首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Security is a fundamental but challenging issue in the dynamic and multi-organizational computational grid. Focusing on the closed system, traditional access control model considered static authorization decisions based on pre-assigned permissions. To facilitate collaborations and interoperations across the grid, we propose a usage control mechanism for computational grid. Our mechanism is based on the usage control model. By leveraging continuous usage control on grid services and monitoring the status and behaviors of the subjects involved in the collaborations, our mechanism improves collaboration's security. Furthermore, our mechanism enables richer and finer-grained control over authorizations on resources and services involved in collaborations and interoperations than that of traditional access control mechanisms. Our mechanism can contribute to maintain the security and interests of the service providers in the grid environment.  相似文献   

2.
This paper proposes a novel quantum swarm evolution algorithm, called a Quantum-inspired Swarm Evoiution Algorithm (QSEA), which is based on the concept and principles of quantum computing. The proposed algorithm adopts quantum angle to express Q-bit and improved Particle Swarm Optimization to update automatically. After the quantum-inspired swarm evolution algorithm is described, the experiment results on the benchmark functions are given to show its efficiency.  相似文献   

3.
Trust is an important aspect of decision making for pervasive applications and it is important to choose and use services efficiently in pervasive computing environments. Trust force is presented to specify trust relationships among interactive entities in a pervasive computing environment by using experience and knowledge in a social network and the coulomb's law in real word. Based on trust force, a Trust Management and Service Selection model are presented, named TMSS. TMSS was tested and the experimental results show that our method for selecting service is not only more efficient than traditional and heuristic methods, but also can identify good services from bad ones.  相似文献   

4.
Most elders suffer from different levels of memory decline, from severe to mild. For supporting the independent living and providing the smart services to the elders, assistive reminder technology has been proposed as a promising approach to address these challenges, which are able to provide necessary help to elders in appropriate time. This paper investigates the smart assistant technique. We propose a user behavior model to describe activities of the forgetful elderly. Based on this model, we develop a smart assistive reminder, which provides reminders according to elders' practical needs, and avoids unnecessary notifications that will disrupt the elders' life. The preliminary experiments evaluate the effectiveness of our approach.  相似文献   

5.
Market watchers are splashing criticisms and suspicions over the trusted computing, declaring that it will be many years before large numbers of companies and individuals benefit from this technology. This paper investigates a majority of TCG (Trusted Computing Group) members, classifies their products as TPM chips, TCG enabled hardware and software. The data are collected from both literature and websites. It indicates that the trusted computing technology in China is considerable on chips and hardware. As for TCG enabled software, there still have many obstacles for Chinese to combat.  相似文献   

6.
The traditional K-means is very sensitive to initial clustering centers and the clustering result will wave follow the different initial input. To remove this sensitivity, a new method is proposed to get initial clustering centers. This method is as follows: provide a normalized distance function d(di,dj) in the fuzzy granularity space of data objects, then use the function to do a initial clustering work to these data objects who has a less distance than granularity dλ, then get the initial clustering centers. Approved by the test, this method has such advantages on increasing the rate of accuracy and reducing the program times.  相似文献   

7.
Task computing is mainly involved with how to interact with equipment and services for users. In such new mode users can only concern with the task need to be completed, without having to consider how to complete it. In recent years, this new mode has been considered the preferred choice under the environment of pervasive computing. Active task discovery is the key to task computing, which depends on context and automatically relates the corresponding services to complete the given operation. In this paper, based on active task computing model we present a new context-aware active task discovery mode and raise a good algorithm for discovering and executing task.  相似文献   

8.
With the advances in the high speed computers network technologies, a workstation cluster is becoming the main environment for parallel processing. Finite element linear systems of equations are common throughout structural analysis in Civil Engineering. The preconditioned conjugate gradient method (PCGM) is an iterative method used to solve the finite element systems of equations with symmetric positive definite system matrices. In this paper, the algorithm of PCGM is parallelized and implemented on DELL workstation cluster. Optimization techniques for the sparse matrix vector multiplication are adopted in programming. The storage scheme is analyzed in detail. The experiment result shows that the designed parallel algorithm has high speedup and good efficiency on the high performance workstation cluster. This illustrates the power of parallel computing in solving large problems much faster than on a single processor.  相似文献   

