首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.
WebGIS is the result of combining the technology of Internet with that of Geographic Information Systems (GIS). This paper aims at some problems in the development of GIS. such as the system of development is instable, and presents the method of adopting component technology to accomplish WebGIS middleware which has been successfully applied to the Oil Production Engineering information visible system. It showed in practice that the WebGIS middleware can be easily embedded in the web pages to accomplish GIS application system in a network environment. On the one band. its application can reduce complexity of system and speed up the pace of development. On the other hand. it is certain to reduce the development costs and improve the main tainability.  相似文献   

2.
Trust management system has been a promising approach to solve the access control problems in open multi-domain environments. However, the calculation of trust and the delivery of the trust are not addressed effectively in the existing trust management systems. To address the problems, this paper proposes a scheme of trust calculation and delivery control. Compared with the other schemes, it is simpler and more flexible, and also easier to be implemented.  相似文献   

3.
Blind signature allows a user to get a signature of a signer on an arbitrary message,and the verifier can convince that the signature is indeed signed by the signer without leaking any information about the message.This property is necessary when the user’s privacy needs protection,such as a bank bill,a trade secret,etc.As an alternative of public key infrastructure,the identity-based system can simplify the key management procedures in certificate-based public key systems.Inspired by the requirement of identity-based blind signature in the post quantum world,we research on identity-based blind signature based on hard lattice problems under the random Oracle model.We propose a construction built upon the blind signature by Rückert,and it is proved to be one-more unforgeable against selective identity and chosen message attacks(s ID-CMA)and unconditionally blind.The proposed scheme has 2 moves,and its security can be reduced to the small integer solution(SIS)problem.  相似文献   

4.
Current workflow management systems usually adopt the existing technologies such as TCP, IP-based Web technologies and CORBA as well to fulfill the bottom communications. Very often it has been considered only from a theoretical point of view, mainly for the lack of concrete possibilities to execute with elasticity. MAT (Mobile Agent Technology) represents a very attractive approach to the distributed control of computer networks and a valid alternative to the implementation of strategies for workflow system. This papermainly focuses on improving the performance of workflow system by using MAT. Firstly. the performances of workflow systems based on both C()RBA and mobile agent are summarized and analyzed; Secondly. the performance contrast is presented by introducing the mathematic model of each kind of data interaction process respectively. Last. a mobile agentbased workflow system named MAWMS is presented and described in detail.  相似文献   

5.
Evaluation methods for the autonomy of unmanned systems   总被引:1,自引:0,他引:1  
Future military and civilian unmanned systems will be extensively used on land,under the sea,in air,and in space.Evaluation of their autonomy is critical to realize the autonomous operation ability of unmanned systems.This paper discussed the basic concepts of autonomy and the significance of autonomy evaluation,and then surveys and describes existing evaluating methods.Based on analyses of key technologies and these technologies’ technical readiness levels,a cobweb evaluation model as a universal evaluation model has been used to evaluate unmanned systems.If the technology warps(aspects of autonomy) and wefts(levels of those aspects) of unmanned systems can be determined for the cobweb model,the model can handle the mutual coupling,high dimensions,and diversity of warp lines.This model potentially has wide application in evaluating various unmanned systems.  相似文献   

6.
This paper discusses the necessity of building IDSS on hybrid systems, and adopts XML technology to manage isomeric knowledge in hybrid systems. The paper proposes a new architecture of hybrid systems based IDSS whose core system is isomeric knowledge system. The architecture is composed of knowledge component, problems processing system, data component and intelligent user interface. This new architecture aims to enhance the capability of integrating hybrid systems, to improve the supporting effectiveness of decision-making and the intelligent level of IDSS, and tries a new way to elevate the system's ability of handling and learning knowledge.  相似文献   

7.
Ontology mapping is the bottleneck ot handhng confilicts among heterogeneous ontologies and of implementing reconfiguration or interoperability of legacy systems. We proposed an ontology mapping method by using machine learning, type constraints and logic mining techniques. This method is able to find concept correspondences through instances and the result is optimized by using an error function; it is able to find attribute correspondence between two equivalent concepts and the mapping accuracy is enhanced by combining together instances learning, type constraints and the logic relations that are imbedded in instances; moreover, it solves the most common kind of categorization conflicts. We thenproposed a merging algorithm to generate the shared ontology and proposed a reconfigurable architecture for interoperation based on multi agents. The legacy systems are encapsulated as information agents to participate in the integration system. Finally we give a simplified case study.  相似文献   

8.
The present status of deep sea bed mining technology for polymetallic nodules has been critically examined in light of its history of development the UNCLoS (the United Nation Convention on the Law of the Sea) regime and the current trends in research.The critical technologies have been highlighted and the need for system integration underscored. The deep sea bed environment and the engineering challenge were presented and the necessary features of the deep sea bed mining system for commercial mining was analyzed. The key accomplishments, problems and future bends in research in the development of the mining system are also discussed. Finally, it points out that the technology gaps can be filled by the time commercial mining is undertaken as a result of market conditions in its favor.  相似文献   

9.
Prospects of Anaerobic Digestion Technology in China   总被引:1,自引:0,他引:1  
As the world’s largest developing country, China must face the problem of managing municipal solid waste, and the challenge of organic waste disposal is even more serious. Considering the characteris- tics of traditional waste disposal technologies and the subsequent secondary pollution, anaerobic digestion has various advantages such as reduction in the land needed for disposal and preservation of environ- mental quality. In light of the energy crisis, this paper focuses on the potential production of biogas from bio- waste through anaerobic digestion processes, the problems incurred by the waste collection system, and the efficiency of the anaerobic digestion process. Use of biogas in a combined heat and power cogeneration system is also discussed. Finally, the advantages of anaerobic digestion technology for the Chinese market are summarized. The anaerobic digestion is suggested to be a promising treating technology for the organic wastes in China.  相似文献   

