全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

复杂系统脆性相对熵及其在分布式系统中的应用

DOI: 10.13195/j.kzyjc.2013.1419, PP. 185-188

Keywords: 脆性相对熵,分布式系统,脆性条件相对熵,非负性,凸函数性

Full-Text   Cite this paper   Add to My Lib

Abstract:

分布式系统安全性和可靠性检测的难点在于缺乏对系统脆性的动态评估.针对这一难点,提出一种新的概念脆性相对熵来衡量系统的脆性,并给出评估方法.利用脆性相对熵可以动态地衡量当前概率分布与系统崩溃概率分布之间的相对距离,有效地评估系统当前状态,并对系统脆性的概率风险加以定量分析.仿真结果表明,脆性相对熵可以衡量系统的脆性特征,且越接近系统脆性分布,脆性相对熵越小.

References

[1]  (Wei Q, Jin H Z, Guo J, et al. Research on complex system based on brittleness[J]. J of Systems Engineering, 2004, 19(3): 326-328.)
[2]  Altyeb Altaher, Sureswaran Ramadass, Bhavani Thuraisingham, et al. On-line anomaly detection based on relative entropy[C]. The 4th IEEE Int Conf on Broadband Network and Multimedia Technology(IC-BNMT). Beijing: IEEE Press, 2011: 33-36.
[3]  Philip C H, Yuen S H, Gray Chan. Scalable real-time monitoring for distributed applications[J]. IEEE Trans on Parallel and Distributed Systems, 2012, 23(12): 2330-2337.?
[4]  Akshay Dabholkar, Abhishek Dubey, Aniruddha Gokhale, et al. Reliable distributed real-time and embedded systems through safe middleware adaptation[C]. The 31st Int Symposium on Reliable Distributed Systems. Irvine: IEEE Computer Society, 2012: 362-371.
[5]  李琦, 金鸿章, 林德明. 基于脆性熵的系统脆性研究[J]. 自动化技术与应用, 2004, 23(9): 16-18.
[6]  (Li Q, Jin H Z, Lin D M. Brittleness analysis based on the brittleness entropy[J]. Techniques of Automation and Applications, 2004, 23(9): 16-18.)
[7]  韦琦, 金鸿章, 郭健. 复杂系统崩溃的脆性致因的研究[J]. 系统工程, 2003, 21(4): 1-5.
[8]  (Wei Q, Jin H Z, Guo J. Research on the collapse of complex system based on brittle reason[J]. Systems Engineering, 2003, 21(4): 1-5.)
[9]  韦琦, 金鸿章, 郭健, 等. 基于脆性的复杂系统研究[J]. 系统工程学报, 2004, 19(3): 326-328.
[10]  Suyan He. A weighted relative entropy method for forecasting demand[C]. 2011 Int Conf on Electric Information and Control Engineering(ICEICE). Wuhan: 2001: 130-133.
[11]  Ahmadi-Javid A. An information-theoretic approach to constructing coherent risk measures[C]. 2011 IEEE Int Symposium on Information Theory Proceedings. St.Petersburg: IEEE Press, 2011: 2125-2127.
[12]  Tommas M Cover, Joy A Thomas. 信息论基础[M]. 北京: 机械工业出版社, 2005: 9-25.
[13]  (Tommas M Cover, Joy A Thomas. Elements of information theory[M]. Beijing: China Machine Press, 2005: 9-25.)
[14]  Zhang Y L, Han Z G, Ren J X. A network anomaly detection method based on relative entropy theory[C]. The 2nd Int Symposium on Electronic Commerce and Security. Nanchang: IEEE Press, 2009: 231-235.
[15]  Mahoney V M. A machine learning approach to detecting attacks by identifying anomalies in network traffic[D]. Melbourne: Florida Instrtute of Technology, 2003: 101-120.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133