首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
为了研究计算机病毒在广义网络中传播的机制,文章分别提出了计算机病毒传播的非线性和线性模型.理论分析表明,网络的最大特征值是决定计算机病毒传播的重要参数.其次,文章给出非线性和线性模型中的无病毒均衡点全局稳定的充分条件,同时也证明了线性模型的有病毒平衡点的全局吸引性.最后,通过一些数学模拟实验验证了理论分析的主要结论.  相似文献   

2.
李艳博  宋明秋 《运筹与管理》2020,29(10):163-172
基于网络节点信任度的评估机制是一种有效防御蠕虫传播的方法。针对现有节点信任度计算模型对蠕虫攻击行为不敏感,对恶意节点识别不全面的问题,本文提出了一种考虑蠕虫传播风险的信任度更新模型。通过蠕虫传播模型中STIDR状态定义,对节点信任度和传播概率的关系进行了定量刻画;建立了直接风险、间接风险和传播性风险三种条件下的信任度更新模型。仿真结果表明,与基本信任模型相比,本文考虑蠕虫传播风险的信任度更新模型使网络中感染状态节点的信任度更低,感染状态节点数目更少,隔离状态节点数目更多,表明信任度的更新使节点对感染状态节点的识别更加有效,在一定程度上达到了抵御蠕虫攻击,抑制蠕虫在网络中传播的目的。  相似文献   

3.
自媒体时代,纷繁复杂的网络信息填补着公众的碎片化时间,公众的注意力成为相关利益主体争夺的宝贵资源,网络推手应运而生,在负面网络舆论传播中有强大影响,成为治理网络舆论重要的研究对象.运用演化博弈方法构建了当事人、网络推手和监管者三方行为主体的博弈模型,对模型求解分析与数值仿真,研究各主体策略行为对负面网络舆论传播的作用机理,继而提出治理对策.通过对网络推手参与下负面舆论传播作用机理和影响因素的分析,有针对性的提出了降低负面舆论传播的监管成本、提高监管者的处罚力度、提高负面舆论传播成本、限制网络推手舆论传播收益等治理手段的具体措施.研究有助于有效治理负面网络舆论传播,净化网络空间.  相似文献   

4.
珠心算作为一门新兴学科在幼儿园和小学教育中的影响逐步深入民心。随着信息社会的到来,互联网的迅猛发展为珠心算的传播又提供了一个新途径、新平台。但不可忽略的是,珠心算的网络宣传中也存在一定的问题,能否有效进行珠心算网络宣传管理,将会关系到珠心算能否在网络上的健康发展与健康传播。鉴于网络已经成为广大网民学习新知识、接受新思想、传播新信息的重要渠道,因此加强珠心算网络宣传管理,营造珠心算网络良好发展环境,为网民提供科学规范的珠心算知识,是珠算人弘扬珠算心算文化义不容辞的责任,对此必须予以重视,对存在的问题加以分析解决。  相似文献   

5.
为了给预防病毒传播提供指导意见并且更好地对病毒传播行为进行预测和控制,主要研究了几种经典复杂网络中病毒传播的模型,并对几种复杂网络病毒免疫的模型特点进行了分析,通过对这些病毒免疫模型在多局域加权网络中应用不足的分析,对多局域加权网络的病毒免疫策略进行了相应的研究.  相似文献   

6.
"飞客"(conficker)蠕虫病毒是近期在全球爆发的以微软的windows操作系统为攻击目标的计算机蠕虫病毒,从爆发至今,感染数量巨大,形成了巨大规模的僵尸网络,对互联网安全形成了巨大的威胁.采用域名重定向技术监测conficker蠕虫的扩散传播,针对其查杀率低,传播周期长的特点,考虑地域、连通性等因素所导致的感染主机传播能力的差异,建立conficker蠕虫传播模型,最后通过真实的conficker蠕虫监测数据验证了模型的有效性.  相似文献   

7.
近年来,随着社交网络的不断普及,负面舆情信息对经济、社会和文化等造成的威胁不断放大.现有方法多通过剔除节点或边集实现舆情传播控制,却难以适应现今规模巨大的社交网络环境.基于此,基于阻塞自回避行走算法提出了融合边与节点集移除的并行舆情传播控制方法,并基于GPU框架应用成本约束函数对算法进行改进,提高了所提算法在大规模社交网络图中的适用性,且使用改进前推回代算法进行求解.最后,基于多种真实社交网络数据集进行实验,结果表明:所提CN-OPC法能对社交网络舆情传播进行有效控制,控制效率与精度较经典算法均有较大提升,这说明并行阻塞策略可用于大规模社交网络舆情传播控制,未来可进一步尝试多策略并行的控制方法在社交网络环境中的应用.  相似文献   

