首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 115 毫秒
1.
SDPG: Spatial data processing grid   总被引:11,自引:0,他引:11       下载免费PDF全文
Spatial applications will gain high complexity as the volume of spatial data in-creases rapidly. A suitable data processing and computing infrastructure for spatial applications needs to be established. Over the past decade, grid has become a powerful computing environment for data intensive and computing intensive applications. Integrating grid computing with spatial data processing technology, the authors designed a spatial data processing grid (called SDPG) to address the related problems. Requirements of spatial applications are examined and the architec-ture of SDPG is described in this paper. Key technologies for implementing SDPG are discussed with emuhasis.  相似文献   

2.
Grid computing technology is developing in an impressing speed these years. This paper is going to do some detailed analysis on two of the major Grid projects, Globus and Legion, in order to find out the key technologies of Grid computing. In this paper, three key technologies will be discussed: Grid Architecture, Grid Data and Resource Services, and Grid Security Services. Different implementation of these technologies will be discussed and compared with each other, some new ideas about these technologies will be proposed as well.  相似文献   

3.
Market watchers are splashing criticisms and suspicions over the trusted computing, declaring that it will be many years before large numbers of companies and individuals benefit from this technology. This paper investigates a majority of TCG (Trusted Computing Group) members, classifies their products as TPM chips, TCG enabled hardware and software. The data are collected from both literature and websites. It indicates that the trusted computing technology in China is considerable on chips and hardware. As for TCG enabled software, there still have many obstacles for Chinese to combat.  相似文献   

4.
The coherence cube technology has become an important technology for the seismic attribute interpretation, which extracts the discontinuities of the events through analyzing the similarities of adjacent seismic channels to identify the fault form. The coherence cube technology which uses constant time window lengths can not balance the shallow layers and the deep layers, because the frequency band of seismic data varies with time. When analyzing the shallow layers, the time window will crossover a lot of events, which will lead to weak focusing ability and failure to delineate the details. While the time window will not be long enough for analyzing deep layers, which will lead to low accuracy because the coherences near the zero points of the events are heavily influenced by noise. For solving the problem, we should make a research on the coherence cube technology with self-adaptive time window. This paper determines the sample points' time window lengths in real time by computing the instantaneous frequency bands with Wavelet Transformation, which gives a coherence computing method with the self-adaptive time window lengths. The result shows that the coherence cube technology with self-adaptive time window based on Wavelet Transformation improves the accuracy of fault identification, and supresses the noise effectively. The method combines the advantages of long time window method and short time window method.  相似文献   

5.
The Internet technology has already changed the Information Society in profound ways, and will continue to do so. Nowadays many people foresee that there is a similar trajectory for the next generation of Internet - Grid Technology. As an emerging computational and networking infrastructure, Grid Computing is designed to provide pervasive, uniform and reliable access to data, computational and human resources distributed in a dynamic, heterogeneous environment. On the other hand, the development of Geographic Information System (GIS) has been highly influenced by the evolution of information technology such as the Internet, telecommunications, software and various types of computing technology. In particular, in the distributed GIS domain, the development However, due to the closed and centralized has made significant impact in the past decade. legacy of the architecture and the lack of interoperability, modularity, and flexibility, current distributed GIS still cannot fully accommodate the distributed, dynamic, heterogeneous and speedy development in network and computing environments. Hence, the development of a high performance distributed GIS system is still a challenging task.
So, the development of Grid computing technology undoubtedly provides a unique opportunity for distributed GIS, and a Grid Computing based GIS paradigm becomes inevitable. This paper proposes a new computing platform based distributed GIS framework - the Grid Geographic Information System (G^2IS).  相似文献   

