首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
According to the principle, “The failure data is the basis of software reliability analysis”, we built a software reliability expert system (SRES) by adopting the artificial intelligence technology. By reasoning out the conclusion from the fitting results of failure data of a software project, the SRES can recommend users “the most suitable model” as a software reliability measurement model. We believe that the SRES can overcome the inconsistency in applications of software reliability models well. We report investigation results of singularity and parameter estimation methods of experimental models in SRES. Foundation item: Supported by the National Natural Science Foundation of China Biography: XU Ren-zuo (1946-), male, Professor, research interests include software engineering software reliability engineering, software quality guarantee technology, reliability theory, software safety and security.  相似文献   

2.
The meanings of parameters of software reliability models are investigated in terms of the process of the software testing and in terms of other measurements of software. Based on the investigation, the empirical estimation of the parameters is addressed. On one hand, these empirical estimates are also measurements of the software, which can beused to control and to optimize the process of the software development. On the other hand, by treating these empirical estimates as Bayes priors, software reliability models are ex-tended such that the engineers‘ experience can be integrated into and hence to improve the models.  相似文献   

3.
The “shooting and bouncing rays” (SBR) technique is used to analyze the electromagnetic scattering characters of ocean rough surfaces varying with time. Some numerical results are presented and compared with the method of moments, and some factors, such as the incident angle, polarization and frequency are investigated which influence on electromagnetic scattering characters of ocean rough surfaces. Foundation item: Supported by the 863 High Technology Project of China (863-818-01-02) Biography: GAO Huo-tao(1964-), male, Ph. D. candidate. Research direction: electromagnetic field theory and engineering application  相似文献   

4.
Blind numbers of evaluation indices about groundwater resources carrying capacity are defined from the concomitancy of randomness, fuzziness, grey property and unascertainment of groundwater system. Based on fuzzy theory, a comprehensive evaluation model on groundwater resources carrying capacity is constructed with blind information. Then a risk assessment model of surcharge about groundwater resources carrying capacity is established on blind reliability theory. The probable value "*" matrix of fuzzy membership degree about carrying capacity corresponding to each judgment level can be obtained with the aid of blind algorithm as well as the subjective reliability "×" matrix. And then a graph of "groundwater carrying capacity v.s. accumulative reliability" can be gained Based on the graph, fuzzy membership degree of groundwater resources carrying capacity to each judgment level under different risk probability can be got. Thus, a comparatively reasonable judgment to groundwater resources carrying capacity might be obtained, with comprehensive analysis to the state of society, economy technology and ecology.  相似文献   

5.
A new method to obtain the real height profile of lonospheric electron density is described, which is called “approximation with network”. Also it has been demonstrated how to solve the group path integral equation with Back Propagation (BP) neural network, and given the computation results with this method for a parabolic model. Simulation results show that the proposed method is effective. Foundation item: Supported by the National Natural Science of China (94J3, 3.2JW1202) Biography: Wu Qing-ling(1942-), male, Professor.  相似文献   

6.
Building Intrusion Tolerant Software System   总被引:1,自引:0,他引:1  
In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploiting N-version module threshold method in con-structing multilevel secure software architecture, by detecting with hash value, by placing an ““““““““antigen““““““““ word next to the return address on the stack that is similar to human immune system, and by adding ““““““““Honey code““““““““ nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured.  相似文献   

7.
The aim of research on software architecture is to improve the quality attributes of software systems, such as security, reliability, maintainability, testability, reassembility, evolvability. However, a single running system is hard to achieve all these goals. In this paper, software-cell is introduced as the basic unit throughout developing process. Then it is further advanced that a robust, safe and high-quality software system is composed of a running system and four supportive systems. This paper especially discusses the structure of software-cell, the construction of the five systems, and the relations between them. Foundation item: Supported by the National Natural Science Foundation of China (No. 70073022) Biography: Tang Sheng-qun(1946-), male, Professor, research interest: software engineering, architecture  相似文献   

8.
We studied the problem of existence of jointly continuous local time for an additive process.Here, “local time” is understood in the sence of occupation density, and by an additive Lévy process we mean a process X={X(t), t∈Rd+)} which has the decomposition X= X1 X2 … XN. We prove that if the product of it slower index and N is greater than d, then a jointly continuous local time can be obtained via Berman's method.  相似文献   

9.
从软件失效的不可避免性出发,提出了软件可靠性工程的概念。介绍了软件可靠性分析的方法、保证软件可靠性的工程方法和两种常用的可靠性设计技术。  相似文献   

10.
Considering the special requirements of group enterprise information management software, a new method of massive software development was put forward basing on the component technology and facing the "assemblage". It generalizes five key parts of the method system including the overall strategy, the application project method basing on the operation "assemblage", the field project method basing on component, the development method facing the component on the basis of the visible component platform, and the software development process model basing on the component "assemblage". Besides, this paper describes the process and principle of this method application with an example of the construction of a Communications Investment Group enterprise's management information system. The method provides a new idea for breaking away from the predicament appeared in the construction of present enterprise informatization and exploring the way of software industrialization.  相似文献   

11.
Inclusion reaction of racemic 1,1′-bi-2-naphthol and (S)-proline was examined under the solid state and the solid-liquid conditions. The results indicated that a solid mixture of racemic 1,1′-bi-2-naphthol and (S)-proline in a 1∶1 molar ratio was kept at 50–80 °C for 3–4 h, followed by treatment with benzene to give an insoluble solid and a benzene solution, from which (S)-(−)- and (R)-(+)-1,1′-bi-2-naphthols of a modest level of optical purity were obtained. After “kinetic” crystallization, both essentially enantiopure isomers were provided in 15%–35% overall yields, respectively. Foundation item: Supported by the National Natural Science Foundation of China (29972033) and the Key Science Research Foundation of Hubei Province (891P1305) Biography: Shan Zi-xing (1945-), male, Professor, research direction: asymmetric synthesis.  相似文献   

