Global Journal of Computer Science and Technology

نویسنده

  • Ping He
چکیده

This paper introduces some known non-optimum to the networks security, categorizes the non-optimum, and analyses protection mechanisms and techniques for countering the non-optimum. The non-optimum have been classified more so as definitions and then followed by the classifications of these non-optimum. Also mentioned are the protection mechanisms. The paper establishes the syndrome and empirical analysis based on the non-optimum category of the network system. At the same time, it also puts forward the nonoptimum measurement of the networks system along with nonoptimum tracing and self-learning of the networks systems.Besides, the various characteristics and functions of the network security can be measured from the non-optimum attributes. By summing the practice, this paper has also come at non-optimum analysis principle of the networks, established the conception of non-optimum thresholds and put forward three theorems about non-optimum parameters. Through the concept of extensionality networks function, it analyzes the actual significance of networks security based on non-optimum analysis. Based on the analysis from non-optimum to suboptimum, it puts out the academic idea of extension networks optimal. Meanwhile, it discusses about the general framework of extension optimum. Finally, according to the previous practice of optimization, kind of method has been developed to learning approach the sub-optimum from non-optimum network. Keywordsnon-optimum category; network security; nonoptimum and security; extensionality networks function; self-learning approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Measuring the Performance of the Virtual Teams in Global Software Development Projects

The development teams who are geographically spread, culturally mixed and mainly depend on information and communication technology (ICT) for communication is defined as a global virtual teams (GVTs). Despite the advancement of technologies, achieving the efficient performance of GVTs remains a challenge. The reviewed literature has highlighted the importance of training and development, organi...

متن کامل

Survey on Perception of People Regarding Utilization of Computer Science & Information Technology in Manipulation of Big Data, Disease Detection & Drug Discovery

this research explores the manipulation of biomedical big data and diseases detection using automated computing mechanisms. As efficient and cost effective way to discover disease and drug is important for a society so computer aided automated system is a must. This paper aims to understand the importance of computer aided automated system among the people. The analysis result from collected da...

متن کامل

Global properties of a tuberculosis model with lost sight and multi-compartment of latents

A  tuberculosis (TB) model with  lost sight  and multiple latent classes  is considered and studied. We derive the basic reproduction ratio $mathcal R_0$. There is always a globally asymptotically stable equilibrium state. Depending on the value of   $mathcal{R}_0$, this state can be either endemic ($mathcal{R}_0> 1$), or infection-free ($mathcal{R}_0leq 1$). The global asymptotic stability of ...

متن کامل

Estimating Algorithms for Prediction and Spread of a Factor as a Pandemic: A Case Study of Global COVID-19 Prevalence

Background: This paper presents open-source computer simulation programs developed for simulating, tracking, and estimating the COVID-19 outbreak. Methods: The programs consisted of two separate parts: one set of programs built in Simulink with a block diagram display, and another one coded in MATLAB as scripts. The mathematical model used in this package was the SIR, SEIR, and SEIRD models re...

متن کامل

An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation

Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...

متن کامل

P2-CONNECTEDNESS IN L-TOPOLOGICAL SPACES

In this paper, a certain new connectedness of L-fuzzy subsets inL-topological spaces is introduced and studied by means of preclosed sets. Itpreserves some fundamental properties of connected set in general topology.Especially the famous K. Fan’s Theorem holds.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010