9.
A novel method of steganographic embedding is described based on vertex colorings in the grid graph, in which rainbow coloring is repeated in every block of cover signals to increase embedding efficiency. This is an improvement of the previous grid coloring method in steganography. It also outperforms LSB matching revisited method and direct sums of ternary Hamming codes. The proposed method can generate more embedding schemes which cover the range of change rates and information rates more densely.  相似文献   

10.
To solve the problem of information interdiction among various kinds of DCS and systems of MIS and ERP, through using a kind of universal Web services object's encapsulation technique, a Web services-oriented DCS data exchanging platform is constructed, and the functional architecture and Key Enabling Technologies of the platform are introduced in detail. Accordingly, the enterprise information integration across different platforms and languages is realized, and an open, unified application integration environment is provided for the heterogeneous control systems and management systems.  相似文献   

11.
The advent of the time of big data along with social networks makes the visualization and analysis of networks information become increasingly important in many fields. Based on the information from social networks, the idea of information visualization and development of tools are presented. Popular social network micro-blog ('Weibo') is chosen to realize the process of users' interest and communications data analysis. User interest visualization methods are discussed and chosen and programs are developed to collect users' interest and describe it by graph. The visualization results may be used to provide the commercial recommendation or social investigation application for decision makers.  相似文献   

12.
New conditions are derived for the l2-stability of time-varying linear and nonlinear discrete-time multiple-input multipleoutput (MIMO) systems, having a linear time time-invariant block with the transfer function F(z), in negative feedback with a matrix of periodic/aperiodic gains A(k), k = 0,1, 2,... and a vector of certain classes of non-monotone/monotone nonlinearities φp(-), without restrictions on their slopes and also not requiring path-independence of their line integrals. The stability conditions, which are derived in the frequency domain, have the following features: i) They involve the positive definiteness of the real part (as evaluated on |z| = 1) of the product of Г (z) and a matrix multiplier function of z. ii) For periodic A(k), one class of multiplier functions can be chosen so as to impose no constraint on the rate of variations A(k), but for aperiodic A(k), which allows a more general multiplier function, constraints are imposed on certain global averages of the generalized eigenvalues of (A(k + 1),A(k)), k = 1, 2 iii) They are distinct from and less restrictive than recent results in the literature.  相似文献   

13.
By combining training content with Game AI, Game Style Training can provide a rich, interactive and engaging educational substance. It supports experiential learning-bydoing. And it can contribute to promote interest and motivation of trainees. In this paper, a Context-Awareness Approach (CAA) is put forward for earthquake rescue training by applying the concept of ambient intelligence. The CAA takes advantage of player profile to monitor player states, utilizes time sensor and location sensor to supervise environment changes. And then, a Reinforcement Learning model based on MAS is designed to update game AI system.  相似文献   

14.
This paper proposes a new different spectral density from power spectrum density of second order processes, thus we can get a new concept of stable white noise based on covariation function and covariation spectrum density. And a new technique is suggested for the estimation of the parameters of polynomial autoregressive (PAR) nonlinear colored noise processes with stable white noise excitations. Simultaneously, a simple whitening method is employed for polynomial autoregressive nonlinear stable colored noise.  相似文献   

15.
Thediaphragmofsteam turbine isoneofthemainpartsofthepassageunitfor air flowing.For studying its working conditionand performance, the three-dimensionalfinite element model(FEM)with thesoftware ANSYS10.0 isestablished according to theactualworking parameters. With the model, the deformation resultsand stress field resultsare analyzed andthe maximum displacement and stress value are calculated, meanwhile,theircorrespondingpositions are found. It provides a good foundationfor solving the problem inproduction.  相似文献   

