首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
基于各种冗余策略的Web服务容错方法被广泛应用于面向服务的关键性系统的可靠性和性能保障。已有的Web服务容错策略选择方法只考虑服务响应时间和失效率等与服务性能相关的因素,而忽略了服务调用和补偿费用等成本问题,导致所选择的策略可能在成本效益方面存在不足。针对这一问题,提出了一种支持成本效益分析的Web服务容错策略规划方法。该方法针对九种常用的Web服务冗余策略给出了综合考虑调用和补偿费用的成本预测公式,并在此基础上给出了支持成本效益分析的Web服务容错策略选取算法。针对该方法的验证实验表明,所提方法能够显著提高Web服务容错策略的有效性,并且所产生的额外时间开销在可接受范围内。  相似文献   

2.
李静  刘冬实 《计算机应用》2018,38(9):2631-2636
除了传统的冗余机制,主动容错技术也被用来提高存储系统的可靠性。然而,当前对主动容错云存储系统可靠性的研究工作很少,而且都局限于硬盘故障服从指数分布的假设前提。针对主动容错磁盘冗余阵列RAID-5和RAID-6云存储系统提出两个可靠性状态转移模型,并基于转移模型设计了蒙特卡洛仿真算法,评价系统在一定运行周期内发生数据丢失事件的期望个数。该算法采用韦布分布函数模拟随时间变化(降低、恒定不变、或升高)的硬盘故障率,准确评价了主动容错机制、硬盘整体故障、故障修复、潜在块故障以及磁盘清洗过程对系统可靠性的影响。所提方法可以帮助系统设计者评估不同容错机制和系统参数对云存储系统可靠性的影响,有助于创建高可靠存储系统。  相似文献   

3.
基于演化硬件的容错系统设计技术研究   总被引:1,自引:0,他引:1  
提出了一种基于演化硬件的N 模异构冗余容错系统设计方法.首先,改进了一种多目标进化算 法,利用改进的优化算法来设计多模冗余系统目标数字电路;然后,提出了多模数字电路设计的异构评价策 略,以用于N 模异构电路的优化设计;最后,将设计的异构数字电路用于组成N 模冗余容错系统,以提高容 错系统的可靠性.对单目标与多目标设计电路、同构与异构冗余电路的容错性能进行了理论分析和对比,给 出了异构电路评价方法和选择策略.以8 线—3 线编码器作为设计实例,实验结果证明了基于多目标进化设 计的异构电路所组成的容错系统具有更好的容错能力.  相似文献   

4.
《机器人》2017,(1)
针对服务机器人服务扩展和服务质量提升等问题,提出了一种机器人云平台服务构建与调度新方法.首先,详细设计了服务机器人云平台整体架构及接口层开发框架;其次,采用基于历史数据并动态更新的服务质量评估算法实现了接口层对云平台服务的质量评价与调度;然后,基于Apache CXF实现了云平台服务的开发;最后,选择人脸特征提取和文件上传等典型服务实例对提出的方法进行了性能测试,并将本文算法与目前常用算法进行了对比实验.实验验证了本文提出的机器人云平台服务构建与调度方法的有效性和先进性.该方法为云机器人的开发者提供了高效的服务开发方法,消除了异构机器人调用服务问题并提高了服务代码的复用性.  相似文献   

5.
针对服务组合中冗余服务池开销较大、服务响应时间较长的问题,提出一种多目标优化策略,在满足可靠性约束的前提下,优化服务池配置、降低冗余服务池开销和缩短服务响应时间。首先分析了在两种不同容错策略下,满足服务组合特性的服务池多个优化目标;然后采用基因多目标优化算法进行优化,全局采用非支配排序策略,局部采用随机漫步搜索策略。仿真实验通过与现有的研究方法进行对比,优化效果较好,表明该方法可用于优化冗余服务池配置。  相似文献   

6.
云服务数量的快速增长给云服务选择决策带来了挑战。为协助决策者在进行云服务选择时提供决策依据,更好地满足用户使用需求,提出一种并行模糊TOPSIS时变权重二次量化云服务推荐算法。首先,基于熵的权重赋值方法确定准则权重,解决了准则权重不好选取的问题,并采用时变权重方法作为补充设计一种新的模糊TOPSIS评估方案,时变权重的引入可以对不同时期QoS等信息的重要性进行二次量化区分,有助于提高融合决策的合理性。其次,基于时间段的模糊TOPSIS多准则融合决策信息,提出一种可并行云服务选择框架,有利于算法的实际推广应用。实验结果表明,该算法能够有效抑制不良QoS信息影响,提高服务调用成功率保证诚信服务的互操作性。  相似文献   

7.
针对网络故障以及Web服务节点暂时性失效,导致Web服务请求出错的问题,提出了一种Web服务容错机制.通过建立服务补偿机制和Web服务会话管理机制达到容错的目的.首先对Web服务的容错性问题进行了分析;接着详细论述了服务补偿机制和容错框架的设计与实现方案;最后通过在政务服务集成系统中的应用实例说明了该容错机制能够有效地增强Web服务请求调用的可靠性.  相似文献   

