

Номер: CN0101442496A
Принадлежит:

The invention discloses an index method for data in data transmission service in campus grid, which provides an index mechanism in campus GridFTP under network environment and is convenient for the discovery of resources and the inquiry of the data. A system structure under the mechanism comprises a data transmission log, a monitor and an index server. The key point comprises that the relation among a resource server, the index server and a GridFTP server is established. A data resource list acquired after MDS and ganglia are integrated is shown in figure 5, a GridFTP site is established in the index server, and information of the data resource list is mapped into the GridFTP site to be convenient for the GridFTP server to inquire data resources.

Подробнее
06-10-2010 дата публикации

Realization method for cross-grid secure platform based on mobile agent and assertion

Номер: CN0101242272B
Принадлежит:

An implement method for a grid cross-domain security platform based on mobile agent and assertion is an implement scheme for a grid cross-domain security platform based on mobile agent and assertion. The invention is mainly used to solve security problem of grid computing, performs operation autonomous migration by using a mobile agent, and realizes a cross-domain simple point registration by using assertion, and the method comprises a domain implement method and a cross-domain implement for constructing a security access system of grid user in a grid environment to grid service. By using themethod, the grid user, by an authentication policy, the simple point registration and an access control policy, realizes a security access of grid user to grid service and a security access by assertion between virtual organization domain to achieve a reduce of alternation between grid user and grid service, and to provide a more reliable assurance for grid computing environment.

Подробнее
13-05-2009 дата публикации

Synergistic learning invasion detection method used for data gridding

Номер: CN0101431416A
Принадлежит:

A method of collaborative learning intrusion detection applied in data grid, which draws advantages of current popular technologies like distributed detection in intrusion detection domain and ensemble learning etc., combines method of abnormal detection and feature detection, adopts BP neural network collaborative learning for complementary advantages, and makes intrusion detection system based on the method applies to data grid environment. Deploy a plurality of strong detectors integrated by BP neural network in center-nod according to security requirement of different kinds of nods in data grid by the invention, and collect new intrusion sample feature come from everywhere whenever possible to make sure about the security of important copy in center-nod. Deploy collaborative intrusion analysis engine in center-nod meanwhile to provide collaborative detection service for all normal nods. A plurality of normal nods are organized by center-nod for collaborative calculation and suspected ...

Подробнее
05-03-2014 дата публикации

User timely revocation method based on attribute-based encryption in cloud environment

Номер: CN103618609A
Принадлежит:

The invention discloses a user timely revocation method based on attribute-based encryption in a cloud environment. The method comprises the steps that secret keys are divided into two parts, one part is sent to a requiring user, the other part is stored by a proxy server end, a proxy server can carry out recomputation on a part of the secret key stored in the proxy server when the requiring user sends an access request to the proxy server, different recomputation methods are chosen according to a revocation list stored in the proxy server, and decryption can be achieved only through the secret keys obtained by legal users. According to the method, timely revocation can be achieved by the user, secret key updating operation is transferred into the proxy server, pressure on an authorization mechanism is relieved, updating of the secrete keys of other legal users is not needed, workloads for updating the secret keys through the proxy server are lightened, and revocation efficiency is improved ...

Подробнее
19-11-2008 дата публикации

Method for enhancing grid data access performance

Номер: CN0101309296A
Принадлежит:

Disclosed is a method which improves the grid data access performance; the method is a novel grid data transmission system and integrates the combination of the C/S technology and the P2P technology to solve the problem of improving the data access performance under the grid environment. A plurality of Group Servers are in the G-GridFtp environment; how to ensure that all the Group servers based on the peer-to-peer relation can maintain the same directory database to describe the data information of the G-GridFtp for the users; the method proposes the DGS (Designated Group Server ) concept and the BDGS (Backup Designated Group Server) concept; when the node updating occurs in the G-GridFtp, the DGS sends the received directory database update message to other Group Servers in the G-GridFtp; besides, in a certain time period, if no node updating occurs in the G-GridFtp, the DGS still broadcasts the special directory database information to declare the existence of the DGS.