6.
Cloud computing is currently an embryonic domain in the area of information technology that possesses the power of transforming the way information technology (IT) services are delivered and maintained in the business world. Pay as per the usage kind of cost structure coupled with delivery of computing services through internet makes cloud computing an exciting and potential growth oriented information technology model compared with conventional computing services delivery models. Various additional features like scalability, flexibility and easy deployment process creates a window for the organizations even relatively smaller in size to get benefitted by the highly advanced & modern technologies without incurring substantial cost. In spite of so many benefits of this new delivery model, concerns are beginning to grow about how safe an environment it is. Despite of all the hype surrounding the cloud, enterprise customers are still reluctant to deploy their business in the cloud. Security is one of the major issues which reduces the growth of cloud computing and complications with data privacy and data protection continue to plague the market. Other related concerns associated with the adoption of cloud computing include trust on service providers, loss of control and compliance issues. This paper is an attempt to explore security & trust issues linked with cloud computing adoption in the Small and Medium Enterprises (SME) sector.  相似文献   

7.
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security.  相似文献   

8.
The cloud computing introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. Consequently, there is a need of risk assessment approach adapted to cloud computing. With such an approach, the cloud consumers can be guaranteed the effectiveness of data security and the cloud providers can win the trust of their cloud consumers. This paper requires the formalization of risk assessment method for conventional system as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.  相似文献   

9.
Moore’s Law technology scaling has improved VLSI performance by five orders of magnitude in the last four decades. As advanced technologies continue the pursuit of Moore’s Law, a variety of challenges will need to be overcome. One of these challenges is management of process variation. This paper discusses the importance of process variation in modern CMOS transistor technology, reviews front-end variation sources, presents device and circuit variation measurement techniques (including circuit and SRAM data...  相似文献   

10.
Three-dimensional integrated circuit technology with transistors stacked on top of one an-other in multi-layer silicon film has always been a vision in the future technology direction. While the idea is simple, the technique to obtain high performance multi-layer transistors is extraordinarily diffi-cult. Not until recently does such technology become feasible. In this paper, the background and vari-ous techniques to form three-dimensional circuits will be reviewed. Recent development of a simple and promising technology to achieve three-dimensional integration using Metal-Induced-Lateral-Crystalliza-tion will be described. Preliminary results of 3D inverters will also be provided to demonstrate the viabil-ity for 3D integration.  相似文献   

11.
对等(P2P)计算是未来网络是P2P网络实现的最为关键的问题.以Gnutella为例,研究了非结构化P2P系统近年来的搜索优化技术.根据现代Gnutella网络的特点,提出了一种有助于改进非结构化P2P系统扩展性的搜索机制.  相似文献   

12.
对等(P2P)计算作为近年来兴起的一种重要的分布式计算模式,在很多领域都有着大量的应用和研究。随着越来越多的数据存储到P2P系统中,上层应用就需要底层架构来提供关键的数据定位和搜索能力,所以P2P资源搜索技术是P2P系统中的一种非常关键的技术,P2P资源搜索技术涉及到P2P系统的很多方面。例如资源定位所需要的时间,消耗的带宽等等。本文主要总结了当前P2P系统使用的几种重要的搜索技术以及相关应用,并对此进行总结,从而为研究P2P资源搜索提供思路和方法。  相似文献   

13.
随着网格技术的发展和应用的扩展,网格己经从单一的面向高性能计算的计算网格转向为面向服务的商业网格.通过分析对等计算融入网格计算技术.将对等思想和对等搜索技术应用于网格资源管理中,提出了一种新的对等搜索框架.最后设计并实现了一个基于P2P技术的网格系统模型.并详细介绍了系统架构、系统主要组成部分、以及网格系统模型的具体功能实现.  相似文献   

14.
无结构P2P网络搜索方法及其改进   总被引:14,自引:1,他引:13  
对等(P2P)计算是未来网络中的关键技术,对等网络是实现下一代互联网的重要组成部分。如何高效地搜索P2P网络上的资源是P2P网络实现的最为关键的问题。在讲述对等网络的基本搜索方法的基础上,分析了许多改进的搜索方法,包括基于转发的改进方法、基于缓存的改进方法和基于覆盖网拓扑优化的改进方法。  相似文献   

