共查询到20条相似文献,搜索用时 135 毫秒
1.
为了确保地铁多线路多系统能够安全运行,本文提出设计一个多层次的地铁网络安全系统,该系统由安全管理平台、工业防火墙、运维审计堡垒机、工控安全监测审计系统、网络防病毒系统、终端安全系统、数据库审计系统、下一代防火墙、入侵检测系统、高级威胁检测系统等融合在一起形成,实时地监控地铁多线路多系统的运行状态和安全态势,为地铁的网络安全防御提供有效保障。实验结果显示,本文提出的多层次网络安全防御系统防御效果达到了99.89%,从而可以防范各种木马和病毒,避免地铁多线路多系统遭受入侵无法正常运行。 相似文献
2.
针对反应罐、大型储油罐液位实时动态测量的需要,探讨了储油罐液位测控系统的设计方法,着重阐述了系统的设计方案、系统功能和实现方法。利用该系统可实现对储油罐进行连续液位、温度、流量的监控,提高系统的管理水平,保障其安全运行。本储油罐液位测控系统由下位监测系统和上位机组成,系统结构简单,便于实现自动监控,软件系统界面友好、操作简便。 相似文献
3.
进入21世纪,随着IT技术、网络技术、管理技术的发展,生产型企业的管理层逐渐意识到“管理出效益”的重要性,早期一个生产企业一般就有一两个信息化系统,类似SCADA系统、视频监控系统、OA系统等。管理层在原先“只监不管”基础上,逐渐投资建设相关信息化系统,如GIS系统、巡检系统、综合调度系统、智慧燃气等,结合相关的管理措施,使得企业的生产效益得到了有力的提升。 相似文献
5.
6.
iFIX软件在湖南益阳电厂一期工程中的应用 总被引:2,自引:0,他引:2
1 概述 现今,国内火电厂300MW机组以上的主控系统都普遍采用了DCS技术,但外围辅助系统,包括除灰系统、除渣系统、化水系统、输煤系统等多采用独立、分散的常规控制系统,由于各辅助系统工艺特性不同,所以采用的控制系统配置不同、技术水平、监控方式各异,这就势必对每个辅助系统都需配备相当的运行人员,使劳动生产率不能进一步提高。因此,在电厂的辅助系统中采用网络控制技术,用先进、成熟、可靠的技术来实现更新换代是时代发展的必然趋势。 益阳电厂一期工程2×300MW机组的外围辅助系统采用上位机+PLC网络监控方式,自动化水… 相似文献
7.
《数字社区&智能家居》2007,(10):7-7
近日,广州市中华广场已进八弱电系统调试阶段,工程的承建方清华同方将为广场提供包括中央空调系统、空调通风系统、高低压变配电系统、给排水系统、中央热水系统、电梯系统等在内的整体智能化控制系统,为中华广场打造真正数字化的人居环境。中华广场位于中山四路中段,北临广州烈士陵园,东接英雄广场,广场二期写字楼总高度268米,总建筑面积达118890平方米。[第一段] 相似文献
8.
9.
文章研究旨在设计并应用一种基于云计算的信息安全风险管理系统。具体而言,研究内容包括系统需求分析、系统架构设计、系统模块设计以及系统实现等方面。此外,完成研究设计后,文章进行了系统应用与实验,包括系统功能介绍、实验设计和实验结果分析,从而进一步评估系统的安全性能。 相似文献
10.
基于UML的嵌入式实时控制系统的建模与实现 总被引:2,自引:1,他引:2
随着嵌入式系统在各个领域的广泛应用,嵌入式系统变得越来越复杂,研究一种支持嵌入式系统从分析、设计、验证到编码这一整个过程的模型系统及建模方法变得越来越重要。用UMI对嵌入式系统进行面向对象分析与设计,并以电梯实时控制系统为例,建立系统的静态模型和动态模型。在IAR、visualSTATE、ATE环境下,分析系统状态,实现了从状态图到C代码的自动生成,这提高了软件设计和实现的效率、质量、维护性和扩展性。 相似文献
11.
S. Shaw 《Journal of Computer Assisted Learning》1993,9(2):93-99
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained. 相似文献
12.
13.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times. 相似文献
14.
Nir Fresco 《Minds and Machines》2008,18(3):379-401
This paper deals with the question: What are the criteria that an adequate theory of computation has to meet? (1) Smith’s answer: it has to meet the empirical criterion (i.e. doing justice to computational practice), the conceptual criterion (i.e. explaining all the underlying concepts) and the cognitive criterion (i.e. providing solid grounds for computationalism). (2) Piccinini’s answer: it has to meet the objectivity criterion (i.e. identifying computation as a matter of fact), the explanation criterion (i.e. explaining the computer’s behaviour), the right things compute criterion, the miscomputation criterion (i.e. accounting for malfunctions), the taxonomy criterion (i.e. distinguishing between different classes of computers) and the empirical criterion. (3) Von Neumann’s answer: it has to meet the precision and reliability of computers criterion, the single error criterion (i.e. addressing the impacts of errors) and the distinction between analogue and digital computers criterion. (4) “Everything” computes answer: it has to meet the implementation theory criterion by properly explaining the notion of implementation. 相似文献
15.