Подробнее
08-07-2015 дата публикации

Method for increasing new functions of Linux system kernel

Номер: CN104765634A
Принадлежит:

The invention provides a method for increasing new functions of a Linux system kernel. According to the technical scheme, an original functional function, a template function, a new functional function, a corresponding skipping area and a corresponding skipping-back area are involved in the method, so that the method does not rely on kernel support and system call lists, repeated self-definition is supported, the call of the original functional function is guaranteed, and the method is convenient to popularize.

Подробнее
08-07-2015 дата публикации

Manufacturing method and decompression installation method of Linux system self-decompression installation packet

Номер: CN104765618A
Принадлежит:

The invention provides a manufacturing method and a decompression installation method of a Linux system self-decompression installation packet. The manufacturing method and the installation method of the general installation packet are included in the scheme. By means of the methods, a current operating system environment can be identified, configuration information of a user is received, and installation is completed according to the configuration information without requiring the user to learn a Linux command.

Подробнее
05-11-2008 дата публикации

Dynamic self-adapting graticule data migration method

Номер: CN0101299198A
Принадлежит:

A dynamic self-adaptive grid data migration method is a dynamic self-adaptive mechanism when the grid data are required to migrate, which is mainly composed of a data migration controller, a target node selector, an index analyzer, a data migration operation kernel, and the like. When the data at a certain node in the grid cannot conform to the data service quality of the current user, or cause the network bandwidth waste, the data at the node are required to migrate at this time, by selecting factors such as the band-width the node reaches, the local management system property of the node, the data access load of the node and the size of the data to be migrated at present, and then preprocessing these factors, using the gene expression programming algorithm idea to dig out the functional relation between the target node and these factors, thereby the selection of the target node can be better executed by the functional relation obtained by digging.

Подробнее
03-12-2008 дата публикации

Grid node excitation method

Номер: CN0101315693A
Принадлежит:

The invention relates to a grid node exciting method which is based on a management model of the organization of human society; the grid node is accessed into grid environment, thus accessing into grid society; the structural model of the grid society comprises a seller node, a buyer node, a grid service company, a seller node registration catalog, a buyer node registration catalog, a grid service registration catalog, an arbitration agency and a grid bank; based on the grid node exciting method of human society, the buyer node which obtains services and the seller node which provides resources are distinguished from each other, the seller node which provides resources and a grid service initiator node which organizes and provides services are distinguished from each other, the grid service initiator node which organizes and provides the services initials and forms the grid service company and the grid service company provides services for the buyer node; each node such as a computer, a ...

Подробнее
03-08-2011 дата публикации

Rough set-based mass data partitioning method

Номер: CN0102142031A
Принадлежит:

The invention relates to a rough set-based mass data partitioning method, in particular to a method for partitioning mass data efficiently by exerting the advantage of a rough set in the aspect of processing incomplete and inaccurate information fully according to the characteristic of the mass data. In the strategic scheme, the optimal reduction is found by a bisearch-based optimal attribute reduction algorithm in a mass data set, and the mass data set is subjected to optimal partitioning by an attribute reduction-based rough set mass data partitioning algorithm according to the reduction; and the partitioned data can be used for the subsequent processing. The rough set-based mass data partitioning method is mainly applied in the field of data mining.

Подробнее
22-12-2010 дата публикации

A detecting method of distributed denial of service attacking based on improved sequence scale regulation

Номер: CN0101217377B
Принадлежит:

The invention provides a detection method for distributed denial of service attack based on the adjustment of improved sequence scales and the method is a solution to the network security and software development technology and is mainly used for solving the problem of detection and prevention of DDoS attack. The detection method comprises the following steps that the invention is realized in theLinux operating system environment by adopting a compatible C/C++ encoding mode according to the requirements of software projects and a detector having the realization characteristics of other modules data interaction; the detector obtains data from a bottom packet catcher every time interval, otherwise the implementation is done in the 3) step; the detector calls the detection method to calculate the Hurst value; the detector judges whether the attack exists by comparing the model of distributed denial of service attack according to the present calculated Hurst value; if attack exists, a related ...

