首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到10条相似文献,搜索用时 15 毫秒
1.
Due to the complexity of modern industrial systems, a conventional automation system is not capable of providing sufficient information management and high-level intelligent approaches, as achieving these functionalities requires the support of comprehensive data management and coordination between system devices and heterogenous information. This paper proposes the concept of e-Automation, in which computer networking and distributed intelligence agent technologies are applied to industrial automation systems, and presents a hardware and software architecture that implements this concept. An open infrastructure based on multi-agent systems is employed in the proposed architecture of e-Automation, which aims to allow the implementation of diverse tasks and to permit greater configurability than can be obtained from a traditional system. To evaluate our proposed e-Automation concept, this paper presents a case study of substation information management which adopts the proposed e-Automation architecture in power system domain.  相似文献   

2.
Traditional network management approach involves the management of each vendor‘s equipment and networkd segment in isolation through its own proprietary element management system.It is necessary to set up a new network management architecture that calls for operation consolidation across vendor and technology boundaries.In this paper,an architerctural model for Intelligent Network Management(INM)is presented.The INM system includes a manager system,which controls all subsystems and coordinates different management tasks;an expert system,which is responsible for handling particularly difficult problems,and intelligent agents,which bring the management closer to applications and user requirements by spreading intellignet agents through network segments or domain.In the expert system model proposed,especially an intellignet fault management system is given.The architectural model is to build the INM system to meet the need of managing modern network systems.  相似文献   

3.
Internet-based Web application systems are gradually built as software service coordination systems. In an open, dynamic and collaborative application environment, traditional methods assumed with closeness, centralization and independence are not able to cope with these security problems efficiently. Trust management is a new method for dealing with security issues of open, distributed network application system. However, the traditional policy-based trust management systems have some shortcomings, i.e. complex in policy making, unable to deal with negative se-curity credentials, etc. So, we design a trust management framework in combination with subjective trust model for software service coordination and security decision in Internet environment. This trust management framework has characteristics of operability, reasonability, and flexibility in policy setting.  相似文献   

4.
1 Introduction Public key infrastructure(PKI)is an integral part of the network communication system.Relying on the certificate authority,it provides security policies for the systems,which enables users to communicate or conduct e-commerce transactions in a trustworthy relationship.Centralized PKI(CPKI)has been providing the netizens with security services and maintaining the privacy for decades.  相似文献   

5.
移动Agent系统构建研究   总被引:1,自引:0,他引:1  
贾志勇  谢立 《计算机科学》2003,30(10):31-34
Mobile agent technology has strong adaptability to the status of network and executing environment, and provides a flexible and uniform framework for Web and distributed applications.Mobile agent system, as the foundation of agent computing, should provide the basic supports like executing support, agent migration, andcommunication, as well the extensive supports like naming service, security, fault tolerance, interoperation,application development and management tools. Based on the analysis of current mobile agent system, this article discusses these supports deeply, and also points out the main challenges to the development of mobile agent system.  相似文献   

6.
《计算机科学技术学报》2014,(3):F0003-F0003
Introduction
Research on computer architecture and systems is typically driven by technology and applications. Big data has emerged as an important application domain which has shown its huge impact on scientific research, business, and society. Big data is known for its large volume, high velocity, and a variety of formats. The collection, storage, retrieval, processing, and visualization of big data issues many challenges to computer architecture and systems. This special section is an effort to encourage and promote research to address the big data challenges from the computer architecture and systems perspectives.  相似文献   

7.
Use computer technology which includes serial data transmission technology, SQL Server database technology and network technology to the power system, we achieved the monitoring of electric quantity by wireless systems. Our work mainly includes the design of system structure, serial programming, database programming and network programming. We upload the data of current, voltage and power in each meter within a period of time to the Internet, making it convenient for the users and power grid companies to achieve current-time data monitoring.  相似文献   

8.
The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high performance network). During the evolution, computer networks represented by Internet have made great progress and gained unprecedented success. However, with the appearance and intensification of tussle, along with the three difficult problems (service customizing, resource control and user management) of modern network, it is found that traditional Internet and its architecture no longer meet the requirements of next generation network. Therefore, it is the next generation network that current Internet must evolve to. With the mindset of achieving valuable guidance for research on next generation network, this paper firstly analyzes some dilemmas facing current Internet and its architecture, and then surveys some recent influential research work and progresses in computer networks and related areas, including new generation network architecture, network resource control technologies, network management and security, distributed computing and middleware, wireless/mobile network, new generation network services and applications, and foundational theories on network modeling. Finally, this paper concludes that within the research on next generation network, more attention should be paid to the high availability network and corresponding architecture, key theories and supporting technologies.  相似文献   

9.
分布式协作模型及应用研究   总被引:1,自引:0,他引:1  
With the development of the Web technology,the application environment has acquired many new characters such as dynamic, openness,distribution and information uncertainty.The processing mode of application systems is more complicated than ever.For example,it requires application systems to have more community processing ability,interactive ability,distributed processing ability and collaborative ability.Accordingly the research and development of the computer application system transited from client/server information processing system into distributed collaborative processing system based on Web.Especially in the environment where the information and resources are highly distributed,the accomplishment of complicated tasks is dependent more on the resources coordination,information sharing and coordinator collaboration.The collaboration is one aspect of the group behavior and its goal is to provide a optimal method to utilize the resource through the information interaction and to solve the task which couldn't be accomplished by each coordinator alone and get the more total benefits than the sum of each benefit.The collaboration problem is the important one for distributed tasks processing.This paper surveys,the research and application status of distributed collaborative models and several representative architectures of distributed collaborative processing are proposed.However,the existing problems and the future researching direction are presented.  相似文献   

10.
The computer virus is considered one of the most horrifying threats to the security of computer systems worldwide.The rapid development of evasion techniques used in virus causes the signature based computer virus detection techniques to be ineffective.Many novel computer virus detection approaches have been proposed in the past to cope with the ineffectiveness,mainly classified into three categories: static,dynamic and heuristics techniques.As the natural similarities between the biological immune system(BIS),computer security system(CSS),and the artificial immune system(AIS) were all developed as a new prototype in the community of anti-virus research.The immune mechanisms in the BIS provide the opportunities to construct computer virus detection models that are robust and adaptive with the ability to detect unseen viruses.In this paper,a variety of classic computer virus detection approaches were introduced and reviewed based on the background knowledge of the computer virus history.Next,a variety of immune based computer virus detection approaches were also discussed in detail.Promising experimental results suggest that the immune based computer virus detection approaches were able to detect new variants and unseen viruses at lower false positive rates,which have paved a new way for the anti-virus research.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号