首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
IKE协议的分析及其对DoS攻击抵御   总被引:2,自引:0,他引:2  
互联网密钥交换(Internet key exchange)协议的复杂性使得其存在一些安全漏洞。在分析IKE协议工作原理的基础上探讨了其可能遭受的DoS攻击,提出了对IKE协议的改进。通过改进,协议的安全性和健壮性有很大的提高。  相似文献   

2.
一种面向服务架构总线的自组织机制*   总被引:1,自引:0,他引:1  
在采用面向服务架构(SOA)实施分布式开发中,为实现对服务资源在效率、可伸缩性和自适应动态演化的支持,通过对企业服务总线(ESB)拓扑模型的分析,引入对基于域内服务注册的统一ESB基础设施的自组织机制(SOM)。通过对SOM的设计,实现了ESB中服务的动态加入和退出机制、服务状态动态变化机制、负载感知的自适应机制和节点的容错机制。在对SOM的仿真与实践中,证实了SOM占用带宽少、信息收敛快、适应性好。  相似文献   

3.
针对光网络环境下分布式计算系统的资源调度问题,提出了一种光网络计算任务和光路联合调度方案。该方案将光网络的特性加入到传统调度模型中,提出了计算任务与光路通信的联合调度模型,设计求解联合调度模型的扩展型列表算法。仿真实验验证了联合调度的有效性。  相似文献   

4.
IP/DWDM光因特网中智能虚拟拓扑设计方法的研究   总被引:1,自引:1,他引:0  
虚拟拓扑设计是IP/DWDM光因特网中要解决的关键问题之一。由于以流量为权的最小跳数和为优化目标的虚拟拓扑设计问题是NP难的,因此提出了两种智能虚拟拓扑设计方法,分别采用遗传算法和模拟退火算法对其求解。开发了仿真程序,就主要参数对算法结果的影响进行了分析,并对两种算法的性能进行了比较。仿真结果表明,提出的两种算法都是可行和有效的。  相似文献   

5.
唐俊  吴永英 《计算机应用》2005,25(11):2703-2704
面向服务的消息中间件模型引入Web Services的工作原理,能轻松实现系统的负载均衡;利用消息中间件的逻辑通信通道,能在增加灵活性的同时支持经典的C/S服务模式。  相似文献   

6.
医院物联网体系结构和关键技术研究   总被引:1,自引:0,他引:1  
医院物联网是物联网技术在医疗行业应用的集中体现。在简单介绍医院物联网基本概念的基础上,结合物联网机制和医院的实际特点,探讨了适用于医院物联网的体系结构,并分析了构建中的关键技术,包括医院物联网的标准建设、中间件技术及嵌入式电子病历的研究与设计等。  相似文献   

7.
为了优化光网络环境下分布式计算系统的资源调度性能,提出了一种最先开始路径优先的自适应路由算法。该算法基于Dijkstra最短路径优先算法,通过引入一个时间标记变量来估计从源节点到当前目标节点的最先可用时间,绕过调度过程中产生拥堵的链路,选择能够最先开始通信的路由,从而减小通信竞争冲突,缩短了调度长度。仿真结果表明,该算法能够使用较少的网络链路资源来获得最短的调度长度。  相似文献   

8.
物联网关键技术在食品溯源中的研究与应用   总被引:1,自引:0,他引:1  
提出了使用RFID、ZigBee、Web服务器等物联网关键技术在食品溯源系统中的应用方法。其中,RFID技术是识别生产对象的唯一标识号,ZigBee无线网络可将生产加工过程中的温度、湿度、其他环境参数、产品储存参数和唯一的标识号汇集到带有数据库的嵌入式网关中,并在嵌入式网关中实现Web服务器的功能。食品安全管理人员或者消费者只需通过浏览器就可以访问嵌入式网关,以获取食品生产、加工和存储等各个环节的信息,实现对食品加工企业的实时监管。试验证明,物联网技术的引入可以提高管理人员的工作效率,及时发现和查处食品链中的违法环节,保证消费者购买食品的安全性和食品信息的真实性。  相似文献   

9.
心脏病是严重成胁人类健康和生命的主要疾病之一。目前普遍采用的遥测心电监护系统存在遥测距离短、监护路数有限的不足,将心电监护从医院扩展到享庭,对实现远程监护具有重要的现实意义。讨论了利用嵌入式Internet技术实现远程心电监护的解决方案,利用ETR232i通过宽带网传输实现了病人心电信号的远程采集和传输。同现有方法相比,谊方法具有实时性好、通信容量大、扩展性强、成本低廉等特点。  相似文献   

10.
无线网络技术在工业过程自动化的应用是工业控制领域的又一研究热点。WIA-PA (Wireless Network for Industrial Automation – Process Automation)[1]是IEC认可的工业无线国际标准。WIA-PA网络具有网状和星型混合拓扑结构、自适应调频能力、CSMA与TDMA混合访问机制等技术特点,能够适应复杂工业环境和满足苛刻工业需求,具有很好的可靠性和实时性。本文首先介绍了WIA-PA的体系结构;然后给出了我们在原型网络实现过程中显现的关键技术与目前采用的策略和技术方法,如时间管理、时间同步、网络安全和网状组网等。最后通过原型网络证明了我们设计的可行性和合理性。  相似文献   

11.
光纤作为一种新型的通信材料,对于通信方式的变革起着非常积极的促进作用.要想发挥光纤的优势,就必须要了解其传输特性,然后根据信号传输的需要进行应用上的调整.  相似文献   

