Entity

Time filter

Source Type


Zhang T.,Henan Institute of Engineering
Journal of Convergence Information Technology | Year: 2012

The diversity and changeability of network attack make it difficult to conduct accurate prediction with traditional algorithms. Therefore, in this paper, the author would propose a network attack prediction algorithm based on chaos theory and LSSVM. The idea of this algorithm is forecasting the relationship between model parameters through time series of network attack frequency and optimizing model parameters with particle swarm optimization algorithm. Finally, conduct a simulation experiment with concrete network attack frequency data through prediction model of optimal parameters and compare it with other prediction algorithms. The experimental results prove that this algorithm is an reliable prediction algorithm with excellent generalization capability and it is more accurate than the comparison algorithm. Source


Li H.,Henan Institute of Engineering
Lecture Notes in Electrical Engineering | Year: 2013

This article aims at achieving sustainable development of industrial parks, combined with the principles of evaluation design. It builds industrial park sustainable development evaluation system from 34 sub-indicators in four areas such as resource support and utilization, economic development, environmental standards and management level. It is combined with the characteristics of each index to use comprehensive weight, standard value score, maxim-minimum scoring evaluation of quantitative indicators and three-level scoring evaluation of qualitative indicators, sustainable development, to achieve the scoring criteria of industrial park sustainable development. © 2013 Springer-Verlag. Source


Pu Q.,Henan Institute of Engineering
2010 International Conference on MultiMedia and Information Technology, MMIT 2010 | Year: 2010

Recently, Lu et al. presented an enhanced authenticated key agreement protocol based on elliptic curves cryptography and included their protocol in 3GPP2 specifications to improve the security of A-Key distribution. In this paper, we first show the proposed protocol can't resist the offline password guessing attack, and then present an enhanced protocol to remedy the security loopholes. On the other hand, through this work, we also hope to contribute towards a better understanding of the importance and necessity of including the key derivation step in key agreement protocols. © 2010 IEEE. Source


Xu D.-M.,Henan Institute of Engineering | Qiu L.,North China University of Water Conservancy and Electric Power | Chen S.,Dalian University of Technology
Journal of Hydrologic Engineering | Year: 2012

The accurate estimation of Muskingum model parameter is essential to give flood routing for flood control in water resources management. The Muskingum model continues to be a popular method for flood routing, and its parameter estimation is a global optimization problem with the main objective to find a set of optimal model parameter values that attains a best fit between observed and computed flow. Although some techniques have been employed to estimate the parameters for Muskingum model, an efficient method for parameter estimation in Muskingum model is still required to improve the computational precision. Therefore, in this paper, the differential evolution (DE) algorithm is studied for estimation of Muskingum model parameter. A case study with actual data from previous literature, the experimental results showed an excellent performance in its optimization result and performance analysis and demonstrates that DE is an alternative technique to estimate the parameters of the Muskingum model. © 2012 American Society of Civil Engineers. Source


Guan F.,Henan Institute of Engineering
International Journal of Advancements in Computing Technology | Year: 2012

Based on the review of relevant research on the relation between intellectual capital, absorptive capacity and technology innovation, conceptual model and theoretical hypothesis are proposed. Results show that elements of intellectual capital interact with each other; intellectual capital and absorptive capacity has directly positive effect on technology innovation; absorptive capacity plays the moderating role between intellectual, social capital and technology innovation. Source

Discover hidden collaborations