15.
为了提高非结构化P2P网络中数据查询搜索的效率,提出一种新型的一跳查询与转发数据搜索新策略(OHQFS),它是以非结构化P2P网络中的数据查询请求转发策略和非转发策略为基础,将它们整合、集成后得到的一种新策略.OHQFS策略中的查询源结点直接搜索其自身的所有邻居节点,并将查询请求转发给这些邻居节点,使得这些邻居节点再去搜索它们的相邻节点.该策略在数据查询搜索过程中无须维持一个很大的邻居节点信息集合,系统维护开销较小,通过本策略中固有的一步查询转发,使其邻居节点和邻居的邻居节点处于查询搜索范围内.网络仿真的实验结果表明,OHQFS策略相对于转发搜索策略而言,它提高了查询效率;而相对于非转发策略,它获得了较高的成功率.  相似文献   

16.
在研究三维模型检索技术的基础上,将网格技术及P2P技术融合在三维模型检索中,提出了一种新的建立与共享机制,给出了相应的设计模型,实现了CAD模型库的异构数据资源整合.对OGSA-DAI实现CAD模型的建立、特征提取、相似性匹配以及P2P技术实现CAD模型共享做了详细的阐述.该设计模型比传统的C/S模式或B/S模式更具有开放性与实用性,提高了CAD模型设计的效率.  相似文献   

17.
一种基于DHT的P2P搜索方法   总被引:7,自引:11,他引:7  
在网络搜索技术中,P2P模式有C/S模式无可比拟的优势。P2P为非中心化结构中的网络用户赋予更多的权力,使网络应用的核心从中央服务器向网络边缘的终端设备扩散,因而可以全面改写当前的网络搜索技术。在各种P2P技术中,搜索技术是最有价值、最亟待解决的问题,其中分布式哈希表(DHT)协议将是对等网搜索的重要发展方向。本文首先概述P2P搜索技术现状,接着分析比较了当前几种典型的协议搜索方法,最后讨论一种基于分布式哈希表的协议搜索方法。  相似文献   

18.
网格计算、P2P(peer to peer)计算与普适计算都是近几年出现的新的网络计算模式,这些新的计算模式与传统的Web计算模式相比体现出不同的特征,同时都受到通信技术与通信基础设施的制约。以IPv6为核心协议的下一代互联网技术的发展,特别是IPv6充足的地址空间、简化的报头、网络节点的自动配置、邻居发现协议、增强的安全特征等,能够对这些新的网络计算模式起到进一步的推动与融合作用。  相似文献   

19.
云计算的核心是在虚拟化技术的基础上,通过互联网技术为用户提供动态易扩展的计算资源。利用中心服务器的计算模式来管控网络上大量云资源使得中心服务器成为整个系统的瓶颈,不利于云计算的大规模应用,因此提出使用对等网络技术构建分布式的云资源索引存储和查询系统,但是结构化拓扑系统维护比较复杂,一般不支持复杂搜索条件查询。本文提出了一种多关键字云资源搜索算法。在基于分层超级节点的云资源搜索算法基础上进行路由算法改进,希望实现多关键字的精确查询。对多关键字的生成、分割及存储做出了详细说明,提出一种有效的基于数据集的索引搜索策略,实现了包含三个或三个以上的关键字高效、准确查询。分析实验结果证明了算法明显提高了资源搜索的命中率,尤其是随着关键字数目的增多,不仅保证了资源搜索的命中率,同时大大增加了资源的召回率。  相似文献   

20.
副本技术是P2P网络中常用的一种数据管理机制,在P2P网络中,由于节点的高度动态性,致使副本管理也必须具有动态性,副本管理是一项极具研究价值的课题。如何利用副本技术来提高非结构化P2P网络的资源搜索效率仍是目前尚未有效解决的难点之一。对非结构化P2P网络中广泛应用的Gossip协议和副本管理策略进行了探索和研究,运用模糊理论提出一种副本存储节点的选择策略。通过模拟实验,对相关数据进行分析,证明该项研究能有效提高对等网络中资源搜索的效率。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号