首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 531 毫秒
1.
梁振英  王朝立  陈华  李彩虹 《自动化学报》2016,42(10):1595-1604
研究了不确定非完整移动机器人系统的跟踪问题.首先,基于视觉反馈和状态输入变换,展示了一种非完整移动机器人运动学系统的不确定链式模型.基于反步法思想和跟踪误差系统结构,给出了两个重要的新变换.然后运用李雅普诺夫直接方法和扩展巴巴拉引理设计了自适应控制律和动态反馈鲁棒控制器,以实现理想轨迹的跟踪控制.严格证明了闭环误差系统的渐近收敛性.最后,仿真结果证实了提出的控制策略有效.  相似文献   

2.
利用GSM协议的一个缺陷,提出一个对GSM用户定位的方法.当用户使用GSM移动电话时,攻击者修改GSM移动电话和基站之间在空中接口传输的一些信令报文子域,诱使GSM移动电话向基站明文传输IMSI和IMEI身份标识符.这种攻击方法能让通信双方对攻击没有察觉,从而保证攻击的隐蔽性.攻击者根据截获的IMSI和IMEI,以及用户所属区域的LAI即可实现对用户的定位.  相似文献   

3.
新型智能远程控制系统的设计与研究   总被引:1,自引:1,他引:0  
远程控制软件可以大大简化我们的网络管理工作,更加有效地保证网络和计算机操作系统的安全.本文采用服务器/客户机模式,以Java语言网络编程技术实现了远程控制系统.详细说明体系结构中各模块的主要功能;以流程图的方式详细说明系统软件的实现重点和过程.最后通过Java Socket网络编程,最终实现了新型智能远程担制系统的设计与开发.  相似文献   

4.
电子业务是银行中间业务的一个重要组成部分,直接关系到银行的信誉.本文根据银行业务部的短信理财系统的需求,结合现在移动梦网业务的发展,开发了短信理财系统,实现了短信理财的目标,并就系统的分析、设计和实现进行了详细的阐述.  相似文献   

5.
Incorporation of fog computing with low latency,preprocession(e.g.,data aggregation)and location awareness,can facilitate fine-grained collection of smart metering data in smart grid and promotes the sustainability and efficiency of the grid.Recently,much attention has been paid to the research on smart grid,especially in protecting privacy and data aggregation.However,most previous works do not focus on privacy-preserving data aggregation and function computation query on enormous data simultaneously in smart grid based on fog computation.In this paper,we construct a novel verifiable privacy-preserving data collection scheme supporting multi-party computation(MPC),named VPDC-MPC,to achieve both functions simultaneously in smart grid based on fog computing.VPDC-MPC realizes verifiable secret sharing of users’data and data aggregation without revealing individual reports via practical cryptosystem and verifiable secret sharing scheme.Besides,we propose an efficient algorithm for batch verification of share consistency and detection of error reports if the external adversaries modify the SMs’report.Furthermore,VPDC-MPC allows both the control center and users with limited resources to obtain arbitrary arithmetic analysis(not only data aggregation)via secure multi-party computation between cloud servers in smart grid.Besides,VPDC-MPC tolerates fault of cloud servers and resists collusion.We also present security analysis and performance evaluation of our scheme,which indicates that even with tradeoff on computation and communication overhead,VPDC-MPC is practical with above features.  相似文献   

6.
2008年3月17日,浙江省永康市威仕达五金制造厂总经理杜美燕像往常一样打开电脑,开始查阅来自中国制造网(www.Made-in-China.com)的询盘.这个早在8年前就养成的习惯,为威仕达赢得了外贸销售额中90%的订单.不过最近几天,由于广交会的临近,询盘相对少了些,这让杜美燕忙里偷闲回忆起了往事:尽管公司从2000年的白手起家,到2007年通过电子商务拿到的订单已经超过了300万美元,但是回想这些年来网络外贸的经历,最令杜美燕难忘的还是2003年.  相似文献   