12.
Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of proc- essing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual ex- clusion in our previous work. In this paper, we use the framework to propose a novel ap- proach to detecting deadlocks in distributed system by using mobile agents, which dem- onstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detec- tion strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy.  相似文献   

13.
The application of intelligent computing in Internet of Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more intelligent and efficient. Secure communication and secure resource sharing among intelligent terminals are essential. A secure communication channel for intelligent terminals can be established through group key agreement (GKA), thereby ensuring the security communication and resource sharing for intelligent terminals. Taking into account the confidentiality level of the shared resources of each terminal, and the different permissions of the resource sharing of each terminal, a GKA protocol for intelligent IoTs is proposed. Compared with previous work, this protocol mainly has the following advantages: (1) The hidden attribute identity authentication technology can achieve the security of identity authentication and protect personal privacy from being leaked; (2) Only intelligent terminals satisfying the threshold required of the GKA can participate in the GKA, which increases the security of group communication; (3) Low-level group terminals can obtain new permissions to participate in high-level group communication if they meet certain conditions. High-level group terminals can participate in low-level group communication through permission authentication, which increases the flexibility and security of group communication; (4) The intelligent terminals in the group can use their own attribute permission parameters to calculate the group key. They can verify the correctness of the calculated group key through a functional relationship, and does not need to exchange information with other members in the same group. Under the hardness assumption of inverse computational Diffie-Hellman problem and discrete logarithm problem, it is proven that the protocol has high security, and compared with the cited literatures, it has good advantages in terms of computational complexity, time cost and communication energy cost.  相似文献   

14.
多层次Web应用系统的关键技术探讨   总被引:6,自引:0,他引:6  
由于现代企业不断趋向空间上离散化,时间上并行化,因此对现代计算机分布式技术和数据共享技术提出很大挑战。该文探讨了多层次Web应用系统的若干关键技术,并构架了一个基于这些关键技术的企业广域网互联框架。  相似文献   

15.
物联网公共安全平台软件体系架构研究   总被引:3,自引:0,他引:3  
针对现有公共安全管理平台的弊端,通过对物联网技术特征的分析,提出了将物联网技术应用于公共安全应急管理即建设物联网公共安全平台的思路。结合物联网体系结构,建立了物联网公共安全平台层次模型。该模型中,每层利用紧邻的下层服务,各层之间定义标准接口,方便了平台的模块化设计。基于物联网公共安全平台层次模型及对公共安全管理重点业务的分析,设计了物联网公共安全平台软件体系架构。  相似文献   

16.
Internet addiction is a rapidly growing field of research, receiving attention from researchers, journalists and policy makers. Despite much empirical data being collected and analyzed clear results and conclusions are surprisingly absent. This paper argues that conceptual issues and methodological shortcomings surrounding internet addiction research have made theoretical development difficult. An alternative model termed compensatory internet use is presented in an attempt to properly theorize the frequent assumption that people go online to escape real life issues or alleviate dysphoric moods and that this sometimes leads to negative outcomes. An empirical approach to studying compensatory internet use is suggested by combining the psychological literature on internet addiction with research on motivations for internet use. The theoretical argument is that by understanding how motivations mediate the relationship between psychosocial well-being and internet addiction, we can draw conclusions about how online activities may compensate for psychosocial problems. This could help explain why some people keep spending so much time online despite experiencing negative outcomes. There is also a methodological argument suggesting that in order to accomplish this, research needs to move away from a focus on direct effects models and consider mediation and interaction effects between psychosocial well-being and motivations in the context of internet addiction. This is key to further exploring the notion of internet use as a coping strategy; a proposition often mentioned but rarely investigated.  相似文献   

17.
全面讨论了QoS的定义,提出了面向服务计算中的QoS参考矩阵,给出了面向服务计算中的QoS特性,详细介绍了通用QoS模型及QoS的4个视图等问题.参考矩阵的提出,方便了服务提供者及服务使用者的QoS相关情况的调整,并可以快速便捷地评估一项服务(单用户)的性能好坏.  相似文献   

18.
面向服务架构在动态企业应用集成中的应用   总被引:6,自引:1,他引:5  
现代企业间的竞争日趋激烈,为迅速实现业务过程重组并敏捷地响应市场变化,企业产生了进行动态企业应用集成(EAI)的需求。粗粒度的松耦合的面向服务架构(SOA)是一个支持动态EAI的具有较好健壮性的架构。通过对SOA的分析,提出了一个通用的SOA基础模型,分析了基于SOA的动态EAI技术和实现方式。最后结合医学资源网项目,开发了一个基于SOA的动态EAI平台.  相似文献   

19.
采用动物标识技术、智能采集技术和网络技术,结合农业部《畜禽标识和养殖档案管理办法》,研究了建立肉牛养殖、产品加工等环节牛肉质量安全要素数据库;构建了牛肉品种、养殖、产品加工信息数据库管理系统;同时研究了建立肉牛品种、养殖、产品加工等环节的牛肉质量安全体系,开发了编码转换程序和溯源系统接口程序,从而形成了基于多模式的牛肉产品质量安全溯源系统。该系统可为消费者提供多渠道的溯源信息服务。  相似文献   

20.
有效预防并解决长输压力管道在运行中发生的泄露和爆管故障是传输工程中的一大技术瓶颈。近几年,刚兴起的光纤传感技术在压力管道检漏方面的应用相比于传统检测方法有着诸多的优势。光纤传感监测管道泄露的技术主要分为分布式与准分布式两大类,结合国内外压力管道检漏技术的发展现状,分别论述分布式与准分布式光纤传感技术在压力管道检漏方面的应用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号