16.
In this paper we present DNA-DBE,a DNA-chip-based dynamic broadcast encryption scheme.In our scheme,new users can join dynamically without modification of other users’decryption keys.Either the ciphertext or the decryption key is of constant-size.Backward secrecy is achieved in DNA-DBE:if new users join the system dynamically,they will not be able to retrieve past data.The security of our scheme relies on hard biological problems,which are immune to attacks of new computing technologies in the future.There exists a special feature in DNA–based cryptosystems,i.e.the set of encryption keys and the set of decryption keys have a many-to-many relationship.The implementation of more complicated DNA cryptosystems taking advantage of this special feature has been previously left as an open problem.Our DNA-DBE system is a solution to this open problem,which is also the first exploration of DNA based group-oriented encryption system.  相似文献   

17.
Repetitious simulation after modifying parameters of multi-domain physical system based on Modelica often appears in model experiment and optimization design. At present, the solvers based on Modelica need calculate all the coupled blocks during every simulation run after updating parameters. Based on discussing scale decomposition methods of simulation model, subdivision solving strategy and minimum solving strategy are put forward to improve the efficiency of repetitious simulation, by which the numerical solution of the simulation model can be achieved by only calculating the solving sequence influenced by altered parameters. A simplified model of aircraft is used to demonstrate the efficiency of the strategies presented.  相似文献   

18.
Due to severely constrained energy, storage capacity and computing power for nodes in wireless sensor network, the routing protocols have become a hot research topic. Directed diffusion is a communication paradigm for information dissemination in sensor networks based on data-centric routing. An energy efficient hybrid adaptive clustering for directed diffusion is presented in the paper. The main goal is to curb the interests flooding overhead by clustering. Hybrid of active and passive clustering creation is used to make tradeoff between maintenance cost and delay. The adaptive turning off the radio of redundant nodes and rotation of cluster heads is used to save energy. The ns-2 simulating results show that the protocol has good performances in energy consuming, delivery ratio and delay without leading to too much overhead comparing with existing directed diffusion protocols.  相似文献   

19.
Processing breakdown involved in garden path phenomenon is a special phenomenon in which the processor has to backtrack on the early understanding and create another path out to process data successfully and perfectly. From the semantic viewpoint of Natural Language Expert System, this paper puts forward a particular schema by which processing procedure of breakdown can be shown clearly and raises a special matching pattern to demonstrate the activity of noun-verb category. According to the analysis of interactive presentation of same word in which noun and verb definitions are involved, it is verified that Natural Language Expert System, only when its semantic database is activated, can clear the misunderstanding of syntactic sentences in which processing breakdown appears.  相似文献   

20.
The traditional strategy of 3D model reconstruction mainly concentrates on orthographic projections or engineering drawings. But there are some shortcomings. Such as, only few kinds of solids can be reconstructed, the high complexity of time and less information about the 3D model. The research is extended and process card is treated as part of the 3D reconstruction. A set of process data is a superset of 2D engineering drawings set. The set comprises process drawings and process steps, and shows a sequencing and asymptotic course that a part is made from roughcast blank to final product. According to these characteristics, the object to be reconstructed is translated from the complicated engineering drawings into a series of much simpler process drawings. With the plentiful process information added for reconstruction, the disturbances such as irrelevant graph, symbol and label, etc. can be avoided. And more, the form change of both neighbor process drawings is so little that the engineering drawings interpretation has no difficulty; in addition, the abnormal solution and multi-solution can be avoided during reconstruction, and the problems of being applicable to more objects is solved ultimately. Therefore, the utility method for 3D reconstruction model will be possible. On the other hand, the feature information in process cards is provided for reconstruction model. Focusing on process cards, the feasibility and requirements of Working Procedure Model reconstruction is analyzed, and the method to apply and implement the Natural Language Understanding into the 3D reconstruction is studied. The method of asymptotic approximation product was proposed, by which a 3D process model can be constructed automatically and intelligently. The process model not only includes the information about parts characters, but also can deliver the information of design, process and engineering to the downstream applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号