首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
随着网络安防系统规模的不断扩大,对运维管理的要求随之不断提高。为解决原有网络安防运维管理整体信息化手段不足、业务处置流程缺乏流程化的弊端,引入业务流程管理理念,构建基于ITIL的网络安防运维业务流程体系;采用以数据为中心的建模方法,设计构建以Artifact为中心的网络安防运维业务流程模型。最后,运用业务流程管理软件构建流程管理系统,验证了业务流程模型的功能作用。  相似文献   

3.
A problem-independent concept for the reliability analysis of complex systems is presented. A method of system reliability analysis which is based on a selection of generally applicable mathematical models and computer programs for efficient numerical evaluation of the models emerges from this concept. A general safety model based on the same reliability analysis techniques and procedures is presented. A case study shows the application of the safety models and the methods of reliability analysis.  相似文献   

4.
A new concept of system equivalence which allows the establishment of a formal relation between singular and regular systems has been introduced. By applying this concept, an open-loop strategy for finite-time control of a given solvable singular system, which is simple for both computation and implementation, is developed. A strategy for finite-time output feedback control is considered for a continuous singular system. It is shown that provided the system is observable, a desired polynomial command for finite-time control can be determined from a finite sequence of output measurements sampled at discrete instants of time.  相似文献   

5.
行燕  高荣芳 《现代电子技术》2007,30(16):157-159
基于角色访问控制(RBAC)是一种方便、安全、高效的访问控制机制和重要的信息安全技术,他在满足企业信息系统安全需求方面显示了极大的优势。对RBAC模型——NRBAC模型进行了深入的研究,针对Web信息系统的结构特征及其对安全访问控制的要求,提出NRBAC模型的实现方案,从而利用基于角色访问控制技术实现系统的权限管理功能。  相似文献   

6.
本文针对大规模数据记录系统对嵌入式系统实现的实时性需求,设计了一种采用VxWorks操作系统的嵌入式实现方案,该方案采用模块化的设计架构,利用VxWorks灵活的多任务调度机制和任务间通信机制,建立了一种多任务间通信模型.通过对任务功能的合理划分和任务优先级的设置,该嵌入式系统克服了数据记录过程中数据丢失、数据覆盖的问题,提高了数据记录的实时性和可靠性要求.  相似文献   

7.
A reliability model is proposed and evaluated for a fault tolerant computer system which consists of multiple classes of modules and allows for degraded modes of performance. Each module of a given class has both an active and a passive hazard rate; constant hazard rates are assumed for active and dormant failures, and the given class may operate either in N Modular Redundancy (NMR: n + 1 out of 2n + 1 = N) or as a standby sparing system. The model allows for mission-phase changes at deterministic time points when the numbers of modules per class can be changed. The analysis proceeds by generalizing the notions of standby and NMR redundancy, which for N = 3 is TMR (Triple Modular Redundancy), into a concept called hybrid-degraded redundancy. The probabilistic evaluation of the unified redundancy concept is then developed to yield, for a given modular class, the joint distribution of success and the number of nonfailed modules from that class, at special times. With this information, a Markov chain analysis gives the reliability of an entire sequence of phases (mission profile).  相似文献   

8.
目前电子支付系统的最大问题就是安全问题与共享问题.文中提出灵活的应用多种安全技术与Web服务的电子支付系统的概念.并用Web logic8.0实现一个BtoC模式的支付系统的原型.  相似文献   

9.
文章从构件化系统架构的研究入手,总结提出了构件化思想的本质概念和类别等技术基础.通过介绍构件化的理念在保险核心业务领域中进行的实践方法,描述架构中各部分的关系以及同业务逻辑的映射,进一步说明构件的建立,横向、纵向装配的过程,从行业应用角度说明了构件化技术的可行的实践方案,并展示出构件化的现实意义和价值.  相似文献   

10.
A document retrieval system mainly consists of three components: document representation, user queries, and document evaluation. Each component may involve some uncertainties. Fuzzy set theory is a natural approach to coping with the representation of documents, queries, and the relevance of documents to a given query. The authors propose a fuzzy document retrieval model on the World Wide Web (WWW) environment to support conceptual queries. A flexible query expression is proposed to support different semantics of the queries. A concept network is adopted as the knowledge base to represent the relevance of the concepts. The concept network is explored from the WWW. Moreover, they also support neighborhood queries, which retrieve documents relevant to a document specified by a user. A system is currently being implemented to achieve these functions  相似文献   

11.
郭耀江  孟茁 《现代导航》2014,5(4):245-249
本文分析了民航甚高频通信系统的干扰机制,建立干扰分析模型,对民航西安区管甚高频系统的实际干扰问题进行了分析,介绍了无线电频率管理的基本概念,讨论了电磁频谱的概念、特点,论述了电磁频谱检测分析和评估的重要性,并对国内外无线电频率管理的现状做了介绍,深入分析了互调干扰机理,总结了调频广播对民航甚高频系统干扰的类型和产生机制。最后,分别从频率和功率两个维度建立了互调干扰频率分析模型。为民航甚高频通信系统的规划和管理提出了有益的参考。  相似文献   