12.
This paper presents the logic relationship between rural settlement reconstruction and soil conservation in the Upper Yangtze River. Firstly, by introducing the concepts of "flow" and "intercepted flow", we probe into the dynamic mechanism on interaction between ecological and environmental system, and then point out that the "intercepting sites" are physical conditions for establishment of human settlements in mountains. Secondly, by using ecological theories, "flow", "source", and "sink", material cycle and energy flow in mountains have been discussed. Thirdly, according to dissipative structure theory and thermodynamic laws, a hypothesis has been proposed that "entropy flow" is a dynamic force for settlement evolution. Finally, it is argued that a project for soil conservation is set to control and utilize flows so rural settlements can be supported and farmers' life improved.  相似文献   

13.
Association rule mining is an important issue in data mining. The paper proposed an binary system based method to generate candidate frequent itemsets and corresponding supporting counts efficiently, which needs only some operations such as "and", "or" and "xor". Applying this idea in the existed distributed association rule mining al gorithm FDM, the improved algorithm BFDM is proposed. The theoretical analysis and experiment testify that BFDM is effective and efficient.  相似文献   

14.
A genetic algorithm on multiple sequences alignment problems in biology   总被引:2,自引:0,他引:2  
The study and comparison of sequences of characters from a finite alphabet is relevant to various areas of science, notably molecular biology. The measurement of sequence similarity involves the consideration of the possible sequence alignments in order to find an optimal one for which the “distance” between sequences is minimum. In biology informatics area, it is a more important and difficult problem due to the long length (100 at least) of sequence, this cause the compute complexity and large memory require. By associating a path in a lattice to each alignment, a geometric insight can be brought into the problem of finding an optimal alignment, this give an obvious encoding of each path. This problem can be solved by applying genetic algorithm, which is more efficient than dynamic programming and hidden Markov model using commomly now. Foundation item: Supported by Zi-qiang Foundation of Wuhan University and Open Foundation of the State Key-Laboratory of Software Engineering, Wuhan University Biography: Shi Feng(1966-), male, Associate professor, research direction: bioinformatics.  相似文献   

15.
This paper presents an agent-based software service framework model called ASF, and defines the basic concepts and structure of ASF model. It also describes the management and process mechanisms in ASF model. Foundation item: Supported by the Foundation of the Science and Technology Committee of Hubei Province (No. 982P0107), and the Ziqiang Technique Innovation Fund of Wuhan University Biography: He Yan-xiang(1952-), male, Professor, Ph. D, research direction: distributive process and distributed software engineering.  相似文献   

16.
A vision based query interface annotation meth od is used to relate attributes and form elements in form based web query interfaces, this method can reach accuracy of 82%. And a user participation method is used to tune the result; user can answer "yes" or "no" for existing annotations, or manually annotate form elements. Mass feedback is added to the annotation algorithm to produce more accurate result. By this approach, query interface annotation can reach a perfect accuracy.  相似文献   

17.
One-dimensional carbon nano-materials (ODCNMs) synthesized from ethanol flames exhibit various agglomerated morphologies, such as "chrysanthemum-like", "hairball-like" or "orange-peel-like", "vertically aligned" and "wrinkling-pileup". The present work studied the agglomerating process and the growth mechanism by using scanning electron microscopy (SEM) and transmission electron microscopy (TEM). It is thought that the size and distribution of the catalyst particles produced from pretreatment of the substrates play a key role during the formation of agglomerations. It is expected that the steady growth of ODCNMs in flames will be improved through the preparation of the catalysts.  相似文献   

18.
Reflection mechanism for reuse software architecture (RMRSA) divides a software architecture into base-level architecture and meta-level architecture logically. Base-level architecture is the ordinary architecture; meta-level represents and manipulates the reusable meta-information of base-level architecture explicitly. Through reflection, the modification of meta-level architecture will result in the modification of the architecture in base-level. Then we can gain a new base-level architecture design. In this paper, we use π-calculus to define the constituents and their interaction processes of RMRSA, by these definition, we specify the business function in base-level at runtime, and illustrate the reflection mechanism between the base-level architecture and meta-level architecture.  相似文献   

19.
There is natural occurrence of pressure-induced solid bitumen, here referred to as “compression dynamometamorphic solid bitumen”. It differs in physical properties and chemical structure from thermal metamorphic solid bitumen. Under a high pressure and moderate temperature, the solid bitumen forms crystals and its reflectance rises rapidly with increasing crystallization. Accordingly, its reflectance can reach a very high value without having been exposed to a high level of thermal stress. Laboratory simulation confirms the formation of pressure-induced solid bitumen at moderate temperatures. The revelation of this new bitumen type is very helpful in the accurate maturity determination of carbonate organic matter. Foundation item: Supported by Chinese Key Project of Science and Technology (96-111-03-04) Biography: GAO Zhi-nong (1961-), male, Ph.D, Associate professor, Research direction: organic geochemistry.  相似文献   

20.
计算机软件可靠性模式设计   总被引:1,自引:0,他引:1  
该文介绍、整理和分析了各类 用的软件可靠性分析模型(Reliability Models),周时也提出和阐述了作者研制的一套计算机软件可靠性辅助设计软件CMSRM(Comprtir Mediated Software ReliabilityModling)的设计与实现思想。CMSRM可以用于有效地分析软件的可靠性模型CMSRM是一个涵盖目前各灯现有之可靠性模型的分析工具,同时具备自动化或手工操作  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号