共查询到20条相似文献,搜索用时 203 毫秒
1.
在基于装备的显控软件开发过程中,一般包含各种界面显示功能,通信数据收发功能,数据处理与转换功能,数据提交与分发功能。这些功能都是相互独立的部分,相互之间是异步工作的,这就需要他们之间能够相互勾连互通,相互之间能够通过内部协议数据进行驱动。功能技术实现需要借助于多线程和阻塞式读取管道协议数据的方式来实现数据驱动整个程序进行高效且实时地运转,这就大大提高了显控软件的实时性,有效地避免了界面反应迟钝和卡死的现象,也极大地提高了除界面以外其他功能独立于界面运转的实时性和对装备中显控软件以外其他与显控软件通信连接的部分应激反应的实时性。 相似文献
2.
3.
4.
在全数字摄影测量工作站VirtuoZo上获取的矢量数据为CAD12.0的数据格式,由于我国比较常用的信息处理软件没有统一的编码要求,因此,获取的VirtuoZo数据还要根据用图单位的需求进行数据的转换。针对上述问题论述了VirtuoZo数据转换处理成其他系统数据格式的程序设计方法。利用该程序可以大大的提高工作效率。 相似文献
5.
分析了分布式数据同步的方法和策略,对SQL Server、Oracle等结构的数据库复制方案进行了对比,针对数据同步过程中对数据的一致性、安全性、高效性等需求,提出了采用二进制方法进行双向增量传输的数据同步方式,指出了异构数据库模式转换的要点。 相似文献
6.
本文分析了高原海拔和空气等环境因素对数据中心高低压变配电系统、通信电源系统、后备柴油发电机组等电源设备的影响,对高原数据中心的供电设计进行了探讨,提出高原地区数据中心电源设计中应对高原特殊环境采用的应对技术措施。 相似文献
7.
数据加密技术在嵌入式系统中的应用 总被引:1,自引:1,他引:0
在装备的试用状态管理和敏感数据保护等方面,数据加密技术的应用越来越广泛。针对嵌入式系统的特点和数据加密需求,给出了一种可应用到嵌入式系统的数据加密算法。该方法在随机数序列的基础上实现数据加密,并综合应用了数据二次寻址、置换表、数据字节运算、改进的循环冗余校验等技术,相同明文每次加密后形成的密文数据各不相同,具有加密强度高、算法容易实现、密文数据防篡改等特点。该技术已成功应用于C8051F020和MSP430F135单片机系统,分别实现了某两型装备的试用期状态管理和敏感数据保护。 相似文献
8.
Data hiding is a technique for secret and secure data storing and transmission that embeds data into a media such as an image, audio, video and so on, with minimal quality degradation of the media. Some developed data hiding schemes are reversible. Reversibility property allows the media to be recovered completely after extraction of the embedded data. Vector Quantization (VQ)-based image data hiding is one of the most popular study areas in the literature. However, most VQ-based reversible data hiding schemes generate non-legitimate codes as output. In other words output codes generated by such schemes could not be decoded by the conventional VQ or VQ based decoders and may arouse the attention of interceptors. On the other hand, the existing VQ based reversible data hiding schemes that generate legitimate VQ codes as output, suffer from low capacity and poor quality of stego-image. In this paper a novel reversible data hiding scheme for VQ-compressed images based on locally adaptive data compression scheme (LAS) is proposed. Unlike other schemes, the proposed scheme doesn’t change the VQ indices; data is embedded by choosing one of the possible ways to encode each index. As a result, in comparison with the schemes that embed data by index replacement, in the proposed scheme no extra distortion is made by data embedding and the outputted codes are compatible with the conventional LAS decoder. These properties help to hide the existence of secret data and make the scheme suitable for steganography. Moreover, a framework to combine the proposed scheme with some other schemes to improve their capacity and embedding side information is proposed. Since LAS is a general data compression scheme, the proposed scheme could be used to embed data into any data formats. All existing LAS based data hiding schemes produce non-legitimate codes as their outputs and the proposed scheme is the first and only one that produces legitimate codes as output. Experimental results show that the proposed scheme outperforms the existing LAS based schemes and some other VQ based data hiding schemes. On average, the proposed scheme embeds 2.14 bits per index with almost the same bit-rate as the bit-rate of the VQ index table. 相似文献
9.
10.
Wilson L.F. Burroughs D.J. Kumar A. Sucharitaves J. 《Proceedings of the IEEE. Institute of Electrical and Electronics Engineers》2001,89(2):186-200
The paper presents the basic ideas behind the use of software agent technology for distributed simulation and data assimilation. A software agent is an autonomous computer program that operates on behalf of someone or something. A mobile agent has the ability to migrate during execution from machine to machine in a heterogeneous network, while a stationary agent executes only on the system on which it began execution. To understand the role of agents in distributed simulation, note that simulations often operate on static datasets and data sources. Many simulations would produce more accurate results if they could access dynamically changing data from other sources, such as sensors or even other simulations. From the perspective of one simulation, other simulations are data resources, producing information possibly relevant to the past, present, or future of the system being modeled. Software agents allow dynamic linking between distributed simulations and efficient monitoring of and access to remote data resources. Specifically, they conserve bandwidth, provide custom operations without precompiling or preloading, and adapt to support disconnected operations. The paper describes the development of a software agent based framework for dynamically linking distributed simulations and other remote data resources. The framework called ABELS (Agent-Based Environment for Linking Simulations) allows independently designed simulations to communicate seamlessly with no a priori knowledge of the details of other simulations and data sources. We discuss our architecture and current implementation developed using the D'Agents mobile agent system 相似文献
11.