10.
Rapid developments in network systems of business service have resulted in more reliance on distributed computing, typified by “subscriber/push” architectures. Unfortunately, frequent and unexpectable network failures were routine, and downtime was not in hours, but in days. High availability has become the most important factor decreasing business risk and improving Quality of Service. Cluster technology has solved the non-stop problem on Local Area Network. However, most technologies including cluster today fail to ensure the non-stop Internet service based on Routers. With good performance on high availability and fault tolerance, quorum systems are very suitable for application to distributed business service networks. In this work, we modeled and developed a non-stop Internet service system based on a new quorum system, circle quorum system, for Boston Mutual Fund Broker, US. With five protocols, it provided highly available data services for clients on Internet.  相似文献   

11.
为对大规模异构机群系统进行管理,设计并实现了一套负责机群内部节点之间通信的消息中间件ACMSCom。这种消息中间件使用可扩展标记语言(XML)作为数据传输的媒介,具有平台无关、操作系统无关和语言无关的特性,它可以以同步方式和异步方式进行数据交换,从而满足不同情况下机群节点间通信的要求。该中间件在机群中的实际运行结果表明,该系统在同步通信方式下有较好的性能。这套系统还可以用来解决其他大规模异构分布式系统内部的通信问题。  相似文献   

12.
WebGIS中间件的研究与开发   总被引:4,自引:1,他引:3  
针对基于WebGIS的地理信息系统,开发难度大,系统不稳定等问题,提出采用中阃件技术实现WebGIS中间件,并应用于采油工程信息可视化系统中,取得了良好的效果.实践表明,WebGIS中间件可以无缝地嵌入到Web主页,实现网络环境下的GIS应用系统,一方面降低了系统的复杂性,加快了开发速度。另一方面也可以降低成本,增加可维护性.  相似文献   

13.
As ubiquitous sensor networks (USN) technologies and its middleware are still at its early stages, the system of the USN relies on the middleware and applications. The past sensor networks are assumed to be designed for specific applications, having data communication protocols tightly coupled to applications. To avoid these problems, several kinds of USN middleware have been researched and developed. However, most middleware of USN are still restricted by its own infrastructure so far. This paper proposes appropriate 3 tier Smart Middleware System (3SMS) for USN.  相似文献   

14.
The multiagent negotiation testbed proposed by Collins was modified. It utilizes publish/subscribe system, timerelease cryptography and anonymous communication. The proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that generating random number to the supplier by market is better than the supplier doing it by him in guaranteeing anonymity. Market publishes an interpolating polynomial for sharing the determination process data. It avoids collusion between a customer and a certain supplier. According to the comparison and analysis with other protocols, the proposed protocol shows good security and better efficiency.  相似文献   

15.
针对信息安全的现实要求,基于改进的Bell—LaPadula(BLP)模型,设计了通过中间件技术实现B1级安全数据库管理系统的具体方案.主要包括强制访问控制、授权管理、安全审计和自身安全保护等功能和技术,该安全系统基本达到TCSEC标准的B1级安全要求,并已在典型的操作系统Windows NT上实现,取得了良好的应用效果.  相似文献   

16.
肖威 《山西科技》2012,(4):121-122
研究RFID中间件技术在我国图书馆系统应用过程中所面临的问题,提出基于中间件的RFID解决方案;分析了图书馆系统在应用之后所需的业务流程改造工作,对RFID中间件的设备配置能力、驱动设备读写标签的能力、实时数据处理能力、系统集成能力等进行了测试,验证了RFID中间件在图书馆系统中的应用效果。  相似文献   

17.
对象中间件技术及其发展趋势   总被引:1,自引:0,他引:1  
指出了中间件是位于操作系统和应用软件之间的一类系统软件,它简化了分布式应用系统的开发.概述了中间件的含义,给出了中间件的一种分类方式,比较了现存的对象中间件模型,提出了对象中间件今后的发展方向及需要解决的关键问题.  相似文献   

18.
近年来,随着高速网络技术和高性能工作站技术的长足发展,国内外研究人员所从事的基于LAN的工作站模型的分布式系统的研究具有极大的现实意义「’1.在研究中,出现了大量的成型的分布式系统模型[’·‘1.尽管如此,这些系统的实现手段和效率并不令人满意,没有哪个分布式系统能用非常有效的策略和机制来克服由于分布而引起的问题,如提高系统潜在的分布并发处理能力,包括运行速度、系统效率、实用性和可靠性等.上述问题无论在理论上还是实践上都是值得认真研究的「‘1,其中一个重要的研究方向就是分布式系统中的任务分配、系统负荷…  相似文献   

19.
针对传统的协议一致性测试系统多采用单机架构或基于某些特定的平台,缺乏足够的通用性和可扩展性的这些问题,本文提出并设计了一种基于消息中间件的协议一致性测试系统.利用面向服务架构的消息中间件实现分布式运行环境,不仅增强消息传输的效率和可靠性,还支持对消息传输流程的扩展和重组等.最后,通过实际的测试应用,验证了该系统的通用性、实时性和可扩展性.  相似文献   

20.
谢帆  蒋熔  彭玉涛 《科技信息》2007,(36):88-89
本文通过对漏洞扫描技术和中间件技术的研究,结合两者的特点,提出了一种基于漏洞扫描的安全中间件的系统结构。该系统具有良好的封装性和可扩充。通过使用漏洞检测技术可以检测网络系统潜在的安全漏洞,使网络管理员可以预先了解网络的脆弱性所在,从而确保系统的安全。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号