首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
通信中间件在GSM网络监控系统中的应用   总被引:2,自引:0,他引:2  
论文分析了通信中间件MQSeries的特点,以及基于MQSeries的信息交换和数据传输,并论述了在GSM网络监控系统中利用通信中间件MQSeries作为消息平台,进行数据采集和处理,实现对网络设备监控的设计实现框架。  相似文献   

2.
5月6日获悉:IBM宣布MQSeries家族又添新产品——信息流量生成器(TGEN)。MQSeries TGEN可使开发人员在MQSeries网络投入使用前对其进行“测试驱动”,为MQSeries网络测试信息流量承受能力及应答时间,以确保其达到应用信息流量的要求。 MQSeries网络可将各种软硬件上的复杂商务过程集成于一体,TGEN则可通过模拟应用信息流量趋势和进行性能报告来简化商务  相似文献   

3.
IBM公司推出的商业处理自动化和工作流管理软件MQSeries Workflow本月将在全球范围内正式面市,该软件能够自动化所有涉及企业职员、客户和应用软件的关键任务过程,帮助企业机构更便捷地管理、控制他们的商业活动。建立在MQSeries 5.0安全性和可靠性基础之上的MQSeries Workflow,是IBM MQSeries产品家族的一员,它全面支持32位Windows平台、Windows NT、ActiveX Clients、Client Runtime Libraries以及丰富的开发辅助套件。MQSeries Workflow包括工作流服务器、Buildtime for Windows NT and 95、管理工具、标准客户机、程序执行  相似文献   

4.
黄刘生  张波  徐宏力  张俊霞 《计算机应用》2006,26(11):2567-2569
节点配置是无线传感器网络研究的核心问题之一。为实现传感器节点的配置,随机散布方式被广泛地采用。主要研究了无线传感器网络节点随机配置的完全覆盖和连通问题。通过对网络完全覆盖和连通的分析,给出完全覆盖概率、检测半径和节点数目之间的定量关系;分析了参数对配置的影响,对比高斯分布和均匀分布的配置特性,以指导传感器网络的节点放置。提出了完全覆盖径向连通的配置方案来优化传感器节点数目,从而降低网络的配置代价。最后,利用模拟仿真试验来评定结论。  相似文献   

5.
传感器网络随机睡眠节点调度算法研究及实现   总被引:1,自引:0,他引:1       下载免费PDF全文
传感器网络是由大量形体较小、能源受限并且配置有计算能力和无线通信能力的传感器节点以Ad Hoc方式组成。传感器节点能源有限性、高密度配置的节点包冲突率高等问题使得节点调度成为必然。该文提出了一种基于动态邻居节点信息的随机睡眠调度机制,并将算法做成了一个可供重复使用的组件嵌入到TinyOS中。通过仿真实验,得到了验证。  相似文献   

6.
基于MQSeries的信息发布技术及其应用研究   总被引:4,自引:0,他引:4  
论文分析了MQSeries的特点,以及基于MQSeries的信息发布方式和发布策略,并论述了在民航机场管理信息系统中利用MQSeries技术开发中间服务层的设计实现框架。该服务层的建立实现了机场操作的自动管理和控制,提高了机场的运作效率,同时,还有利于机场业务功能的扩展及数据的开放式交换。  相似文献   

7.
《软件世界》2005,(11):66-66
根据社会保险的应用需求、系统框架和应用集成等各个角度考虑,IBM社会保障软件解决方案采用IBM著名的Websphere、MQSeries等系列中间件产品构建基于Browser/Web Application Server/Transaction Server/Database模式的三层次/多层次应用体系结构。社保业务分为实时交易和非实时(脱机)交易处理。软件配置分为实时交易处理和脱机交易处理两个部分。实时处理业务通过Websphere及Txseries/CICS交易服务器实现,非实时的业务通过MQSeries的互连,达到安全可靠地交换数据和异步交易处理的目的。实时交易处理部分中采用以Web应用服务器We…  相似文献   

8.
在对抗性的MANETs中,由于存在恶意节点,节点的地址自配置无法有效执行,为了对抗恶意节点的相关安全攻击,提出了基于门限的动态地址配置方案(Threshconf)。该方案主要通过门限签名为地址配置协议提供了访问控制安全机制,保证地址自配置协议在对抗性的MANETs中有效执行;同时与其他几种地址配置方案进行了比较分析。  相似文献   

