期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Research on engineering-oriented constraints conflict detection in collaborative design of wire harness technology
1
作者 LIU Xiaoping HE Honglin XU Benzhu 《Computer Aided Drafting,Design and Manufacturing》 2012年第2期13-19,共7页
Engineering-oriented constraint of harness technology has much information and project information presents progressive changes along with the design. Therefore, how to handle conflict resolution quickly is a problem ... Engineering-oriented constraint of harness technology has much information and project information presents progressive changes along with the design. Therefore, how to handle conflict resolution quickly is a problem to be solved. Process model of con- flict detection is put forward according to characteristics of harness technology design engineering-oriented constraint, and then two problems of how to conduct conflict positioning and judgment of constraint rules are introduced in this paper. Afterwards in this pa- per, constraint information directed acyclic graph is established by classified project constraint information to solve the conflict posi- tioning problem; solution of constraint satisfaction problem is applied to realize judgment problem of constraint rules. Finally, exam- ple is used to analyze the method in this paper to further verify the correctness and effectiveness of this method. 展开更多
关键词 harness technology collaborative design conflict detection engineering-oriented constraint
下载PDF
A multi-aircraft conflict detection and resolution method for 4-dimensional trajectory-based operation 被引量:8
2
作者 Siqi HAO Shaowu CHENG Yaping ZHANG 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2018年第7期1579-1593,共15页
Conflict Detection and Resolution(CD&R) is the key to ensure aviation safety based on Trajectory Prediction(TP). Uncertainties that affect aircraft motions cause difficulty in an accurate prediction of the trajec... Conflict Detection and Resolution(CD&R) is the key to ensure aviation safety based on Trajectory Prediction(TP). Uncertainties that affect aircraft motions cause difficulty in an accurate prediction of the trajectory, especially in the context of four-dimensional(4D) Trajectory-Based Operation(4DTBO), which brings the uncertainty of pilot intent. This study draws on the idea of time geography, and turns the research focus of CD&R from TP to an analysis of the aircraft reachable space constrained by 4D waypoint constraints. The concepts of space–time reachability of aircraft and space–time potential conflict space are proposed. A novel pre-CD&R scheme for multiple aircraft is established. A key advantage of the scheme is that the uncertainty of pilot intent is accounted for via a Space-Time Prism(STP) for aircraft. Conflict detection is performed by verifying whether the STPs of aircraft intersect or not, and conflict resolution is performed by planning a conflict-free space–time trajectory avoiding intersection. Numerical examples are presented to validate the efficiency of the proposed scheme. 展开更多
关键词 Air traffic control Collision avoidance conflict detection conflict resolution Time geography Trajectory planning
原文传递
A Conflict Detection Scheme for Concurrency Control of R-tree 被引量:1
3
作者 XIAYing PENGDa-qin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第1期49-54,共6页
Despite extensive research on R-trees, most of the proposed schemes have notbeen integrated into existing DBMS owing to the lack of protocols of concurrency control. R-linktree is an acceptable data structure to deal ... Despite extensive research on R-trees, most of the proposed schemes have notbeen integrated into existing DBMS owing to the lack of protocols of concurrency control. R-linktree is an acceptable data structure to deal with this issue, but problems like phantom still exist.In this paper, we focus on a conflict detection scheme based on R-link tree for completeconcurrency control. An in-memory operation control list is designed to suspend conflictingoperations . The main features of this approach are (1) it can be implemented easily and does notneed any extra information ; (2) No deadlocks are involved in locking scheme ; (3) Non-conflictingoperations are not restricted ; and (4) Phantom problems in R-link tree are avoided throughbeforehand predication . The experiment results show that this scheme is correct and gains bettersystem performance. 展开更多
关键词 concurrency control R-link tree phantom problem conflict detection
原文传递
Improved Flight Conflict Detection Algorithm Based on Gauss-Hermite Particle Filter 被引量:1
4
作者 MA Lan GAO Yongsheng +1 位作者 YIN Tianyi ZHAI Wenpeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第3期269-276,共8页