12.
A mobile medical information system (MMIS) is an integrated application (app) of traditional hospital information systems (HIS) which comprise a picture archiving and communications system (PACS), laboratory information system (LIS), pharmaceutical management information system (PMIS), radiology information system (RIS), and nursing information system (NIS). A dynamic resource allocation table is critical for optimizing the performance to the mobile system, including the doctors, nurses, or other relevant health workers. We have designed a smart dynamic resource allocation model by using the C4.5 algorithm and cumulative distribution for optimizing the weight of resource allocated for the five major attributes in a cooperation communications system. Weka is used in this study. The class of concept is the performance of the app, optimal or suboptimal. Three generations of optimization of the weight in accordance with the optimizing rate are shown.  相似文献   

13.
A modular fabrication concept is used to build microoptical systems for commercial application. The concept is based on the fact that microoptical systems can be divided into two functional units, the optical and the electrooptical base plate, which covers active optical elements. In the case of defined interfaces, highly specialized manufacturers can fabricate both components separately. A third company will use these components to build the electrooptical subsystem, which is sold as an OEM system to the system manufacturer. Especially for the component fabrication, the equipment costs can be shared among different applications, which makes the component for each application cheaper. A microoptical distance sensor and a microspectrometer for the near-infrared have demonstrated the concept.  相似文献   

14.
基于关联规则的数据挖掘系统实现及应用   总被引:10,自引:1,他引:9  
文章首先介绍了数据挖掘的基本概念和主要过程,接着描述了一个基于关联规则的数据挖掘工具,讨论了系统的结构、特点和功能,包括数据转换、概念层次泛化、包含负项的关联规则挖掘及系统的二次开发接口,最后对一个应用工具的实例企业客户资源分析器模型及一些相关的问题进行了讨论。  相似文献   

15.
The system under investigation is the hydraulically driven autonomous large scale-combined legged and wheeled vehicle, the anthropomorphically legged and wheeled Duisburg robot (ALDURO). In this paper, a complete mechatronic simulation model, realized in the object-oriented programming language C++, is presented. It contains the mechanical system including an explicit solution of the kinematic loops, a model of the ground contact, and the dynamics of the complete hydraulic system, as well as a force-based motion control concept based on an exact input-output linearization using decentralized force controllers. Some simulation results are shown to demonstrate the function of the simulation model and the control concept presented  相似文献   

16.
杨曦  罗平  贾古丽 《电子学报》2019,47(11):2344-2353
可信性作为软件的一种复杂的高复合概念,几十年间都未能取得实质性进展和突破.本文在对可信性权威定义分析的基础上,论证了这些定义所涉范围彼此矛盾且不相容,进一步说明从本质出发研究软件可信性概念模型的重要性和必然性."可信"一词源于社会学,所以应该从社会学的信任理论出发来探讨软件可信性的本质.本文在上百篇经典社会学信任理论文献上构建出信任体系模型STM,并与软件的信任体系进行了对比和映射,提出基于社会学信任理论的软件可信性概念模型STCM.在STM和STCM的基础上给出软件可信性概念模型的定义系统.最后通过度量评估实验验证了模型是可行的、有效的,为软件可信性的发展提供了新的研究方向.  相似文献   

17.
移动代理在智能电子商务中的建模分析   总被引:1,自引:0,他引:1  
陈向东  宋强 《通信技术》2007,40(6):42-43
从电子商务的概念出发,分析了移动代理技术和智能电子商务的关系,同时提出了使用代理技术的电子商务概念模型;并按照这一概念设计了一个以Aglet为代理平台的网上交易系统的实现模型。  相似文献   

18.
Parameters of a large-scale highly coordinated mobile telephone system are discussed, particularly those of system size and frequency spectrum required. The concept of small-zone coverage areas to serve large customer densities is discussed, and the essential properties of small-zone systems are generalized to show that zone size alone is not an adequate parameter to distinguish large- from small-zone systems. A high-capacity small-zone system model using several zone sizes is presented. Advantages of small-zone operation other than spectrum economy are enumerated, as are the attendant disadvantages.  相似文献   

19.
In this paper, an r-out-of-n:G system with a single repair facility is analysed in connection with the cost incurred per unit time. A mathematical model is developed using the concept of semi-regenerative phenomena. Systems of convolution integral equations satisfied by various state probabilities corresponding to different initial conditions are obtained. An efficient iterative technique is used to solve the system of convolution integral equations and various measures of system performance are obtained.  相似文献   

20.
Security risk mitigation is a salient issue in systems development research. This paper introduces a lightweight approach to security risk mitigation that can be used within an Agile Development framework — the Security Obstacle Mitigation Model (SOMM). The SOMM uses the concept of trust assumptions to derive obstacles and the concept of misuse cases to model the obstacles. A synthetic scenario, based on an on-line system, shows how the SOMM is used to anticipate malicious behaviour with respect to an operational information system and to document a priori how this malicious behaviour should be mitigated. Since the SOMM is conceptually simple in deployment, its use is well within the capacities of the users who form part of an Agile Development team and crucially it should not take up a significant amount of development time.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号