Intranet and extranet information interactions are increased constantly aiming at IP network equipment interconnection, which become actual conditions of more and more complex uncertain systems.A malicious code behavior detecting platform is designed and realized by combining with the characteristics of network attack, attack methods and principles used by the malicious code.Automatic flow of analyzing malicious codes is realized.It is preliminarily applied in internal IP network.Malicious code detecting platform provides strong guarantee and support for stable, efficient and safe operation of space detection task networks, which provides reference for maintenance personnel to implement emergency disposal quickly and properly.
Watermark bar code is one of the latest anti-counterfeiting technologies, which is applicable to the security of various financial documents, especially banknotes. With the machine-readable watermark bar code, we can not only distinguish the genuine from the fake, but also recognize different face values of banknotes. So it is necessary to develop an effective method to read it. With watermark bar codes embedded in euro banknotes as samples, we design a system for watermark bar code recognition based on light transmission theory. An 808nm LD serves as light source. By receiving the transmitted light from behind the banknote with a high-speed photodetector, light transmission curves in different parts of different face value euro banknotes are obtained and analyzed in order to get the unique characteristic of watermark bar code. The correlation coefficient is then introduced for two reasons. For one thing, the high correlation coefficient derived from the light transmission curves shows the coherence of vertically placed watermark bar code area in different horizontal parts of the same face value banknote, which testifies the consistency and repeatability of the experiment. For another, the low correlation coefficient shows the irrelevance of watermark bar code area and other area of banknotes. What's more, it also shows the difference of watermark bar code area of different face value banknotes. As a result, the machine-readable watermark bar code is made the unique characteristic of certain face value banknotes, which can distinguish them from both the counterfeit ones and other face value genuine banknotes.
In the paper,We define a kind of continuous concepts of optimal value function on point-to-set maps and discuss the continuity of optimal value function on point-to-set maps.The theorem on the continuity of optimal value function under the inequality constraint or the equality and inequality constraint is given.The theorem on the continuity of optimal value function for a new regular is also stated.
With the continuous development of network technology, global informatization has become a reality. While the openness and interconnection of IP network protocols bring convenience to data communication, it also provides space for network intruders to enter the void. In particular, the terminal system design is fragile, the software running on the terminal is becoming more and more complicated, and its various components are interdependent, and vulnerabilities are prone to occur in the process of development and maintenance. 0day vulnerabilities emerge endlessly, and static protection methods have exposed deficiencies.
Along with our country economy rapid development,income level of the dweller and consumptive ability also rises ceaselessly;commercial banks personal consumer credit business began to flourish together.But in the individual consumption credit of our country market is continuing to expand at the same time,the personal consumption credit risks and vulnerabilities are constantly emerging,if these risks do not try to take seriously,will hinder our country commercial bank personal consumption credit in the further development of the business,based on China's current commercial bank personal consumption credit business situation analysis in this paper,a business presence in the development of the risk,and put forward practical measures and methods.