• Origin Pilot: A Quantum Operating System for Efficient Usage of Quantum Resources

    Subjects: Physics >> General Physics: Statistical and Quantum Mechanics, Quantum Information, etc. submitted time 2021-05-17

    Abstract: With the continuous progress of quantum processor technologies, to efficiently use of quantum processors and collaboration between quantum processor and classical computing have become an urgent requirement for further application of quantum computing. The Origin Pilot is a quantum operating system oriented to this requirement. It provides services, such as quantum task scheduling, quantum resource management, quantum program compilation, and automatic calibration of quantum bit, and manages quantum computing resources efficiently and unified. In this paper, we propose multiple quantum processor load balancing, multiple quantum program parallel computing based on quantum line mapping, quantum bit automatic calibration based on implicit Markov chain. By comparing before and after using the Origin Pilot on OriginQ Wuyuan quantum computing platforms, we found that the fidelity is increased by at least 10% ( in the experiment of four typical quantum circuits (QFT, GHZ,DJ,BV), compared with the mapping effect of BMT algorithm)and the operating efficiency is increased by at least 120% (In the experiment of running GHZ quantum circuit, the parallel computing ability of single quantum processor and load balancing computing ability of multiple quantum processor provided by Origin Pilot) with Origin Pilot. Origin Pilot cooperates quantum processor (QPU), classical computer and other computing resources, which provides an effective resource management for quantum computing. " "

  • 基于PN码随机化的MSAC攻击防御方法

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2019-05-10 Cooperative journals: 《计算机应用研究》

    Abstract: The flow rate based direct sequence spread spectrum (DSSS) flow watermarking technique used the same pseudo-random (PN) code to modulate the multi-bit watermark signal, as a result, the DSSS watermarked flow had self-similarity, and the mean-square autocorrelation (MSAC) attack could detect the existence of the DSSS flow watermark by using single DSSS watermarked flow, which seriously destroyed the stealthiness of the DSSS flow watermark. Although the PN code orthogonalization method could eliminate the autocorrelation of the DSSS watermarked flow and thus resisted the MSAC attack, however, the orthogonal PN codes were difficult to generate, which limit its application range. Therefore, this paper proposed the PN code randomization based MSAC attack resistance (PNCR-MAR) method, when the watermark signal was embedded into the target flow, the PN codes of different lengths, randomly selected from a PN code set, were used to spread each watermark bit, so that the mean-square autocorrelation of the flow rate of the watermarked flow no longer exhibited periodic peaks, as a result, this PNCR-MAR method could defend against the MSAC attack. Theoretical analysis and experimental results show that this proposed PNCR-MAR method can effectively resist the MSAC attack, and the adopted PN codes are easy to generate, which is suitable for deployment and application.

  • 基于申威众核处理器的NSGA-II并行和优化方法

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-11-29 Cooperative journals: 《计算机应用研究》

    Abstract: The Sunway TaihuLight, which is composed of Sunway many-core processors, is currently the highest performance supercomputer in China. It can provide a hardware platform for NSGA-II to solve the large-scale problems. Considering the architecture of Sunway many-core processor, an “island combined with enhanced master-slave” hybrid parallel NSGA-II algorithm is designed. Based on the master-slave mode, register communication is used to realize the sharing of local data memory of CPEs in a core group. The algorithm process is optimized and more algorithm modules are parallelized on CPEs. By means of DMA transmission, vectorization, double buffering and storage optimization, the speedup is significantly increased. The experiments show that the optimized parallel NSGA-II has good speedup and scalability on the Sunway many-core processors.

  • 一种基于“预读”及简单注意力机制的句子压缩方法

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-20 Cooperative journals: 《计算机应用研究》

    Abstract: This paper proposed a method in English sentence compression based on Pre-readin” and Simple Attention Mechanism. On the basis of Gated Recurrent Unit (GRU) and Encoder-Decoder, this paper modeled the original sentence semantics twice in the encoding stage. The first result was used as a global information to strengthen the second semantic model, thus obtaining a more comprehensive and accurate semantic vector. With full consideration of the particularity of the deleted sentence compression, this paper simply adopt the 3t-Attention mechanism in the decoding stage to improve the efficiency and accuracy of prediction, which means that the semantic vectors most relevant to the current decoding time step are inputted to the decoder. The results from the experiments on the Google news sentence compression dataset show that our model significantly outperforms all the recent state-of-the-art methods. Therefore, "Pre-reading" and Simple Attention Mechanism can effectively improve the accuracy of English sentence compression.