7.
Performance variability,stemming from nondeterministic hardware and software behaviors or deterministic behaviors such as measurement bias,is a well-known phenomenon of computer systems which increases the difficulty of comparing computer performance metrics and is slated to become even more of a concern as interest in Big Data analytic increases.Conventional methods use various measures(such as geometric mean)to quantify the performance of different benchmarks to compare computers without considering this variability which may lead to wrong conclusions.In this paper,we propose three resampling methods for performance evaluation and comparison:a randomization test for a general performance comparison between two computers,bootstrapping confidence estimation,and an empirical distribution and five-number-summary for performance evaluation.The results show that for both PARSEC and highvariance BigDataBench benchmarks 1)the randomization test substantially improves our chance to identify the difference between performance comparisons when the difference is not large;2)bootstrapping confidence estimation provides an accurate confidence interval for the performance comparison measure(e.g.,ratio of geometric means);and 3)when the difference is very small,a single test is often not enough to reveal the nature of the computer performance due to the variability of computer systems.We further propose using empirical distribution to evaluate computer performance and a five-number-summary to summarize computer performance.We use published SPEC 2006 results to investigate the sources of performance variation by predicting performance and relative variation for 8,236 machines.We achieve a correlation of predicted performances of 0.992 and a correlation of predicted and measured relative variation of 0.5.Finally,we propose the utilization of a novel biplotting technique to visualize the effectiveness of benchmarks and cluster machines by behavior.We illustrate the results and conclusion through detailed Monte Carlo simulation studies and real examples.  相似文献   

8.
1.灵活运用样式 熟悉网页设计的网友都知道,调用Style的方法很多,我们可以单击鼠标右键选择Custon Style来调用Style,也可以在状态栏中的元素列表上单击右键来调用Style.虽然不同的方法达到的效果看似一样,但实际上产生的HTML代码则完全不同.比如用Custon Style来调用Style,在网页代码中就生成一个标签,这样的标签一多就会使文件十分臃肿而且影响浏览器的解析速度,所以我们应尽量使用状态栏中的元素列表来调用Stvle.  相似文献   

9.
软件盗版仍然猖獗。根据商业软件协会和IDC的第二次年度全球软件盗版调查,在全世界个人电脑上安装的软件有35%是盗版软件,这意味着在2004年盗版造成了将近330亿美元的损失。为了确定对应用程序  相似文献   

10.
《信息网络安全》2008,(2):74-76
病毒"工业化"入侵凸显病毒经济病毒/木马背后所带来的巨大的经济利益催生了病毒"工业化"入侵的进程。2007年上半年,金山对外发布了病毒木马产业链的攻击特征,在此阶段,病毒木马的攻击通常是针对单个计算机的攻击行为。攻击的手法,一般利用社会工程欺骗的方式,发送经过伪装的木马以及通过网页挂马构造大  相似文献   

11.
Algebraic models of programs with procedures extend algebraic models of programs that are free of procedures (simple models of programs). A specific feature of both types of models is that they are built for some formalization of software programs. Models of programs are intended for studying functional equivalence of formalized programs and constructing wide sets of equivalent transformations of programs. Two basic problems in the theory of algebraic models of programs are the equivalence problem and the problem of building complete systems of equivalent transformations. An increasing interest in models of programs with procedures is due to the abundance of results obtained for simple models of programs. The most suitable model of programs with procedures is a gateway model. A remarkable feature of these models is that every such model is induced by some simple model of programs. This paper gives a survey of the latest results obtained for gateway models of programs.  相似文献   

12.
An approach to solving the problem of determining similarity with application of a maximal common fragment of two graphs is considered. Its two main disadvantages are specified. Two new approaches to solving the problem of determining similarity of digraphs are proposed: a generalized substructural-metric approach and an approach using a stratified system of matrix models of the digraph complexity. New features for investigating similarity of digraphs are formulated. The original problem of calculating similarity of layout of fragments in the digraph is formalized with account of quantitative and qualitative features of fragments of the digraph. A methodology, involving two systems of methods for solving the problem, is developed. The first system of methods takes into account the precise layout of fragments in the digraph, while the second one deals with the approximate layout of fragments. A new class of problems is distinguished, which consists in calculating similarity of digraphs with account of similarity of the layout of fragments of the specified type. An example of solving the problem of finding semantic networks that are most similar to a network-template is presented.  相似文献   