9.
提出一种基于分布式的6LoWPAN无线传感器网络有状态地址配置方案,其每个传感器节点都具有分配地址的权力且地址分配空间具有唯一性,从而将地址分配任务均匀地分布到每个传感器节点,实现了多个传感器节点的同时配置,提高了地址分配效率;同时,节点申请地址的控制信息的传输范围均控制在一跳范围内,降低了地址配置功耗,缩短了地址配置时间,延长了网络寿命。对所提方案与MANETConf、Strong DAD及LISAA的地址配置代价及地址配置延迟时间等性能参数进行了比较分析,分析结果验证了此方案的可行性和高效性。  相似文献   

10.
浅谈中间件的原理和应用   总被引:2,自引:0,他引:2  
沈凯蓉 《福建电脑》2003,(2):18-19,25
本文简要介绍了中间件的概念,分类和原理,并以IBM的MQSeries为例详述中间件的工作流程。  相似文献   

11.
《Ergonomics》2012,55(4):441-475
The operation of machines typically requires attention to instruments that signal the state of the machine. One safeguard against primary instrument malfunction is to provide backup instruments, but this works only if the operators react to malfunction by switching attention to the backups. Little is known about the effect of negative outcomes or feedback on allocation of attention to backup instruments. Four experiments demonstrated that prior practice causes operators of a simulated machine to adapt to instrument malfunction by changing to a suboptimal decision rule rather than by reallocating attention to a different set of instruments. This fallacy appears linked to the operators' failures to notice feedback that they should switch during the simulations and operators' failures to correctly interpret outcome feedback following the simulations. The results raise theoretical questions and warn interface designers not to overrate backup instruments.  相似文献   

12.
Youmans RJ  Ohlsson S 《Ergonomics》2008,51(4):441-475
The operation of machines typically requires attention to instruments that signal the state of the machine. One safeguard against primary instrument malfunction is to provide backup instruments, but this works only if the operators react to malfunction by switching attention to the backups. Little is known about the effect of negative outcomes or feedback on allocation of attention to backup instruments. Four experiments demonstrated that prior practice causes operators of a simulated machine to adapt to instrument malfunction by changing to a suboptimal decision rule rather than by reallocating attention to a different set of instruments. This fallacy appears linked to the operators' failures to notice feedback that they should switch during the simulations and operators' failures to correctly interpret outcome feedback following the simulations. The results raise theoretical questions and warn interface designers not to overrate backup instruments.  相似文献   

13.
This article is devoted to the numerical solution of the inviscid two-layer shallow water system. This system may lose the hyperbolic character when the shear between the layer is big enough. This loss of hyperbolicity is related to the appearance of shear instabilities that leads, in real flows, to intense mixing of the two layers that the model is not able to simulate. The strategy here is to add some extra friction terms, which are supposed to parameterize the loss of mechanical energy due to mixing, to get rid of this difficulty. The main goal is to introduce a technique allowing one to add locally and automatically an ??optimal?? amount of shear stress to make the flow to remain in the hyperbolicity region. To do this, first an easy criterium to check the hyperbolicity of the system for a given state is proposed and checked. Next, we introduce a predictor/corrector strategy. In the predictor stage, a numerical scheme is applied to the system without extra friction. In the second stage, a discrete semi-implicit linear friction law is applied at any cell in which the predicted states are not in the hyperbolicity region. The coefficient of this law is calculated so that the predicted states are driven to the boundary of the hyperbolicity region according to the proposed criterium. The numerical scheme to be used at the first stage has to be able to advance in time in presence of complex eigenvalues: we propose here a family of path-conservative numerical scheme having this property. Finally, some numerical tests have been performed to assess the efficiency of the proposed strategy.  相似文献   

14.
防火墙作为网络安全设备越来越多地应用于局域网络与公用网络的互联中,具有服务代理、包过滤、入侵检测等功能。防火墙作为一个网络互连设备,在组建网络中还有着局域网与Internet互联、隐藏防火墙外网IP地址、隐藏内部网络、IP地址重定向、安全访问控制以及构建VPN等应用。文中结合某单位的局域网规划设计就防火墙的应用作了重要的阐述。  相似文献   