8.
本文使用聚合过程研究一个随机网络中连通分支的演变及病毒在网络上的传播.网络里两个连通分支可以按照指定的速率聚合,同时连通分支可以在健康和染病两种状态之间互相转化.本文首先使用鞅方法证明在转移速率满足一定条件下极限过程的存在唯一性,然后利用平均场方法讨论网络中巨连通分支出现的时间.  相似文献   

9.
社交网络中重要节点发现对于控制舆论传播、社交影响力最大化等有重要意义。本文结合信息传播相关理论,提出了一种基于层间互信息的时序网络节点重要性识别方法。通过设计一种层间节点连边变化概率的计算模型,进而求解时序网络节点的层间信息熵和以层间互信息量化的相关性系数,再结合特征向量中心性对节点进行重要性度量。在真实时序网络数据集上进行实验,相比经典方法,本方法在时序网络的节点重要性度量上更有优势。  相似文献   

10.
在文[2]中,W.Kohnn对权为k和l的任意二个歧点型模形式f和g(其变换群是全模群SL_2(Z))定义了一类Dirichlet级数L_(f,g,n)(s),利用L_(f,g;n)(s)(为整数),可构造一个线性映射W_g:S_k→S_(k-l).并且讨论了L_(f,g;n)的一些特征值.在本文中,我们将[2]中的结果推广到Hilbert模形式的情况,并得到类似的结论.  相似文献   

11.
网络节点的感染概率直接对蠕虫的传播过程产生影响,而攻击行为的相关性会加大节点的感染概率。基于此,本文提出了考虑攻击相关性的STIR蠕虫传播模型。根据攻击相关性的特点,给出感染概率的更新计算方法,并利用状态转移概率法对传播过程进行数学描述,推导传播临界值的计算公式,最后在无标度网络中进行仿真分析。实验结果验证了数值推导出的传播临界值的正确性。与未考虑攻击相关性的蠕虫传播模型相比,STIR模型能够更好地模拟蠕虫的传播过程。同时在研究中还发现,感染概率初始值、感染变化率和传播概率的增加都会加大蠕虫的传播速度和传播规模。  相似文献   

12.
Based on the nonlocal nonlinear Schrödinger equation that governs phenomenologically the propagation of laser beams in nonlocal nonlinear media, we theoretically investigate the propagation of sinh-Gaussian beams (ShGBs). Mathematical expressions are derived to describe the beam propagation, the intensity distribution, the beam width, and the beam curvature radius of ShGBs. It is found that the propagation behavior of ShGBs is variable and closely related to the parameter of sinh function (PShF). If the PShF is small, the transverse pattern of ShGBs keeps invariant during propagation for a proper input power, which can be regarded as solitons. If the PShF is large, it varies periodically, which is similar to the evolution of temporal higher-order solitons in nonlinear optical fiber. Numerical simulations are carried out to illustrate the typical propagation characteristics.  相似文献   

13.
Many modern systems have the property of coupling, which weakens the system against the outburst of failure. The risks to fail in a single layer may propagate to the entire system through inter-layer connections. In the field of propagation process, the existing literatures mainly focus on the global phenomena in coupled systems through some statistic methods, the dynamical evolution of failure risk propagation and the protection schemes for coupled systems are seldom mentioned. In this paper, we model the coupled systems using six types of coupled networks, over which the failure risk propagation occurs. Then, three cellular automata (CA) models are performed to describe the protection schemes in case of failure risk propagation. Based on a newly presented measurement, a series of experiments are conducted on the coupled networks as well as the single-layered networks, where the propagation processes with and without protection schemes are demonstrated. The results show that the failure risk propagation varies depending on the type and structure of the coupled networks. Moreover, with a small fraction of nodes protected based on some immunization strategies, the system’s robustness to the failure risk propagation is highly improved.  相似文献   

