http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Kang Chang,Yi Cheng,Jian-Bo Yang,Yujie Qiao,Rui Li,Can Zhang 한국물리학회 2019 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.74 No.6
This work aimed to study an algorithm for the unfolding spectrum acquired by using a water-pumping-injection multi-homocentric sphere neutron spectrometer. The readings of the water-pumping-injection multi-homocentric sphere neutron spectrometer under 32 different neutron sources, including $^{241}$Am-Be spontaneous, $^{238}$Pu Watt, and $^{232}$Th Maxwell fission, were obtained by using the FLUKA Monte Carlo code and were input as the neural network training values for constructing the method of back-propagation artificial neural network neutron spectrum unfolding (MBANSU). Two neutron readings that were Monte Carlo experimentally measured from $^{252}$Cf spontaneous and $^{245}$Cm Maxwell fission sources were used as the testing values for MBANSU. The calculated neutron energy spectrum was in good agreement with the ENDF energy spectrum, and the information entropy of the result spectrum approximated that of the ENDF spectrum. Results indicate that the established MBANSU algorithm has potential applications for unfolding spectra collected by using the water-pumping-injection multi-homocentric sphere neutron spectrometer.
Network Intrusion Detection Based on Directed Acyclic Graph and Belief Rule Base
Bang-Cheng Zhang,Guan-Yu Hu,Zhi-Jie Zhou,You-Min Zhang,Pei-Li Qiao,Lei-Lei Chang 한국전자통신연구원 2017 ETRI Journal Vol.39 No.4
Intrusion detection is very important for network situation awareness. While a few methods have been proposed to detect network intrusion, they cannot directly and effectively utilize semi-quantitative information consisting of expert knowledge and quantitative data. Hence, this paper proposes a new detection model based on a directed acyclic graph (DAG) and a belief rule base (BRB). In the proposed model, called DAG-BRB, the DAG is employed to construct a multi-layered BRB model that can avoid explosion of combinations of rule number because of a large number of types of intrusion. To obtain the optimal parameters of the DAG-BRB model, an improved constraint covariance matrix adaption evolution strategy (CMA-ES) is developed that can effectively solve the constraint problem in the BRB. A case study was used to test the efficiency of the proposed DAG-BRB. The results showed that compared with other detection models, the DAG-BRB model has a higher detection rate and can be used in real networks.