8.
结合网格技术和存储技术,提出了基于域的存储网格模型。在域模型架构下,深入分析了域划分原则、元数据目录服务和数据容错等问题,重点探讨了数据高顽存性存储策略的设计。在比较复制、分片冗余等不同数据冗余策略特点的基础上,提出了一种混合式的数据冗余策略。模拟实验表明它兼具复制策略和分片冗余策略的优点,既保持了存储数据的整体可靠性水平,又弥补了低冗余度下编码复制可靠性偏低的不足,使冗余存储数据具有更好的可靠性效果。  相似文献   

9.
刘晓霞  刘靖 《计算机应用》2015,35(12):3530-3535
针对如何充分利用云基础架构层资源,满足上层云应用系统租户对应用系统容错的需求多样性和高可靠性要求的问题,提出一种面向租户和云服务提供商的、基于虚拟机部署策略的云平台容错即服务方法。该方法根据租户的特定容错需求适配适合的容错方法及容错级别,据此计算并最优化云服务提供商的收益和资源使用量,在此基础上对提供容错服务的虚拟机进行优化部署,充分利用底层虚拟机资源为租户的云应用系统提供更为可靠的容错服务。实验结果表明,所提方法能够在保障云服务提供商收益的基础上,为多租户云应用系统实现更灵活且可靠性更高的容错服务。  相似文献   

10.
嵌套式动态容错协议的研究与设计   总被引:5,自引:0,他引:5  
从软件容错的角度出发,在基于网络的分布计算环境下,针对军事指挥系统及银行管理系统的特点,为了满足这些应用对可靠性的要求,以组通信为基础,采用进程复制技术,提出了一个嵌套式动态容错模型;进而提出了一个动态容错算法,该算法保证当主服务进程发生失效时,能够动态地选择一个新的主服务进程,并保证所有后备服务进程的状态保持一致.  相似文献   

11.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

12.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

13.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

14.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

15.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

16.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

17.
正The demands of a rapidly advancing technology for faster and more accurate controllers have always had a strong influence on the progress of automatic control theory.In recent years control problems have been arising with increasing frequency in widely different areas,which cannot be addressed using conventional control techniques.The principal reason for this is the fact that a highly competitive economy is forcing systems to operate in regimes where  相似文献   

18.
正Aim The Journals of Zhejiang University-SCIENCE(A/B/C)areedited by the international board of distinguished Chinese andforeign scientists,and are aimed to present the latest devel-opments and achievements in scientific research in China andoverseas to the world’s scientific circles,especially to stimulateand promote academic exchange between Chinese and for-eign scientists everywhere.  相似文献   

19.
The relative concentrations of different pigments within a leaf have significant physiological and spectral consequences. Photosynthesis, light use efficiency, mass and energy exchange, and stress response are dependent on relationships among an ensemble of pigments. This ensemble also determines the visible characteristics of a leaf, which can be measured remotely and used to quantify leaf biochemistry and structure. But current remote sensing approaches are limited in their ability to resolve individual pigments. This paper focuses on the incorporation of three pigments—chlorophyll a, chlorophyll b, and total carotenoids—into the LIBERTY leaf radiative transfer model to better understand relationships between leaf biochemical, biophysical, and spectral properties.Pinus ponderosa and Pinus jeffreyi needles were collected from three sites in the California Sierra Nevada. Hemispheric single-leaf visible reflectance and transmittance and concentrations of chlorophylls a and b and total carotenoids of fresh needles were measured. These data were input to the enhanced LIBERTY model to estimate optical and biochemical properties of pine needles. The enhanced model successfully estimated reflectance (RMSE = 0.0255, BIAS = 0.00477, RMS%E = 16.7%), had variable success estimating transmittance (RMSE = 0.0442, BIAS = 0.0294, RMS%E = 181%), and generated very good estimates of carotenoid concentrations (RMSE = 2.48 µg/cm2, BIAS = 0.143 µg/cm2, RMS%E = 20.4%), good estimates of chlorophyll a concentrations (RMSE = 10.7 µg/cm2, BIAS = − 0.992 µg/cm2, RMS%E = 21.1%), and fair estimates of chlorophyll b concentrations (RMSE = 7.49 µg/cm2, BIAS = − 2.12 µg/cm2, RMS%E = 43.7%). Overall root mean squared errors of reflectance, transmittance, and pigment concentration estimates were lower for the three-pigment model than for the single-pigment model. The algorithm to estimate three in vivo specific absorption coefficients is robust, although estimated values are distorted by inconsistencies in model biophysics. The capacity to invert the model from single-leaf reflectance and transmittance was added to the model so it could be coupled with vegetation canopy models to estimate canopy biochemistry from remotely sensed data.  相似文献   

20.
This article discusses the history and design of the special versions of the bombe key-finding machines used by Britain’s Government Code & Cypher School (GC&CS) during World War II to attack the Enigma traffic of the Abwehr (the German military intelligence service). These special bombes were based on the design of their more numerous counterparts used against the traffic of the German armed services, but differed from them in important ways that highlight the adaptability of the British bombe design, and the power and flexibility of the diagonal board. Also discussed are the changes in the Abwehr indicating system that drove the development of these machines, the ingenious ways in which they were used, and some related developments involving the bombes used by the U.S. Navy’s cryptanalytic unit (OP-20-G).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号