15.
One's model of skill determines what one expects from neural network modelling and how one proposes to go about enhancing expertise. We view skill acquisition as a progression from acting on the basis of a rough theory of a domain in terms of facts and rules to being able to respond appropriately to the current situation on the basis of neuron connections changed by the results of responses to the relevant aspects of many past situations. Viewing skill acquisition in this ways suggests how one can avoid the problem currently facing AI of how to train a network to make human-like generalizations. In training a network one must progress, as the human learner does, from rules and facts to wholistic responses. As to future work, from our perspective one should not try to enhance expertise as in traditional AI by attempting to construct improved theories of a domain, but rather by improving the learner's access to the relevant aspects of a domain so as to facilitate learning from experience.  相似文献   

16.
This research compared grasps to real surfaces with grasps to virtual surfaces, and used virtual surfaces to examine the role of cues to surface shape in grasp. The first experiment investigated the kinematics of overhand grasps to real and virtual objects. The results showed that, compared with grasps to real surfaces, grasps to virtual objects were different in the deceleration phase of the grasp movement and were more variable in their endpoint position. The second experiment used several measures to examine the relationship between the visual perception of a surface and the decision to grasp the surface with either an over-or underhand grasp. It was found that visual perception of the surface was consistent with the grasping decision. The third experiment used virtual surfaces to examine how the removal of visual cues to shape affected the decision to switch from over- to underhand grasp. Results showed that the orientation at which the decision switched was dependent on the visual information content. Overall, the results showed that subtle differences existed between the reach to grasp movements towards real and virtual surfaces and that the decision to choose between grasp types was dependent on the visual information used to depict the virtual surface. These results are discussed in relation to the design and use of input devices to enable manipulation of three-dimensional objects in virtual worlds.  相似文献   

17.
Holonic manufacturing systems (HMS) is based on the notion of holon, an autonomous, cooperative and intelligent entity to provide a econfigurable, flexible and decentralized manufacturing environment to respond to changing needs and opportunities. A set of holons that cooperate to achieve a goal forms a holarchy. How to design a mechanism to form a holarchy to achieve a goal while minimizing the overall cost is a challenge. The objectives of this paper are to propose models and develop collaborative algorithms to guide the holons to form a holarchy to coherently move toward the desired goal state ultimately. We adopt contract net protocol (CNP) to model mutual selection of holons in forming a holarchy. We formulate a holarchy optimization problem to minimize the cost subject to the feasibility constraints. To analyze the feasibility of a holarchy, a Petri net (PN) model is proposed. As classical PN models do not take into account the cost involved in firing transitions, we augment the PN model with cost functions in the problem formulation. Due to the distributed architecture of HMS, the internal structure of each potential holarchy that acts as bidder in CNP is not available to the manager. A key issue is to determine the feasibility of a holarchy without constructing the whole PN model of the given hierarchy. We study the feasible conditions for a holarchy and propose a collaborative algorithm to analyze the feasibility and award contracts to holons without constructing the whole model of a holarchy.  相似文献   

18.
Relevance feedback (RF) is a technique that allows to enrich an initial query according to the user feedback. The goal is to express more precisely the user’s needs. Some open issues arise when considering semi-structured documents like XML documents. They are mainly related to the form of XML documents which mix content and structure information and to the new granularity of information. Indeed, the main objective of XML retrieval is to select relevant elements in XML documents instead of whole documents. Most of the RF approaches proposed in XML retrieval are simple adaptation of traditional RF to the new granularity of information. They usually enrich queries by adding terms extracted from relevant elements instead of terms extracted from whole documents. In this article, we describe a new approach of RF that takes advantage of two sources of evidence: the content and the structure. We propose to use the query term proximity to select terms to be added to the initial query and to use generic structures to express structural constraints. Both sources of evidence are used in different combined forms. Experiments were carried out within the INEX evaluation campaign and results show the effectiveness of our approaches.  相似文献   

19.
目前,数据库为了保证运行安全需要进行在线更新,由于大量的数据要在短时间之内完成加载,那么计算机很难直接对其表决。针对这种问题,我们提出针对数据库的实时状态表决,而不是对数据库直接表决,并基于这种表决方法设计出相应的算法,有效解决数据量过大的问题。  相似文献   

20.
提高计算机信息系统维护效率的策略探讨   总被引:1,自引:0,他引:1  
计算机信息系统提升了整个信息时代的高速运转,帮助人们完场信息的采集、处理、存储、传输、检索等工作。如何帮助计算机用户节约更多的时间,是计算机信息系统维护工作需要继续改善的问题,抓住时间的时效性,提高信息的使用价值,就体现在这里。本为,问们将就如何提高计算机信息系统维护效率问题进行一系列的探讨分析。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号