Подробнее
28-09-2011 дата публикации

Family intelligent terminal system

Номер: CN0102201955A
Принадлежит:

The invention discloses a family intelligent terminal system which employs the embedded technology. Functions of network access, control and video decoding are integrated in an Ethernet over Coax (EOC) head end so as to realize a home intelligent gateway, the control of each terminal can and bear functions of three nets fusion businesses, such as VOIP (voice over internet protocol), IPTV( internet protocol television) and the like. There are interfaces for home security. A plurality of wired and wireless accesses, family comprehensive information managements and a multimedia processing center are formed. Many services can be provided for consumers, such as entertainment, information and intelligent control for extensible household electrical appliances.

Подробнее
19-11-2008 дата публикации

Modularization based mobile proxy grid operation migration method

Номер: CN0101308464A
Принадлежит:

A grid operation transfer method of a modular mobile agent is a mobile agent based on modularization; by rationally dividing the operation codes or making modularized design to the operation codes based on functions, the method transfers the project of each module in the codes in a planned way. Based on modularized mobile agent, by rationally dividing the operation codes or making modularized design to the operation codes based on functions, the method can transfer the project of each module in the codes in a planned way, so as to effectively reduce the data transmission amount and enable the non-data-related code modules to be concurrently executed at each site to improve the utilization rate of grid resources and the operation executing efficiency.

Подробнее
13-08-2008 дата публикации

A construction method for open multi-source data packet capturing

Номер: CN0101242408A
Принадлежит:

The open type multi-source data packet capture construction method is a solution for application-oriented network data packet capture and application process under network environment, used for solving adaptation problem of multiple data format input and multiple data processing output. The method comprises the steps of: dividing a system into a data packet capture layer, a middle data transmission layer and data processing application layers, according to demand analysis; defining a data structure of the middle data transmission layer, deciding a communication interface between the middle data transmission layer and direct interactive data packet extracts in the middle data transmission layer and the data packet capture layer; and defining a communication interface between the data processing application layers and the middle data transmission layer. The data processing application layers are based on data of the middle data transmission layer, need a unified data structure, receive data ...

Подробнее
05-11-2008 дата публикации

Method for detecting dynamic gridding instruction based on artificial immunity

Номер: CN0101299691A
Принадлежит:

A method for detecting dynamic gridding instruction based on artificial immunity, is a method for detecting instruction facing to gridding which takes use the artificial immunity technique for reference. According to the dynamic and real time requirement of the instruction detection under gridding surroundings, the method takes the prior clonal selection algorithm as main body, combines negative selection, clonal selection, affinity maturation and memory detector gene bank method, so at to dynamic handle the instruction detection under gridding surroundings. The method includes a dynamic detector evolvement process and a gridding instruction detection process which are based on artificial immunity, which is characterized in by using the artificial immunity technique for reference, and combining the negative selection, clonal selection, affinity maturation and memory detector gene bank method; firstly obtaining an evolvement matured detector; and then dynamically handling the instruction ...

Подробнее
13-08-2008 дата публикации

Realization method for cross-grid secure platform based on mobile agent, assertion

Номер: CN0101242272A
Принадлежит:

An implement method for a grid cross-domain security platform based on mobile agent and assertion is an implement scheme for a grid cross-domain security platform based on mobile agent and assertion. The invention is mainly used to solve security problem of grid computing, performs operation autonomous migration by using a mobile agent, and realizes a cross-domain simple point registration by using assertion, and the method comprises a domain implement method and a cross-domain implement for constructing a security access system of grid user in a grid environment to grid service. By using the method, the grid user, by an authentication policy, the simple point registration and an access control policy, realizes a security access of grid user to grid service and a security access by assertion between virtual organization domain to achieve a reduce of alternation between grid user and grid service, and to provide a more reliable assurance for grid computing environment.

