首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
In order to realize distributed computing of Ada95, this paper discusses Ada95′s distributed system model and an implement model of Ada95′s distributed computing—workstation cluster model. Under this model, we presents a pre-allocation strategy for allocating the computation quantity of distributed units evenly among workstations and also reducing the communication expense between those distributed units. Foundation item: Supported by the Science foundation of Hubei Province (99J026) Biography: ZHU Fu-xi(1957-), male, Associate professor, research field: Distributed computing, AI.  相似文献   

2.
Pervasive computing environment is a distributed and mobile space. Trust relationship must be established and ensured between devices and the systems in the pervasive computing environment. The trusted computing (TC) technology introduced by trusted computing group is a distributed-system-wide approach to the provisions of integrity protection of resources. The TC's notion of trust and security can be described as conformed system behaviors of a platform environment such that the conformation can be attested to a remote challenger. In this paper the trust requirements in a pervasive/ubiquitous environment are analyzed. Then security schemes for the pervasive computing are proposed using primitives offered by TC technology.  相似文献   

3.
First, an asynchronous distributed parallel evolutionary modeling algorithm (PEMA) for building the model of system of ordinary differential equations for dynamical systems is proposed in this paper. Then a series of parallel experiments have been conducted to systematically test the influence of some important parallel control parameters on the performance of the algorithm. A lot of experimental results are obtained and we make some analysis and explanations to them. Foundation item: Supported by the National Natural Science Foundation of China (60133010, 70071042, 60073043) Biography: Cao Hong-qing ( 1972-), female, Associate professor, research direction; evolutionary computing, parallel computing.  相似文献   

4.
The mid-long term hydrology forecasting is one of most challenging problems in hydrological studies. This paper proposes an efficient dynamical system prediction model using evolutionary computation techniques. The new model overcomes some disadvantages of conventional hydrology forecasting ones. The observed data is divided into two parts: the slow “smooth and steady” data, and the fast “coarse and fluctuation” data. Under thedivide and conquer strategy, the behavior of smooth data is modeled by ordinary differential equations based on evolutionary modeling, and that of the coarse data is modeled using gray correlative forecasting method. Our model is verified on the test data of the mid-long term hydrology forecast in the northeast region of China. The experimental results show that the model is superior to gray system prediction model (GSPM). Foundation item: Supported by the National Natural Science Foundation of China ( 60133010, 70071042, 60073043) Biography: Zou Xiu-fen(1966-),female,Associate professor, research direction:evolutionary computing, parallel computing.  相似文献   

5.
A new point-tree data structure genetic programming (PTGP) method is proposed. For the discontinuous function regression problem, the proposed method is able to identify both the function structure and discontinuities points simultaneously. It is also easy to be used to solve the continuous function’s regression problems. The numerical experiment results demonstrate that the point-tree GP is an efficient alternative way to the complex function identification problems. Foundation item: Supported by the National Natural Science Foundation (60173046) and the Natural Science Foundation of Hubei Province (2002AB040) Biography: Xiong Sheng-wu (1966-), male, Associate professor, research direction: evolutionary computing, parallel computing.  相似文献   

6.
Building Intrusion Tolerant Software System   总被引:1,自引:0,他引:1  
In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploiting N-version module threshold method in con-structing multilevel secure software architecture, by detecting with hash value, by placing an ““““““““antigen““““““““ word next to the return address on the stack that is similar to human immune system, and by adding ““““““““Honey code““““““““ nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured.  相似文献   

7.
基于区域分解法的地下水有限元并行数值模拟   总被引:7,自引:0,他引:7  
地下水系统概念的出现对地下水模拟技术、地下水决策支持管理提出了新的要求,比如地下水系统中同时包含包气带模型和饱和带模型,或在饱和带中同时出现孔隙介质模型和裂隙介质模型,更可能在建造地下水模型的同时必须结合考虑地表水模型,所有的这些顾虑和可能均会使模型复杂化,且不说用目前流行的数值方法难于求解,就算能求解也势必造成计算工作量的剧增,这就需要借助高性能计算机来担任这项工作.相对于代价高昂的共享内存多处理器技术,基于分布式模型的机群计算技术为此项工作的实现提供了可能.讨论了如何利用机群计算技术,实现地下水有限元并行数值模拟.从地下水有限元模型的并行求解可能、基于区域分解法的并行算法、并行编程以及并行计算的实现各方面着手,系统地阐述了地下水有限元并行模拟的关键技术,并将该方法应用于一个理想的地下水溶质运移模型中,取得了成功.还讨论了方法的应用前景,包括利用机群计算技术实现对整个流域的地下水进行准实时模拟,为地下水调度提供决策依据.  相似文献   

8.
信息与计算科学专业是以信息处理和科学与工程计算为背景,由信息科学、计算科学、运筹与控制科学等交叉渗透而形成的一个新型的理科专业.数学实验是数学理论教学的辅助,对学生掌握该类课程的数学方法、数学命题等有帮助作用.本文结合专业建设对信息与计算科学专业的数学实验种类、实验过程、实验的实施条件进行了探讨,以期能更好地发挥有效作用.  相似文献   

9.
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment.  相似文献   

10.
0 IntroductionWireless sensor networks consist of manynodes , each containing application-specificsensors ,a wirelesstransceiver ,anda si mple proces-sor[1-4]. Sensor networks have extensive applica-tions . A large number of research results can beseenin Refs .[5-7] .This paper mainly concerns with sensor net-works that are inherently unreliable. We consider anetwork with mn nodes ,arranged in a grid over asquare region of areaA. This model was presentedin[8 ,9].Each nodeis a sensor ,and can…  相似文献   

