首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 484 毫秒
1.
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolutionary soft a-gent model to solve it. In proposed model, agent is composed of three components: goal, environment and behavior. Experimental shows the model has the characters of parallel computing and goal driving. Foundation item: Supported by the National Natural Science Foundation of China( 60205007) , Natural Science Foundation of Guangdong Province(001264), Research Foundation of Software Technology Key Laboratory in Guangdong Province and Research Foundation of State Key Laboratory for Novel Software Technology at Nanjing University Biography: Yin Jian ( 1968-), male, Associate professor, research direction: artificial intelligence, data mining.  相似文献   

2.
Based on the current researches of viewpoints oriented requirements engineering and intelligent agent, we present the concept of viewpoint agent and its abstract model based on a recta-language for muhiviews requirements engineering. It provided a basis for consistency checking and integration of different viewpoint requirements, at the same time, these checking and integration works can automatically realized in virtue of intelligent agent' s autonomy, proactivenes.s and social ability. Finally, we introduce the practical application of the model by the case study of data flow diagram.  相似文献   

3.
4.
Based on non-homogeneous model, a modified model is proposed. The new model deals with codon preference in protein-coding regions, reflects more accurately the key biological features of the regions. In addition, it is demonstrated, via an example, the modified model offers better solutions than previous model does. Foundation item: Supported by the Zi-qiang Science Foundation of Wuhan University Biography: Han Le (1977-), female, Master candidate, research direction: optimization and bioinformatics  相似文献   

5.
This paper presents an agent-based software service framework model called ASF, and defines the basic concepts and structure of ASF model. It also describes the management and process mechanisms in ASF model. Foundation item: Supported by the Foundation of the Science and Technology Committee of Hubei Province (No. 982P0107), and the Ziqiang Technique Innovation Fund of Wuhan University Biography: He Yan-xiang(1952-), male, Professor, Ph. D, research direction: distributive process and distributed software engineering.  相似文献   

6.
A best algorithm generated scheme is proposed in the paper by making use of the thought of evolutionary algorithm, which can generate dynamically the best algorithm of generating primes in RSA cryptography under different conditions. Taking into account the factors of time, space and security integrated, this scheme possessed strong practicability. The paper also proposed a model of multi-degree parallel evolutionary algorithm to evaluate synthetically the efficiency and security of the public key cryptography. The model contributes to designing public key cryptography system too. Foundation item: Supported by the Hi-Tech Research and Development Foundation item: Supported by the Hi-Tech Research and Development Biography; Tu Hang (1975-), male, Ph. D candidate, research directions: Biography; Tu Hang (1975-), male, Ph. D candidate, research directions:  相似文献   

7.
The planning and scheduling in real shop floor is actually achieved by coordination between different persons. In this process, cooperation is mainstream, but competition also exists, for example, the competition between different groups, operators with the same skill, etc. In multi-agent based shop floor management and control system, this competition and cooperation relation must be embodied. The general process of shop floor production planning and scheduling is studied, and a colored Petri-net model for the competition and cooperation process of three main agents in such system to achieve shop floor production planning and scheduling is presented. The evaluating method of bids in bidding process that especially embodies the competition relationship is also presented. This colored Petri-net model gives a clear illustration of this complex coordination process to system designers, effectively promotes the cooperative development. Foundation item: Supported partly by the Hi-tech Program of China (China 863) (No. 863-511-943-009) and the National Natural Science Foundation of China(No. 59990470) Biography: Liu Shi-ping(1971-), male, Ph. D. candidate, research direaction: CIMS, intelligent manufacturing.  相似文献   

8.
The paper presents second approximation model for optical head in super high-density storage technology firstly and it is an important part for three grades approximate model of ultra-small-size quantum well corn-shaped laser and simulative calculations. It supplies the important and useful results for the NFOD optical head design with ultra thin active layer and ultra small spot laser. Foundation item: Supported by the National Natural Science Foundation of China and Doctor Foundation of China Biography: WU Wan(1972-), male, Ph.D. candidate, Research interest is in super-high density storage, near field optical technology, and intergrated optical head.  相似文献   

9.
This paper investigates the competition diffusion model with delay. The existence and stability of nontrivial steady state are studied. Foundation item: Supported by the National Natural Science Foundation of China Biography: ZHOU Li (1939-), male, Professor, research interest is in partial differential equation.  相似文献   

10.
There are two kinds of dispatching policies in content-aware web server cluster; segregation dispatching policy and mixture dispatching policy. Traditional scheduling algorithms all adopt mixture dispatching policy. They do not consider that dynamic requests' serving has the tendency to slow down static requests' serving, and that different requests have different resource demands, so they can not use duster's resource reasonably and effectively. This paper uses stochastic reward net (SRN) to model and analyze the two dispatching policies, and uses stochastic Petri net package (SPNP) to simulate the models. The simulation results and practical tests both show that segregation dispatching policy is better than mixture dispatching policy. The principle of segregation dispatching policy can guide us to design efficient scheduling algorithm.  相似文献   

11.
With the explosion of services in grid environment, it's necessary to develop a mechanism which has the ability of discovering suitable grid services efficiently. This paper attempts to establish a layered resource management model based on the locality principle which classifies services into different domains and virtual organizations (VOs) according to their shared purposes. We propose an ontologybased search method applying the ontology theory for characterizing semantic information. In addition, we extend the UD- D1 in querying, storing, and so on. Simulation experiments have shown that our mechanism achieves higher performance in precision, recall and query response time.  相似文献   

