首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 859 毫秒
1.
Based on cryptographic technique, a security solution of agent system is presented in this paper, which solves the problem of security authentication and security communication in mobile agent system. Finally the situation of application is introduced when the solution has been applied to the agent application system.  相似文献   

2.
In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.  相似文献   

3.
4.
Currently many enterprises have established some independent application systems such as CAD, CAPP, CAE and so on. Enterprise information integration makes these information islands connected, and thereby forms a uniform enterprise-wide information environment. First this paper discusses the main research contents of enterprise integration. Then the author introduces an Internet-based configurable and open information integration framework, and presents a multi-tier integration architecture based on reusable component. Finally a development case of enterprise integration framework is introduced.  相似文献   

5.
Research on Web-Based Product Structure and Configuration Management   总被引:1,自引:0,他引:1  
An enhanced system architecture of Web-based product structure and configuration management system along with its, functions are is presented. The key techniques, such as construction of object models of product structure and product configuration, hybrid approach method in product configuration management, sharing and integration of heterogeneous product data, integration with other sub-systems, are discussed too. A prototype system is developed by J2EE technology.1 Introduction Taking BOM…  相似文献   

6.
Research on Combined Dynamic Traffic Assignment and Signal Control   总被引:2,自引:0,他引:2  
This paper presents a generalized bi-level programming model of combined dynamic traffic assignment and traffic signal control,and especially analyzes a procedure for determining the equilibrium queuing delays on saturated links for dynamic network signal control satisfying the FIFO (first-in-first-out)rule.The chaotic optimal algorithm proposed in this paper can not only present the optimal signal settings,but also calculate,at each interval,the link inflow rates and outflow rates for the dynamic user optimal problem,and provide real-time information for the travelers.Finally,a numerical example is given to illustrate the application of the proposed model and solution algorithm, and comparison shows that this model has better system performance.  相似文献   

7.
How to generate pictures real and esthetic objects is an important subject of computer graphics.The techniques of mapping textures onto the surfaces of an object in the 3D space are efficient approaches for the purpose.We developed and implemented algorithms for generating objects with appearances stone,wood grain,ice lattice,brick,doors and windows on Apollo workstations.All the algorithms have been incorporated into the 3D grometry modelling system (GEMS) developed by the CAD Center of Tsinghua University.This paper emphasizes the wood grain and the ice lattice algorithms.  相似文献   

8.
Research and Design of a Fuzzy Neural Expert System   总被引:2,自引:0,他引:2       下载免费PDF全文
We have developed a fuzzy neural expert system that has the precision and learning ability of a neural network.Knowledge is acquired from domain experts as fuzzy rules and membership functions.Then,they are converted into a neural network which implements fuzzy inference without rule matching.The neural network is applied to problem-solving and learns from the data obtained during operation to enhance the accuracy.The learning ability of the neural network makes it easy to modify the membership functions defined by domain experts.Also,by modifying the weights of neural networks adaptively,the problem of belief propagation in conventional expert systems can be solved easily.Converting the neural network back into fuzzy rules and membership functions helps explain the inner representation and operation of the neural network.  相似文献   

9.
The technique of Component-Based Development obtained great promotion in recent years. It not only gives profound influence to the technique innovation of software industry, but also brings huge benefit for many other domains. However, the application of fine test methods can simplify test operation, reduce test cost and improve software quality. This paper proposes a kind of cross-test based on component according to traditional software test technique, aiming at the problems produced by new characteristics of software component technique, and verifies a telecommunication system using this test method fmally.  相似文献   

10.
Message service has got more and more extensive applications among the applied procedures used in business enterprise, and the message service developed with the CORBA and RMI, etc. costs a great deal of time and energy to carry on the maintenance of the code. According to the effective demand of the message service, This paper studies on the technique of JMS, puts forward a new kind of message service model based on JMS, and discusses the implementation of online recruitment system based on this model. At the same time, it also puts forward a homologous mechanism which is used to deal with the dead message problem that usually appears in this system.  相似文献   

11.
The purpose of the paper is to illuminate the costs and benefits of crossing firm boundaries in inbound open innovation (OI) by determining the relationships among partner types, knowledge content and performance. The empirical part of the study is based on a survey of OI collaborations answered by R&D managers in 415 Italian, Finnish and Swedish firms. The results show that the depth of collaboration with different partners (academic/consultants, value chain partners, competitors and firms in other industries) is positively related to innovation performance, whereas the number of different partners and size have negative effects. The main result is that the knowledge content of the collaboration moderates the performance outcomes and the negative impact of having too many different kinds of partners. This illustrates how successful firms use selective collaboration strategies characterized by linking explorative and exploitative knowledge content to specific partners, to leverage the benefits and limit the costs of knowledge boundary crossing processes.  相似文献   

12.
13.
Doppler radar have become one of the most important instruments for weather now casting, and for meso-scale weather research because of its higher spatial and temporal resolutions. A dealing system for Doppler radar graphic was researched and implemented so as to providing a convenient tool for users. We research and realized CINRAD/XD Doppler radar's graphic system. It contains three important parts: reading, standardization and pretreatment. It can be used very easily and conveniently. Besides, the system can be expanded and transplanted simply.  相似文献   

14.
1IntroductionIPphoneisonekindofterminalbasedonH.323protocol(Otherprotocol,suchasSIPagreement,couldbeused.Butthosearenotdiscussedinthisthesis).IttakesupanindependentIPad-dress,canaccesstothenetworkdirectly.IPPhoneinthisthesisstatesadopts10/100MofthestandardEthernetRJ45interface,andcanbeusedinanynetworks,whichsupportsTCP/IPprotocolandhaveRJ45interface.Withtheperfectionofnetworkinfrastructures,afterxDSL,CableModemorotherIPsaccesstechnologywithahigh-speedregisterone'sresidence.Wecoulda…  相似文献   

15.
16.
Secure technology is very important in electronic commerce constructing. This paper has described and overall analyzed the structure of electronic commerce system and secure technology. Data encryption, digital signature and digital certificate technology are analyzed in detail, and we put forward a kind of new mix encryption plan, which with DES and RSA algorithm is realized based on electronic commerce. The method is securer than others. These researches provide a set of complete and secure solving plans tbr elec onic commerce.  相似文献   

17.
Research on the computer monitoring and control system of diesel motor   总被引:1,自引:0,他引:1  
The working conditions of diesel motors used in somespecial condition are complex. By using microcomputer control,A/D conversion and digital tele-communication techniques, au-tocontrol of the working process, digital sampling of parameters,tele-communication concentrative monitoring and control are real-ized.When the signal sampled goes beyond the limit,the station alarms,reacts automatically and stops authomatically if necessary.  相似文献   

18.
本文针对内网的主动泄密实现了一种基于内容过滤的内网防泄密系统CIAL(Content-based Information Anti-Leakage in LAN),它以透明方式对进出网络的传输明文及电子文档进行监控,并运用中文信息处理技术对明文及电子文档的内容进行分析,一旦发现该信息涉密,立即阻止其传送,有效的阻止了内网的泄密同时也保证了网络的便捷性.并详细介绍了它的设计方案和实现技术.  相似文献   

19.
育。Research     
tinational corporation based on enterprise cultureCHEN Wei,BI Yan-peng (College of Economics and Management,Harbin Engineering Univesity,Harbin 150001,China)Taking the enterp  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号