通过对基于判决反馈的信噪比最大似然估计推导过程的分析,得出:判决反馈最大似然估计得到的估计值是有偏估计;利用基带数据的高阶矩特性,可以获得渐近无偏估计。该文提出了两种新的SNR的迭代求解方法。一种是基于NDA(Non-Data-Aided)最大似然估计的梯度迭代求解方法,这种方法与其它迭代方法相比,具有更好的收敛性能。另一种是基于统计参量的迭代方法,它不需要对输入数据进行存储;而且在相同的信噪比估计性能下,与其它迭代运算相比,运算量大大降低,尤其适合于低信噪比下信噪比估计要求高的应用中。最后,文章对比了几种SNR估计子的性能与运算量。 相似文献
12.
基于TCP/IP的网络普遍存在各种安全问题,对于安全级别较高的单位,采用物理隔断的方式又带来了成本增加和数据难以共享等问题.要解决这一问题,可以通过在物理隔断网络之间采用串口连接的方式进行通信,具体的方式是:通过串口连接两个物理网络,两个网络中,如果需要与对方网络进行通信,则将数据按着本设计要求将数据发送给本网串口连接程序,该程序会自动将数据由串口传送给对方网络串口连接程序,而对方程序可以将数据按要求再转送给该网络中指定的用户,从而实现了实时通信.通过测试验证,该方式可以传送文件、实时数据、网络数据包等多种形式,并且设计可行和有效. 相似文献
13.
Brij Bihari Dubey Naveen Chauhan Narottam Chand Lalit Kumar Awasthi 《Wireless Networks》2017,23(6):1669-1687
Vehicular networks are popular in recent years to provide low cost communication medium during mobility. Vehicular Delay Tolerant Networks (DTNs) are one of the major categories of emerging technology. DTNs work on carry and forward mechanism to deliver data to the destination. The network performance gets severely affected due to reluctance shown by selfish nodes where few nodes show no interest in forwarding others data due to lack of any personal profit. The proposed mechanism is based on coalition game theory and discusses about incentive based mechanism which provides incentive to nodes which are forwarding data to forward to destination and motivates other vehicles in the network to participate in coalition to forward data. This scheme not only encourages other selfish nodes to forward their private data and other nodes’ public data as early as possible to destination but also increases reliability in the network as more nodes show their interest in selected routing protocol. The proposed scheme outperforms in overall benefit earned by individual node and whole coalition, and increases mutual cooperation which improves availability of data in the network. 相似文献
14.
Pham T. D. Beck D. Yan H. 《IEEE transactions on circuits and systems. I, Regular papers》2006,53(11):2425-2430
We present, in this paper, two spectral pattern comparison methods for cancer classification using microarray gene expression data. The proposed methods are different from other current classifiers in the ways features are selected and pattern similarities measured. In addition, these spectral methods do not require any data preprocessing which is necessary for many other classification techniques. Experimental results using three popular microarray data sets demonstrate the robustness and effectiveness of the spectral pattern classifiers 相似文献
15.
16.
The growing volume of information poses interesting challenges and calls for tools that discover properties of data. Data mining has emerged as a discipline that contributes tools for data analysis, discovery of new knowledge, and autonomous decisionmaking. In this paper, the basic concepts of rough set theory and other aspects of data mining are introduced. The rough set theory offers a viable approach for extraction of decision rules from data sets. The extracted rules can be used for making predictions in the semiconductor industry and other applications. This contrasts other approaches such as regression analysis and neural networks where a single model is built. One of the goals of data mining is to extract meaningful knowledge. The power, generality, accuracy, and longevity of decision rules can be increased by the application of concepts from systems engineering and evolutionary computation introduced in this paper. A new rule-structuring algorithm is proposed. The concepts presented in the paper are illustrated with examples 相似文献
17.
18.
19.
多媒体存储系统必须同时支持连续媒体和非连续媒体的访问.由于连续媒体的实时要求,系统必须为访问连续媒体保留大量的磁盘带宽,并且持续很长的时间,这使其他类型文件的访问性能严重下降.本文根据连续媒体的访问特性,提出了一个分布式多媒体存储系统的协同缓存策略GLNU,充分利用系统中其他结点上可用的内存资源,提高缓存的利用率,以减少连续媒体的磁盘I/O,从而提高其他媒体的访问性能.仿真试验表明GLNU在各种不同的参数下,均优于现有的缓存策略,是一种适合分布式多媒体存储系统的缓存策略. 相似文献
20.
Models for storing and presenting multimedia documents 总被引:1,自引:0,他引:1
This paper deals with models for storing and presenting multimedia documents integrating large amounts of data of different types. Usually, multimedia systems integrate a variety of data such as voice, graphics, text video and other types of images into a single document. Most of these data are not structured and therefore require a huge storage capacity. Such a requirement causes many problems for traditional database management systems which were not originally designed to manipulate data other than text. The presentation of multimedia documents incorporates documentary research that depends upon storage model and mechanisms. In this paper, we present two data storage models and several other associated models for the presentation of multimedia documents. The analysis of these models reveals their capacity to synchronize various temporal scenarios while allowing users simultaneous and secure access to multimedia systems. 相似文献