12.
王相  王延忠 《科学技术与工程》2013,13(17):5037-5039
岩石颗粒沉积过程中的取向性导致岩石渗透率具有各向异性,各向异性岩石渗透率的确定在油气田开发研究中是一项重要而且基础的工作。首先分析了各向异性岩石的渗流特征,各向异性岩石的渗透率使用张量描述,渗流速度方向与压力梯度方向一般不平行。基于此,分析了原岩石方向渗透率计算模型的不足,指出原模型没有考虑各向异性岩石渗流速度方向与压力梯度方向不一致的特征,进而推导并建立了新的各向异性岩石方向渗透率计算模型。通过新老模型计算得到的方向渗透率与实测渗透率进行对比。结果显示,新的计算模型与实测值更加吻合。计算模型可用于计算油藏不同方向上的传导率以及各向异性油藏中不同方位上的井距设计,相比原模型更加准确。  相似文献   

13.
Knowledge discovery from communication network alarm databases   总被引:2,自引:0,他引:2  
The technique of Knowlege Discovery in Databases (KDD) to learn valuable knowledge hidden in network alarm databases is introduced. To get such knowledge, we propose an efficient method based on sliding windows (named as Slidwin) to discover different episode rules from time squential alarm data. The experimental results show that given different thresholds parameters, large amount of different rules could be discovered quickly. Foundation item: Supported by the National 863 High-Tech Project (863-306-Z705-02) and National Natural Science Foundation of China (69896240) Biography: Wang Xi-miao (1973-), female, Ph. D. candidate. Research interests: network management and information processing.  相似文献   

14.
This paper is concerned with the numerical solution, and with the detection of singularity for a singularly perturbed elliptic boundary value problems in two space dimensions. Specifically, a wavelet-collocation method is presented for a 2-D linear reaction-diffusion model. By using two-dimensional B-splinewavelet, we test the efficiency of the method. Foundation item: Supported by the National Natural Science Foundation of China (19602014) Biography: Zhang Ai-qing (1974-), female, Master candidate, research interest: wavelet analysis & application.  相似文献   

15.
Focusing on dropping packets attacks in sensor networks, we propose a model of dropping packets attack-resistance as a repeated game based on such an assumption that sensor nodes are rational. The model prevents malicious nodes from attacking by establishing punishment mechanism, and impels sensor networks to reach a collaborative Nash equilibrium. Simulation results show that the devised model can effectively resist the dropping packets attacks(DPA) by choosing reasonable configuration parameters.  相似文献   

16.
The emission spectra of Ru(bipy)2 (dppx)^2+ in different environments has been studied. It was found that the solvent polarity and the ability of donating and transferring proton are the important factors in predicting luminescence intensity in different systems. The increasing content of water in the organic solutions of Ru(bipy)2 (dppx)^2+ leads to de crease in emission intensity that follows the Perrin sphere of quenching model. The effect of base content of DNA on the fluorescence spectra of Ru (bipy)2 (dppx)^2+ has also been studied.  相似文献   

17.
It appears that extensibility and reusability of concurrent applications is far from trivial. Often the inheritance anomalies problems will arise. Basing on the composition-filters object model which is proposed by Aksit, we introduce the Generic Synchronization Policy (GSP) in the inheritance mechanism, produce a new kind of concurrent object-oriented computational model. After analyzing, we show that this new model can tackle the suffering from the inheritance anomalies. Supported by the Foundation of National 863 Project and the Natural Science Foundation of Hubei Province Zhang Qian: born in 1973, Ph. D  相似文献   

18.
The analysis of the RCS from the rough sea and ground surface is made. The two-dimensionally band-limited fractal function is used to model the sea and ground surface, the scattered electromagnetic field is calculated by using Kirchhoff approximation. The validity of this result is assured by some references, which indicates that the methods are reliable. Foundation item: Supported by the National Natural Science Foundation of China(69571021) Biography: GAO Ming-qin (1974-), Master Candidate. Research field: EM scattering.  相似文献   

19.
Specifying requirements of real-time system with rules and templates   总被引:5,自引:0,他引:5  
This paper presents a model specifying requirements of real-time systems. Different from existing researches, this model mainly uses rules and templates to represent hierarchical FSMs (Finite State Machine). In this model, one rule corresponds to one state transition of FSM and one template corresponds to one FSM. Rules and information with respect to a FSM can be written in a template. So templates include not only state diagrams, but also information that can not be described by FSM, such as performance requirements. The specification using this model consists of a collection of templates and it is easy for users to understand and to review. After introduced the related researches and principles of the model, this paper specifies requirements of a real-time system with this model, and discusses characters of this model in the end. Foundation item: Supported by the National Natural Science Foundation of China (69873035) and the Research Fund for the Doctoral Program of Higher Education(RFDP) Biography: Wu Guo-qing(1954-), male, Professor, research interest: software formal theory, requirement engineering.  相似文献   

20.
To build a trusted platform based on Trusted Computing Platform Alliance (TCPA)‘s recommendation, we analyze the integrity mechanism for such a PC platform in this paper. By combinning access control model with information flow model, we put forward a combined process-based lattice model to enforce security. This model creates a trust chain by which we can manage a series of processes from a core root of trust module to some other application modules. In the model,once the trust chain is created and managed correctly,the integrity of the computer‘s hardware and sofware has been mainfained, so does the confidentiality and authenticity. Moreover, a relevant implementation of the model is explained.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号