13.
The problem of cybersecurity of computer networks for control of power supply at the level of railroads is analyzed and a graph of the topology of a computer network for control of power consumption is proposed. Based on the Pukhov theory of differential transformations, a number of differential mathematical models are proposed to assess the level of cybersecurity of a computer network for control of power supply. For differential images, a cybersecurity criterion is proposed and the minimax principle is developed for the worst combination of the intensity of cyberattacks and the flow of protective actions. A method of predictive search for an optimal cybersecurity strategy by the extremum analysis of a functional for the case of stochastic intensity of flows of cyberattacks is developed.  相似文献   

14.
The dynamics of psycho-physiological characteristics of participants of laboratory markets in the process of making economical decisions in the decentralized control system is analyzed. For this purpose, the method based on the comparison of stabilographic data with the history of market actions recorded in the course of the experiment is used. The key tool for data analysis is the new segmentation algorithm, which provides efficient partitioning of the stabilographic time series into homogeneous fragments. The segmentation algorithm is obtained as the solution of the problem of estimation of the parameters of the hidden Markov model. The application of this algorithm on the level of individual decision making proves the hypothesis of connection of the stabilogram segmentation time instants of the participant with the time instants of signal actions on the laboratory market. On the level of group decisions, the effect of synchronization of stabilographic time series of participants at the time instant of auction culmination connected with revelation of private information is supported. The degree of synchronization is estimated using a proximity factor calculated based on the specially aggregated canonical correlation.  相似文献   

15.
文中分析了企业应用系统集成的必要性和点对点集成及EAI方法的不足.探讨了面向服务的架构模型及其集成思想.提出了基于SOA的企业应用系统集成的解决方案,并给出了一个具体应用集成的开发示例.充分论证了基于SOA的应用系统集成开发的优越性和必然性.Web服务技术是实现SOA的最佳实践.  相似文献   

16.
An industrial association of independent enterprises of the type of innovation-industrial complex or industrial park is considered, which is intended to introduce high-technology developments of a defence sector for the manufacture of products of the civil purpose. A mathematical model is suggested for the planning and control of the action of elements of the technological chain established. The possibility of consistency of economic interests of the participants of associations with the aid of the control mechanism based on the system of accounting prices for the intermediate product is shown.  相似文献   

17.
This work presents the basic of method of concerted spatial-frequency Fourier filtering of phase distributions of biological fluids laser images. The comparative investigations of the efficiency of method of direct mapping of phase distributions and Fourier phasometry of laser field, transformed by dendritic and spherulitic networks of albumin and globulin were performed. The set of criteria of polarization-phase differentiation of both acute and gangrenous appendicitis were grounded.  相似文献   

18.
The media of layered crystals as a possible element of memory in the storage systems were analyzed, the manipulation mechanisms of which are carried out with polarization of incident radiation. The phenomenon of polarization optical bistability in the medium of layered crystals was obtained, in which the transmission band is managed with only the change of polarization of incident radiation. On the basis of the mechanism of polarization control of nanoparticles motion in the tasks of polarization diagnostics of optical fields, the estimation of the coherent features of mutually orthogonal linearly polarized optical fields was performed that also enables to analyze the terms of storage of information about the structure of an optical field.  相似文献   

19.
Conditions are considered of the invariance of linear stationary dynamic systems, the quality of operation of which is described by an aggregate of matrix transfer functions, to structural disturbances representable in the operator form of the notation of a mathematical model without changes in the dimensions of matrices entering into this model. Parametric disturbances represent mearly a composite portion of the disturbances under examination. On the basis of the use of the technology of embedding of systems, the necessary conditions of existence of the invariance to the disturbances under study are found and also complete sets of the disturbances that do not affect the quality of operation of a system are described. An illustrative example is given.  相似文献   

20.
A constructive technology of the solution of the parametrized problems of the programmed optimal control of systems with the distributed parameters under the conditions of different requirements for the permissible deviation of the resulting spatial distribution of the controlled value from the set magnitude in the uniform metric is proposed. The developed technique uses a special procedure of the one-criterion convolution of the considered constraints and the subsequent reduction to the typical form of the problems of mathematical programming on the extremum of a function of a finite number of variables with an infinite number of constraints (semi-infinite optimization problem), which is solved by the scheme of the previously developed alternance method. An example of optimization by the criteria of the speed and energy consumption of unsteady heat conduction processes with two different restrictions on the accuracy of approximation to the given temperature conditions, which is of independent interest, is given.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号