  • 软件定义天地一体化网络接入认证架构与方法

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-18 Cooperative journals: 《计算机应用研究》

    Abstract: Due to the complex structure of space-ground integration network, it has characteristics of heterogeneous, dynamic, intermittent connectivity and high exposure, it is necessary to study the special access authentication architecture and method in order to ensure security. The software defined network adopts the idea of separating control surface from data surface, so this paper proposed a new access authentication architecture which combined software defined network and space-ground integration network to realize flexibility. It consisted of detailed description of the authentication architecture and process, and it could realize security protection and resources optimization control. Then according to the characteristics of the architecture, this paper put forward 7 attributes of influencing access point decision, and presented the calculating formula of each attribute. In addition, an access point decision algorithm was proposed based on Analytic Hierarchy Process and Technique for Order Preference by Similarity to an Ideal Solution. Simulation experiments show that the algorithm can select the best access point and it can achieve reasonable utilization of resources.

  • 基于视觉感知特征的手机应用流量识别方法

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-05-02 Cooperative journals: 《计算机应用研究》

    Abstract: The mobile apps mostly communicate with servers via HTTP, which makes port-based method ineffective. Furthermore, depth packet inspection and flow-based classifiers have difficulties in designing features and labeling samples manually. Motivated by the excellence of computer vision, this paper proposed a method of mobile app traffic identification based on visual perception features. First, it converted the app traffic flows into vision-meaningful images. Collecting real traffic from the network gateway, it created the IMTD17 dataset. Then, it designed a two-dimensional convolutional perception network (2D-CPN) with the ability of visual feature extraction. The network realized the learning of massive unlabeled samples by the convolutional autoencoder, and used multi-class regression to create the mapping from the latent feature to the app categories. The experimental results show that the identification accuracy of the approach satisfies the practical requirement.

  • 基于特征选择的虚拟化系统语义鸿沟桥接研究

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-19 Cooperative journals: 《计算机应用研究》

    Abstract: The strong isolation property of the virtualization syste introduces the semantic gap problem while providing a reliable environment for the deploying the security mechanism. Current research generally relies on the information of software architecture which is not reliable, for the data structures and control flows are easy to be illegally manipulated. And the detection algorithm employed in related research has the low efficiency in identification of guest state. For these problems, this paper designed the feature construction and window mark to preprocess the captured data so as to meet the necessary conditions of carrying out data mining, and then established the semantic gap bridging model of virtualization system based on feature selection, which can build the execution mode of virtual machine and carry out the security detection only relying on the hardware architecture data. Test results show that proposed model can screen out the key features of virtual machine and effectively identify the abnormal behavior of guest system, which lead to the efficiency improvement of bridging semantic gap. This scheme provides a feasible solution for dealing with the problem of semantic gap.

  • 基于虚拟移动的IPv6主动防御方案

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-17 Cooperative journals: 《计算机应用研究》

    Abstract: The existing technologies for protecting IPv6 nodes by address hopping rely on time synchronization or event synchronization, utilizing the good mobility feature of IPv6 and multiple care-of address registration mechanisms, this paper proposed a proactive defense scheme of IPv6 based on virtual mobile. By assigning a dynamically changing care-of address to an IPv6 node, the IPv6 node presented the continuously moving feature in the network, reduced the attack probability of an attacker, and ensured the continuity of communications. Theoretical analysis and experimental tests show that the scheme has good anti-attack ability and less system overhead.

  • 基于多类型数据包的IPv6防火墙防护能力评测方法

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-17 Cooperative journals: 《计算机应用研究》

    Abstract: In order to test the defensive capability of IPv6 firewall to against potential IPv6 network threats, this paper studied IPv6 firewall defensive capability testing technology. Through the research of IPv6 protocol, this paper constructed five kinds of test packets with security risks, such as ICMPv6, single extended header, multi-extension header, fragmentation and address scopes, proposed a firewall testing framework with C/S architecture, built independent test modules for every kind of testing based the framework and test packets, set up test environments that can be used to test stateful firewalls, and provided appropriate test methods. Using the method, this paper tested a Cisco ASA5505 firewall and found its advantages and disadvantages.

  • 基于软件基因的Android恶意软件检测与分类

    Subjects: Computer Science >> Integration Theory of Computer Science submitted time 2018-04-12 Cooperative journals: 《计算机应用研究》

    Abstract: With the development of mobile internet, malicious code for Android platform has increased dramatically. And face up to the mount of Android malware, the current analyzing methods are focusing on the characteristic-based detecting, which is lack of a uniform systematic analyzing and classifying method. To resolve this status, this paper proposed the definition of Android malware gene to analyzing malware via binary sequence including function and information. And based on the characteristics of Android applications, this paper extract software gene from code fragment and resource fragment. Therein, the code fragment gene is a kind of formalization of use-def chains. Moreover, this paper proposed a detecting framework and a classifying framework based on malware gene. And this paper utilized a machine learning method, support vector machine(SVM) , in the frameworks. In evaluation, the detecting rate and classification correct rate are both high in those frameworks, with a recall rate of 98.37%. It proves the effect of malware gene in analyzing the homology of Android malicious code.