首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
Data mining technology is applied to the network intrusion detection, and precision of the detection will be improved by the superiority of data mining. This paper, first analyzes the method of wireless network intrusion detection, presents a wireless network intrusion detection algorithm based on association rule mining. The application of fuzzy association rules in the wireless network intrusion detection is mainly discussed; a comparative analysis with the classical algorithm Apriori is made by experiment. The result shows that the fuzzy rule mining algorithm is more convenient than Apriori algorithm.  相似文献   

2.
Aiming at building up more powerful, open-standard-based and generic infras-tructures for application integration, service grids address the challenges in large-scale coordinated sharing and on-demand composition of network-based application services. The related endeavors have opened up new ways of application development, deployment and integration. In connection with the new level of scale, openness and dynamism brought forward by service grids, adaptive service configuration is of essential importance to applications. This paper proposes an approach called CAFISE, which tries to better facilitate on-demand configuration and dynamic reconfigura-tion of service grid applications. In CAFISE, a business design and its supporting software system are considered in a coherent way, and a convergent relation, which helps to map business-level configurations to software-level configurations, is highlighted. The paper is particularly devoted to presenting and discussing the principles, reference model, modeling language and supporting application framework of CAFISE. Since practical usefulness is highly valued in the development of CAFISE, the application of the approach to a real-world scenario is also presented in the paper.  相似文献   

3.
It is a well-established fact that wireless sensor networks (WSNs) are very power constraint networks, but besides this, they are inherently more fault-prone than any other type of wireless network and their protocol design is very application specific. Major reasons for the faults are the unpredictable wireless communication channel, battery depletion, as well as fragility and mobility of the nodes. Furthermore, as traditional protocol design methods have proved inadequate, the cross-layer design (CLD) approach, which allows for interactions between different layers, providing more flexible and energy-efficient functionality, has emerged as a viable solution for WSNs. In this study we define a fault tolerance management module suitable to the requirements, limitations, and specifics of WSNs, encompassing methods for fault detection, fault prevention, fault management, and recovery. The suggested solution is in line with the CLD approach, which is an important factor in increasing the network performance. Through simulations the functionality of the network is evaluated, based on packet loss, delay, and energy consumption, and is compared with a similar solution not including fault management. The results achieved support the idea that the introduction of a unified approach to fault management improves the network performance as a whole.  相似文献   

4.
一种分布式信息系统的构件模型及其应用研究   总被引:2,自引:0,他引:2  
  相似文献   

5.
无线传感器网络及其应用   总被引:11,自引:0,他引:11  
As a result of combination of microsensor technology, low power computing and wireless networking,wireless sensor networks are becoming an active branch of computer science. In this paper, we introduce the up-to-date research work of wireless sensor networks. First, we simply introduce the background of producing wireless sensor networks. Then, we describe their characteristics and application scopes. Finally we suggest the research direction in wireless sensor networks in the future.  相似文献   

6.
基于蓝牙的无线校园网接入模式研究   总被引:3,自引:0,他引:3  
Bluetooth technique is a kind of close-distance wireless communication standard which has low wastage Using bluetooth technique in campus network can form bluetooth wireless campus network.This paper analyzes topologic structure of bluetooth technique and introduces the concept of bluetooth wireless campus network ,at last the application manners of bluetooth technique in campus network are studied in detail.  相似文献   

7.
程序天下事     
《程序员》2004,(8)
建立更好的应用程序生命周期今天,应用程序生命周期正经历着显著的变化,被商业和技术因素一起驱动着。商业方面,瞬息万变的市场脚步需要更快速的应用程序开发和部署,并且还需要能以更加聪明的,独一无二的方式处理数据和决策。现有的应用程序生命周期很难算是成功。Gartner 调查显示,约30%的项目无法达到其设计需求.同时约70%的项目推迟交付或超预算。虽然还不确定问题所在,但显然我们建立软件的过程需要改进。Building a Better Application Life CycleBut today this application life cycle is undergoing a dramatic change,brought on by a combination of business and technologydrivers.On the business side,the rapid pace of change has necessitated more rapid application development and deployment,along  相似文献   

8.
Conservation of artworks in museums is a crucial issue to prevent their degradation. Thus, it is fundamental to continuously monitor the environment where artifacts are located. The WISE-MUSE project proposes the use of WSNs (wireless sensor networks) to carry out monitoring and automatically control of museums' environment and structural health. The deployment of a WSN can help to implement these measurements continuously, in a real-time basis, and in a much easier and cheaper way than when using traditional measuring equipment and procedures. Nevertheless, continuous monitoring implies providing immediate information of any abnormal value detected in the museums' environment. Thus, this contribution arises: the development of a new mobile application that allows users to continuously monitor the environment, but specially helps them to be more aware of any undesirable changes that may occur.  相似文献   

9.
Enterprise architecture is a subject that has increased its importance in the small and medium enterprises in the manufacturing sector of the industry in Mexico. The global competitiveness of the markets has influenced the adoption of methodologies that support the strategic alignment of the processes with the goals and strategic objectives of the firms. The components of the business architecture like mission, vision, strategic objectives, products, organizational structure, business prdcesses, clients and geographic region, were collected from the firm of the case study for the design of the architecture. As a result of the practical application, an implementation model has been created and four strategic objectives were established for to improve productivity and competitiveness. This paper is a result of the architecture in a medium size manufacturing company like partial research project of analysis, design and implementing business architecture of an enterprise using ontologies for representing the core elements of the business architecture; the study presents clearly the importance of the strategic planning for the analysis and the detection of the main faults for the success of the achievement of goals and objectives.  相似文献   