11.
We introduce a new parallel evolutionary algorithm in modeling dynamic systems by nonlinear higher-order ordinary differential equations (NHODEs). The NHODEs models are much more universal than the traditional linear models. In order to accelerate the modeling process, we propose and realize a parallel evolutionary algorithm using distributed CORBA object on the heterogeneous networking. Some numerical experiments show that the new algorithm is feasible and efficient. Foundation item: Supported by the National Natural Science Foundation of China (No. 70071042 and No. 60073043) Biography: Kang Zhuo (1970-), male, Lecturer, research interest: network computing and evolutionary computation.  相似文献   

12.
使用TCP/IP协议将某些地震数据处理软件设计成网络并行处理程序,可极大地提高计算效率。文章详细叙述了实现该方法的一种技术路线,对网络并行程序设计和网络并行处理中会遇到的一些问题进行了讨论,并提出了解决方案。实际运算结果证实该技术路线和解决方案是切实可行的  相似文献   

13.
A fast algorithm is proposed to solve a kind of high complexity multi-objective problems in this paper. It takes advantages of both the orthogonal design method to search evenly, and the statistical optimal method to speed up the computation. It is very suitable for solving high complexity problems, and quickly yields solutions which converge to the Pareto-optimal set with high precision and uniform distribution. Some complicated multi-objective problems are solved by the algorithm and the results show that the algorithm is not only fast but also superior to other MOGAS and MOEAs, such as the currently efficient algorithm SPEA, in terms of the precision, quantity and distribution of solutions. Foundation item: Supported by the National Natural Science Foundation of China (60204001, 70071042, 60073043, 60133010) and Youth Chengguang Project of Science and Technology of Wuhan City (20025001002). Biography: Zeng San-you ( 1963-), male, Associate professor, research direction: evolutionary computing, parallel computing  相似文献   

14.
为了提高基于有限元法构建的大地电磁正演模型的计算性能,以及解决模型计算的复杂性问题,提出了一种基于美国新近提出的大规模科学计算领域组件规范CCA(Common Component Architecture)构建的组件化分布式并行大地电磁正演MT模型。首先,基于CCA规范定义MT组件服务端口,定义MT组件; 其次,采用有限元方法将Maxwell方程离散为线性系统,采用GreenField算法对其求解,设计了一种频率域分解策略实现了一个分布式并行MT模型;最后,采用Babel编译生成了一个分布式并行MT模型组件。实验结果表明,该方法所构建的MT模型组件具有较高的计算性能、灵活性和可扩展性。  相似文献   

15.
This paper presents a parallel two-level evolutionary algorithm based on domain decomposition for solving function optimization problem containing multiple solutions. By combining the characteristics of the global search and local search in each sub-domain, the former enables individual to draw closer to each optima and keeps the diversity of individuals, while the latter selects local optimal solutions known as latent solutions in sub-domain. In the end, by selecting the global optimal solutions from latent solutions in each sub-domain, we can discover all the optimal solutions easily and quickly. Foundation item: Supported by the National Natural Science Foundation of China (60133010,60073043,70071042) Biography: Wu Zhi-jian(1963-), male, Associate professor, research direction: parallel computing, evolutionary computation.  相似文献   

16.
面向海量高分辨率遥感影像数据快速发布需求,针对当前云环境下遥感影像数据并行重采样存在的难题,结合云平台MapReduce并行计算框架特性和遥感影像数据处理特点,提出了一种基于预分片的遥感影像数据并行重采样方法,通过预分片机制有效实现了该框架中对影像数据分片和并行重采样任务的控制,解决了MapReduce难以用于并行处理非结构化、具有空间位置特征的遥感影像数据的问题,从而实现了云环境下遥感影像数据的高效并行重采样.通过在开源云平台Hadoop上的实验和分析表明,该方法具有良好的重采样性能,能够实现高分辨率遥感影像数据的高效重采样.  相似文献   

17.
In this paper, the applications of evolutionary al gorithm in prediction of protein secondary structure and tertiary structures are introduced, and recent studies on solving protein structure prediction problems using evolutionary algorithms are reviewed, and the challenges and prospects of EAs applied to protein structure modeling are analyzed and discussed. Foundation item: Supported by the National Natural Science Foundation of China( 60133010,70071042,60073043) Biography: Zou Xiu-fen ( 1966-), female, Associate professor, research direction:evolutionary computing, parallel computing, bioinformatics.  相似文献   

18.
This paper proposes a performance prediction model for grid computing model ServiceBSP to support developing high quality applications in grid environment. In ServiceBSP model, the agents carrying computing tasks are dispatched to the local domain of the selected computation services. By using the IP (integer program) approach, the Service Selection Agent selects the computation services with global optimized QoS (quality of service) consideration. The performance of a ServiceBSP application can be predicted according to the performance prediction model based on the QoS of the selected services. The performance prediction model can help users to analyze their applications and improve them by optimized the factors which affects the performance. The experiment shows that the Service Selection Agent can provide ServiceBSP users with satisfied QoS of applications.  相似文献   

19.
相息图以其衍射效率高,无共轭像等优点而被广泛应用于全息三维动态显示中,然而相息图计算量大,生成速度慢而影响了它的实时动态显示;鉴于此,提出了一种三维场景相息图快速生成方法;采用OpenGL进行物点离散采样,逐点计算的优化查表算法进行相息图计算,将相位因子拆成水平方向和竖直方向因子的乘积,离线制作的查找表只需存储水平方向和竖直方向因子,从而使存入GPU纹理内存的查找表空间大大减少,并利用CUDA架构合理设计并行计算方案,使相息图的运算速度进一步加速;实验表明:采用此方法能正确生成所需的相息图,且计算速度比基于CPU的计算方法提高了40倍左右.  相似文献   

20.
The most significant strategic development in information technology over the past years has been "trusted computing" and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号