FTDSS:高容错分布式共享存储机制 总被引:1,自引:1,他引:1
Computerized data has become critical to the survival of an enterprise. Company must have a strategy for recovering their data should data lose. RAID is a popular mechanism to offer good fault-tolerance. But RAID can notwork well when one more disks fail. In this paper, we present an efficient Network-based high High-Tolerance Dis-tributed Shared Storage mechanism called FTDSS. FTDSS makes use of disk space of node in Network to build alarge pubhc shared storage space. Users can read/write their file from/to the public storage space from node of net-work. Physically File is stored in each node in form of data fragment or XOR verify fragment. Because of redundant XOR fragments, file is available even when two more nodes fail. FTDSS realize distant redundant srorage. At last,this paper use experiment to prove that FTDSS can offer high. fault-tolerance and advanced performance. 相似文献
16.
面向查询的多文档摘要技术有两个难点 第一,为了保证摘要与查询密切相关,容易造成摘要内容重复,不够全面;第二,原始查询难以完整描述查询意图,需进行查询扩展,而现有查询扩展方法多依赖于外部语义资源。针对以上问题,该文提出一种面向查询的多文档摘要方法,利用主题分析技术识别出当前主题下的子主题,综合考虑句子所在的子主题与查询的相关度以及子主题的重要度两方面因素来选择摘要句,并根据词语在子主题之间的共现信息,在不使用任何外部知识的情况下,进行查询扩展。在DUC2006评测语料上的实验结果表明,与Baseline系统相比,该系统取得了更高的ROUGE评价值,基于子主题的查询扩展方法则进一步提高了摘要的质量。 相似文献
17.
The theses of existonness, compoundness, and polyadness are proved. The consistency of these theses with the reversibility
principle is founded. Existential foundations of the composition paradigm are constructed.
__________
Translated from Kibernetika i Sistemnyi Analiz, No. 2, pp. 3–12, March–April 2008. 相似文献
18.
A major challenge in nanoscience is the design of synthetic molecular devices that run autonomously (that is, without externally mediated changes per work-cycle) and are programmable (that is, their behavior can be modified without complete redesign of the device). DNA-based synthetic molecular devices have the advantage of being relatively simple to design and engineer, due to the predictable secondary structure of DNA nanostructures and the well-established biochemistry used to manipulate DNA nanostructures. However, ideally we would like to minimize the use of protein enzymes in the design of a DNA-based synthetic molecular device. We present the design of a class of DNA-based molecular devices using DNAzyme. These DNAzyme-based devices are autonomous, programmable, and further require no protein enzymes. The basic principle involved is inspired by a simple but ingenious molecular device due to Tian et al. [Y. Tian, Y. He, Y. Chen, P. Yin, C. Mao, A DNAzyme that walks processively and autonomously along a one-dimensional track, Angew. Chem. Intl. Ed. 44 (2005) 4355–4358] that used DNAzyme to traverse on a DNA nanostructure, but was not programmable in the sense defined above (it did not execute computations). 相似文献
19.
David Poole 《Computational Intelligence》1989,5(2):97-110
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given. 相似文献
20.
The new method of defuzzification of output parameters from the base of fuzzy rules for a Mamdani fuzzy controller is given in the paper. The peculiarity of the method is the usage of the universal equation for the area computation of the geometric shapes. During the realization of fuzzy inference linguistic terms, the structure changes from the triangular into a trapezoidal shape. That is why the universal equation is used. The method is limited and can be used only for the triangular and trapezoidal membership functions. Gaussian functions can also be used while modifying the proposed method. Traditional defuzzification models such as Middle of Maxima − MoM, First of Maxima − FoM, Last of Maxima − LoM, First of Suppport − FoS, Last of Support − LoS, Middle of Support − MoS, Center of Sums − CoS, Model of Height − MoH have a number of systematic errors: curse of dimensionality, partition of unity condition and absence of additivity. The above-mentioned methods can be seen as Center of Gravity − CoG, which has the same errors. These errors lead to the fact that accuracy of fuzzy systems decreases, because during the training root mean square error increases. One of the reasons that provokes the errors is that some of the activated fuzzy rules are excluded from the fuzzy inference. It is also possible to increase the accuracy of the fuzzy system through properties of continuity. The proposed method guarantees fulfilling of the property of continuity, as the intersection point of the adjustment linguistic terms equals 0.5 when a parametrized membership function is used. The causes of errors and a way to delete them are reviewed in the paper. The proposed method excludes errors which are inherent to the traditional and non- traditional models of defuzzification. Comparative analysis of the proposed method of defuzzification with traditional and non-traditional models shows its effectiveness. 相似文献