10.
深入分析现有室内定位技术及其特点,详细介绍了基于ZigBee无线网络的室内定位试验平台的硬件组成和定位算法,给出了无线网络定位图形化监视软件的关键技术,以移动小车为载体进行了目标点定位试验研究。结果表明该定位系统具有良好的定位精度与可扩展性。
Abstract:
In this paper, the present indoor location technologies and their characteristic were analyzed deeply, and the hardy ware composition and location algorithm of the experimental platform based on ZigBee wireless network were introduced. Subsequently, the k  相似文献   

11.
胡景锋  吕岳 《计算机工程》2008,34(21):169-171
(Department of Computer Science and Technology, East China Normal University, Shanghai 200062)  相似文献   

12.
传感器技术在人机交互领域催生了新型的3D输入方式,并促使不可见交互方式广泛应用.在分析现有交互模型的基础上,提出了基于惯性感应的手机交互模型,具有层次分明,扩展性好等特点.在此基础上提出一种手机交互系统概念模型并分析了基于惯性感应的手机应用.  相似文献   

13.
SMS短信息服务作为GSM网络的一种基本业务已得到越来越多的系统运营商和系统开发商的重视,以GSM网络作为数据无线传输网络,可以开发出多种前景极其乐观的各类应用。从实际的角度,系统研究短信息在物流企业管理中的应用,并详细讨论短信息应用架构的设计。  相似文献   

14.
对手机病毒的概念、原理以及发展趋势进行介绍。结合实例,详细列举了手机病毒的类型及其危害,提出了防范手机病毒的三条途径,并主要研究了手机防火墙的作用和实现方法。  相似文献   

15.
基于BREW平台的程序开发和计算机仿真   总被引:3,自引:0,他引:3  
BREW是高通公司为了适应数据通信业务应用的日益广泛而推出的一个开发平台.文中详细介绍了BREW的技术特点以及在BREW平台下的程序开发和计算机仿真.在BREW平台下,开发者可以使用Visual C++开发手机应用程序,然后通过BREW SDK开发工具包中的Emulator在计算机上进行手机仿真和测试.最后利用编译器编译成特定的执行文件并上载到手机上.文中给出一个使用BREW平台开发手机游戏软件的实例,详细说明了资源器编辑、程序开发、计算机仿真、代码编译和下载的方法.  相似文献   

16.
为了提高气象信息服务的快速性、便捷性和广泛性,通过研究当前气象信息服务在移动通信业务的应用模式,分析了第三代移动通信技术(3G)的特点,文中提出了基于3G移动通信技术的气象信息服务模型,充分利用当前迅速发展的3G移动业务,为气象信息服务应用提供了新的思路。  相似文献   

17.
WPKI与PKI关键技术对比   总被引:9,自引:0,他引:9  
路纲  佘堃  周明天  刘家芬 《计算机应用》2005,25(11):2505-2508
与有线网络相比,无线网络存在较多的环境制约,包括带宽窄、延迟大、稳定性差等;同时,手持设备存在诸如CPU功能弱、存储量小、功耗受限、显示窗口小等等问题。为了使公钥基础设施(PKI)应用扩展于无线环境,WAP论坛定义了无线公钥基础设施(WPKI)规范。WPKI的宗旨在于尽可能使用现有PKI协议,仅在需要时才定义新规范,对WAP PKI和PKI在应用环境、协议架构、数据及业务流程、加密算法、证书格式及协议标准方面进行了比较。  相似文献   

18.
王伟  唐春晖 《计算机应用》2012,32(Z1):180-181,184
随着手机无线增值业务的不断发展,手机游戏也越来越受到大众的追捧.BREW是高通推出的基于CDMA网络的“无限互联网发射平台”上增值业务开发运行的基本平台.针对以往BREW仅在功能机上的应用程序,通过一个简单的贪吃蛇的例子,利用Brew API中的IDISPLAY接口和timer定时器定时描画和更新游戏画面,和EVT_PEN触摸屏事件来完成触摸屏效果的贪吃蛇游戏.由于贪吃蛇游戏的画面简单和图形简单不需要加载图片.本系统采用的是BREW技术,用C语言代码进行编写,该项目具有贪吃蛇的基本功能,在整个贪吃蛇游戏中,很好地完成了触摸屏的结果.  相似文献   

19.
本文介绍了GPRS无线数据通信的工作原理及应用GPRS技术进行无线通信的设计方案、软硬件的实现。嵌入式GPRS无线通信技术为数据传输业务提供了极大的便利,缩短了应用系统的开发周期,减小了开发难度和风险,具有很高的市场应用前景。  相似文献   

20.
融合各种通信网络异构性的无线泛在网将成为网络发展的必然趋势。为实现无线业务的泛在化,提出一种基于SOA与资源即插即用功能的泛在网RFID中间件架构,使其能在未来的基于Web的无线泛在业务环境体系架构中完成智能感知设备资源的即插即用特性。介绍了该架构逻辑框架中各部分的功能与实现方法,并通过具体应用系统验证了该架构不仅可以解决RFID设备与应用系统之间的紧耦合问题,而且能够实现单一物理设备服务多种业务应用的需求。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号