Подробнее
27-05-2009 дата публикации

Method for monitoring grid based on vector machine support

Номер: CN0101442561A
Принадлежит:

The invention relates to a grid monitoring method based on a support vector machine, in particular to a novel grid monitoring method. The system adopts an SVM method, carries out characteristic extraction on performance information transmitted by a sensor and the like; after data processing is standardized, a series of sample data is obtained; learning test of the support vector machine is carried out to construct a regression function; and subsequently, newly monitored variable quantity of performance data is analyzed through an SVM controller to predict an expected polling cycle, thereby deciding whether the polling cycle needs to be changed. In next time, the method carries out monitoring according to the predicted polling cycle and continuously adjusts the polling cycle so that the real time and loading of resource are well balanced. The method solves the problems that the grid monitoring system has the decline of system performance or weak real time of monitoring caused by the fixed ...

Подробнее
09-07-2008 дата публикации

A flood request attaching filtering method based on the stateless of open source core

Номер: CN0101217547A
Принадлежит:

The invention relates to an open source kernel based filtration method of stateless flooding request attacks, which comprises the following steps: the rule list of the filtration of an open source firewall is initialized to generate a white list and a blacklist; a main control module distinguishes and processes the request message and the reset message respectively; the Cookie value of the request message is calculated and is added to a text document library, and a confirmation message is sent back to the message origin; as for the reset message, the confirmation number value thereof is extracted and searched in the text document library after being subtracted by one; a text document library maintenance module deletes the expired information record in every interval t, and informs a firewall operation module to add the address of the origin to the blacklist; the firewall operation module gathers list items when the number of the list items in the white list or the blacklist are very large ...

Подробнее
20-04-2011 дата публикации

Synergistic learning invasion detection method used for data gridding

Номер: CN0101431416B
Принадлежит:

A method of collaborative learning intrusion detection applied in data grid, which draws advantages of current popular technologies like distributed detection in intrusion detection domain and ensemble learning etc., combines method of abnormal detection and feature detection, adopts BP neural network collaborative learning for complementary advantages, and makes intrusion detection system based on the method applies to data grid environment. Deploy a plurality of strong detectors integrated by BP neural network in center-nod according to security requirement of different kinds of nods in data grid by the invention, and collect new intrusion sample feature come from everywhere whenever possible to make sure about the security of important copy in center-nod. Deploy collaborative intrusionanalysis engine in center-nod meanwhile to provide collaborative detection service for all normal nods. A plurality of normal nods are organized by center-nod for collaborative calculation and suspected ...

Подробнее
20-01-2010 дата публикации

Method of grid service construction based on internal work flow

Номер: CN0100583137C
Принадлежит:

The invention relates to an internet serve structure method based on the internal working flow which is a resolution project orientate to griddling serve using method. It comprises the following steps: 1 using serve searcher to research the griddling serve; 2 using shaped tools to edit the file, defining the griddling and serve flow scheme; 3 using editor to provide fabricate serve function after finishing serve flow shaped to manage the serve flow on the help of the module base; 4 sending the griddling serve request information by end user; 5 capturing the griddling serve reference address information by the griddling and analyzing it; 6 receiving the information by the executor to achieve the griddling serve: establishing component serve sample and acting the serve operation.

Подробнее
21-07-2010 дата публикации

Automatic selection method for machine learning in cloud computing environment

Номер: CN0101782976A
Принадлежит:

The invention relates to an automatic selection method for machine learning in cloud computer environment. By using a cloud computing platform, a user can automatically and intelligently build a machine learning mathematic model which meets actual problems without building the operation environment of machine learning, selecting a machine to learn algorithm and even adjusting complicated machine learning functions and accompanying parameters but only using a Web method to upload sample data. Through the method, the use of machine learning is free from the environmental constraints and displays the advantages of the cloud computing platform, so that the machine learning model building is transparent to the user, so as to best reduce the use threshold of machine learning. The automatic selection method for machine learning in cloud computing environment solves the disadvantages of the unpredictability of model building selection, the manual experience of parameter adjustment, the difficulties ...

Подробнее