14.
Traditional non-probabilistic methods for uncertainty propagation problems evaluate only the lower and upper bounds of structural responses, lacking any analysis of the correlations among the structural multi-responses. In this paper, a new non-probabilistic correlation propagation method is proposed to effectively evaluate the intervals and non-probabilistic correlation matrix of the structural responses. The uncertainty propagation process with correlated parameters is first decomposed into an interval propagation problem and a correlation propagation problem. The ellipsoidal model is then utilized to describe the uncertainty domain of the correlated parameters. For the interval propagation problem, a subinterval decomposition analysis method is developed based on the ellipsoidal model to efficiently evaluate the intervals of responses with a low computational cost. More importantly, the non-probabilistic correlation propagation equations are newly derived for theoretically predicting the correlations among the uncertain responses. Finally, the multi-dimensional ellipsoidal model is adopted again to represent both uncertainties and correlations of multi-responses. Three examples are presented to examine the accuracy and effectiveness of the proposed method both numerically and experimentally.  相似文献   

15.
In the age of information globalization, research on the mechanism of propagation will help mitigate the bad influence of rumors. Based on the classical rumor propagation model, this paper further analyzes the internal mechanism of the stochastic rumor propagation model incorporating media coverage with white noise. We investigate the existence of a unique global positive solution to the model and study the dynamic properties of the solutions around the rumor-free and local equilibrium points of the deterministic model. Furthermore, we establish sufficient conditions for the existence of traversal static distribution in the model. Numerical simulation shows that the role of media coverage is crucial to reduce the rumor propagation scale. The larger the coverage rate is, the smaller the rumor propagation scale is.  相似文献   

16.
A radial tire is a very complex structure made from rubber elastomers and fiber–rubber composite materials. During its use, extension propagation of interface crack between belts can occur, which obviously affects its durability and life. In the present paper, a new mathematical model of extension propagation of interface crack in complex composite structures is presented. The model can reveal the extension propagation dependence of interface crack on the relative size of energy release rates at the left and right crack tips and on the interfacial material properties. The extension propagation model of interface crack, Irwin’s virtual crack close technique and the finite element analysis method are used together in simulating numerically the extension propagation process of a interface crack between belts of a radial tire. The present study numerical results show that the extension propagation model of interface crack proposed in this paper can more realistically characterize the complexity of the extension propagation process of interface crack in complex composite structures.  相似文献   

17.
In this paper, we investigate constraint propagation, a mechanism that is run at each basic step of a backtrack search algorithm such as the popular MAC. From a statistical analysis of some relevant features concerning propagation on a large set of graph coloring instances, we show that it is possible to make reasonable predictions about the capability of constraint propagation to detect inconsistency. Using this observation in order to control propagation effort, we show its practical effectiveness.  相似文献   

18.
约束传播算法是求解约束满足问题的一种重要方法。调度问题是一种特殊的约束满足问题。本介绍了调度问题中的Edge-Finding和Energy-Reasoning两种分离约束传播算法,并对它们进行了比较,中最后给出了一种结合Energy-Reasoning的Edge-Finding改进算法。  相似文献   

19.
The estimation of interface damage of fiber-reinforced composites based on the propagation constants of coherent waves is studied in this paper. First, the relation between the interface damage and the propagation constants is investigated by using the theory of multiple scattering. Next, single and multiple scatterings in the composites in the case of incident P, SV, and SH waves are considered. The propagation constants of coherent waves are computed numerically, and the influence of interface damage on them is discussed. Then, based on the relation between the propagation constants and the interface damage, an inverse method to estimate the interface damage is proposed. Finally, a numerical example is given. The numerical results are obtained by using synthetic experimental data and the genetic algorithm. It is shown by the numerical example that the interface damage can be approximately estimated from the wave propagation constants measured with various degrees of accuracy.  相似文献   

20.
The application of the previously developed 3D varionational analysis approach to the investigation of crack propagation in composite bonded joints is presented. In this application, the propagation of three different types of a 2D planar crack (adhesive, cohesive, and interfacial) is modeled by relaxing the respective continuity conditions for displacements between adjacent bricks in the mosaic structure. The crack propagation process is then characterized by the release rate of the total potential energy between two consecutive states of the mosaic body with different crack lengths. Numerical examples illustrate the 3D analysis of double-lap adhesively bonded joints with unidirectional and cross-ply laminated composite adherends. The numerical results provide an illustration of various characteristics of the crack propagation process. The values of the ultimate failure load predicted by analyzing the initial stage of crack propagation are found to be in a good agreement with experimental data.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号