首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
夏振华  史小宏 《现代计算机》2010,(4):146-147,158
基于移动代理的P2P资源搜索方法是P2P搜索研究中较为新颖的方法.提出一种新的基于移动代理的P2P模型PIMA.并在此模型基础上提出相应的资源搜索算法.该模型集成节点集群技术和蚂蚁优化算法.以在Agent迁移中实现进一步的性能提高.  相似文献   

2.
针对传统对等存储系统中,存在数据上载时间长,带宽控制不理想的问题,提出动态步长分支界定P2P存储及云存储混合喷泉编码优化算法。首先,根据P2P存储及云存储各自特点,构建混合式P2P存储及云存储网络系统,该系统通过喷泉编码、参数控制单元、节点管理器及上传调度程序构建;其次,针对存储编码符号上传过程中,存在参数控制不理想,数据传输效果差的问题,在分支界定算法基础上,设计区间点微调的动态分支界定算法,实现算法计算复杂度降低,并可有效对上载时间长和网络带宽显著下降问题进行处理;最后,利用对比仿真显示,算法在数据上载时间及数据冗余度降低等指标上优于对比算法,验证了算法有效性。  相似文献   

3.
移动P2P网络节点具有的移动性,往往导致网络搜索性能变差,同时引起资源搜索成功率的降低以及系统的不稳定性.本文提出一种基于超级节点的资源发现算法(RDBS),它选择性能高且动态性弱的节点作为超级节点,并采用候补超级节点进行快速查询,有效改善了移动P2P网络中资源搜索性能和系统的稳定性.实验结果表明,该算法降低了索引信息的失效率、缩短了查询延迟并且提高了资源搜索的成功率.  相似文献   

4.
随着P2P分布式存储的研究深入,处在不同网络的节点间建立连接受到网络地址转换(network address translator,NAT)限制.现有的UDP对NAT的简单穿越(simple traversal of UDP through NAT,STUN)方案,不能满足P2P分布式存储对数据传输质量的要求,并且由于对称型NAT的广泛使用,节点间数据传输必须经过服务器中继转发,中继服务器成为系统瓶颈.提出采用基于UDP的数据传输(UDP-based data transfer,UDT)协议的改进STUN方案,可以保证数据传输可靠性,同时基于端口预测的NAT穿越策略,不需要服务器中继即可实现在对称型NAT后的节点间建立P2P直连.  相似文献   

5.
可分级视频编码(SVC)技术实现了从单一码流中得到不同帧率、分辨率和图像质量的视频数据,使其更能应对网络的抖动.P2P技术已广泛应用到流媒体直播系统中,现有的SVC P2P传输调度机制主要基于传统流媒体,较少考虑SVC流媒体多层的特殊结构.本文提出一种基于层间网络编码的SVC P2P传输调度算法,称为可分级P2P流媒体的自适应传输调度算法.该算法通过预测和调整邻居节点各层的发送概率,使得请求节点能够按照预定的各层接收比例接收数据包.理论分析和仿真结果显示该算法具有较目前主流算法更好的性能.  相似文献   

6.
传统移动传感网簇头生成算法在筛选簇头节点时中存在的节点密度较低及网络传输性能较差的不足.因此,提出了一种基于蚁群粒子适应机制的移动传感网簇头生成算法.首先选取具有较高能量值的节点作为初始簇头节点,采取粒子迭代方式设计了基于蚁群粒子感知覆盖机制的簇头生成方法,并通过权值评估方式来优化备选簇头节点能量,有效改善因链路抖动而导致的传输性能受限现象,有效提高簇头节点分布密度.基于极限标准差优选机制,通过定时更新备选簇头节点标准差,进一步选取性能较高的节点维持链路性能,改善链路抖动现象并提高网络传输带宽,降低信道噪声对数据传输带来的不利影响.通过仿真实验与基于改进能量均衡机制的传感网簇头生成算法和基于能量优化回收机制的传感网簇头生成算法进行对比,表明所提算法具有更高的簇头节点密度和网络传输带宽.  相似文献   

7.
P2P网络中信任评价研究   总被引:1,自引:0,他引:1  
为了提高P2P网络节点间交互的安全性及成功率,客观地反映信任的模糊性与随机性本质,提出基于云模型的信任评价模型.通过信任云及其数字特征的定义,实现了信任定性描述与定量表示的统一.基于逆向信任云生成算法、信任云合并算法进行信任综合,以便获得更为完整的信任信息,并在推荐节点的选择上引进了信任的不确定度计算,提高了推荐的可靠性.通过信任云的相似度计算算法,生成相应的信任综合评价结果,作为节点交易的参考和依据,实现了信任的决策.通过仿真实验,表明该方法可较为客观、真实地反映P2P节点间的信任程度,从而为节点间成功交易提供了科学的、有效的决策依据.  相似文献   

8.
由人携带或使用智能设备组成的移动机会网络采用"存储-携带-转发"的通信机制,通过中继转发来实现节点之间的数据传递。为了改善网络性能,往往需要借助节点的社会属性来进行中继选择和制定转发策略。然而,在已有的传输机制中,往往只是利用节点的部分社会属性,不能完全反映出节点之间的社会关系。为此,提出了一种新的基于混合社区的数据传输机制,并给出了混合社区的内涵、混合社区的构建方法和基于混合社区的数据传输算法。基于几种真实轨迹数据集的实验结果表明,与已有的几种经典路由算法相比,该方法传输成功率较高,传输延迟较短,性能更好。  相似文献   

9.
移动社交网络节点间的组播通信是近年来研究者关注的热点问题之一。由于节点的动态变化及社会性,使得传统组播路由算法不能直接应用于移动社交网络。根据移动社交网络的环境特征,建立了移动社交网络的组播模型;利用环境感知信息,并结合最小生成树、格网组播路由算法,提出了环境感知的移动P2P社交网络组播路由算法。最后对该算法进行了理论分析及仿真实验测试,结果表明所提出的组播路由算法改善了数据传输的性能,具有较高的扩展性、鲁棒性。  相似文献   

10.
基于固定网络的信任模型缺乏对网络高度动态性的考虑,不能直接应用于移动P2P网络。本文利用节点的报文转发能力,提出了一种移动P2P环境下的分布式信任模型MobTrust。该模型通过分布式存储机制,将节点转发的评价数据备份于K桶中,扩充了评价数据的存储范围。同时,鉴于移动设备有限的计算能力,设计双反馈机制提高评价数据的可靠性,然后以轻量级的方式计算信任度。仿真结果表明,MobTrust能有效降低系统开销,并拥有较高的评价数据利用率和交易成功率。  相似文献   

11.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

12.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

13.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

14.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

15.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

16.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

17.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

18.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号