In order to improve the accuracy of free flight conflict detection and reduce the false alarm rate, an improved flight conflict detection algorithm is proposed based on Gauss-Hermite particle filter(GHPF). The algor... In order to improve the accuracy of free flight conflict detection and reduce the false alarm rate, an improved flight conflict detection algorithm is proposed based on Gauss-Hermite particle filter(GHPF). The algorithm improves the traditional flight conflict detection method in two aspects:(i) New observation data are integrated into system state transition probability, and Gauss-Hermite Filter(GHF) is used for generating the importance density function.(ii) GHPF is used for flight trajectory prediction and flight conflict probability calculation. The experimental results show that the accuracy of conflict detection and tracing with GHPF is better than that with standard particle filter. The detected conflict probability is more precise with GHPF, and GHPF is suitable for early free flight conflict detection. 展开更多
关键词 free flight conflict detection Gauss-Hermite particle filter importance probability density function observation data
原文传递
Detecting conflict of heterogeneous access control policies
5
作者 Mingjie Yu Fenghua Li +2 位作者 Nenghai Yu Xiao Wang Yunchuan Guo 《Digital Communications and Networks》 SCIE CSCD 2022年第5期664-679,共16页
Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,con... Policy conflicts may cause substantial economic losses.Although a large amount of effort has been spent on detecting intra-domain policy conflict,it can not detect conflicts of heterogeneous policies.In this paper,considering background knowledge,we propose a conflict detection mechanism to search and locate conflicts of heterogeneous policies.First,we propose a general access control model to describe authorization mechanisms of cloud service and a translation scheme designed to translate a cloud service policy to an Extensible Access Control Markup Language(XACML)policy.Then the scheme based on Multi-terminal Multi-data-type Interval Decision Diagram(MTMIDD)and Extended MTMIDD(X-MTMIDD)is designed to represent XACML policy and search the conflict among heterogeneous policies.To reduce the rate of false positives,the description logic is used to represent XACML policy and eliminate false conflicts.Experimental results show the efficiency of our scheme. 展开更多
关键词 conflict detection Access control Decision diagram Policy translation Heterogeneous policy Ontology reasoner
下载PDF
Conflict Resolution Based on Collaborative Design of Grid Services
6
作者 LUO Zuomin ZHANG Jing ZHOU Hongfang CHEN Xinhua 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期490-494,共5页
To the issues of low efficiency of conflict resolution method in collaborative design, we proposed a method, which is conflict resolution about collaborative design based on grid services.It uses the grid services fro... To the issues of low efficiency of conflict resolution method in collaborative design, we proposed a method, which is conflict resolution about collaborative design based on grid services.It uses the grid services from the current design points, uses the method of retrospective thinking to find the conflict point by detecting, and then uses the corresponding method to resolve the conflict point according to the conflict characteristic, after that carried on the conflict detection again. If there is still the conflict, resolve the conflict point again, until the conflict no longer exists. This method combines various traditional resolution methods, makes full use of the grid idle high-performance large-scale sharing resources. With this method the collaborative design conflict resolution cost reduced and the conflict resolution efficiency was raised. And then the problem which is not handled completely was then solved, so that the conflict resolution Quality was guaranteed. 展开更多
关键词 grid services collaborative design conflict resolution conflict characteristic conflict detection
下载PDF
Conflict Analysis and Detection Based on Model Checking for Spatial Access Control Policy
7
作者 Aijuan Zhang Cheng Ji +1 位作者 Yu Bao Xin Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期478-488,共11页
In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi- granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To ana... In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi- granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To analyze and detect these conflicts, we first analyze the conflict types with respect to the relationship among the policy rules, and then formalize the conflicts by template matrices. We designed a model-checking algorithm to detect potential conflicts by establishing formalized matrices of the policy set. Lastly, we conducted experiments to verify the performance of the algorithm using various spatial data sets and rule sets. The results show that the algorithm can detect all the formalized conflicts. Moreover, the algorithm's efficiency is more influenced by the spatial object granularity than the size of the rule set. 展开更多
关键词 spatial object MULTI-GRANULARITY conflict detection MODEL-CHECKING
原文传递
Evaluation of conflict-resolution policies on controller taskload
8
作者 Adan Ernesto VELA William SINGHOSE +2 位作者 Karen FEIGH John-Paul CLARKE Eric FERON 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2021年第5期315-330,共16页
In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution com... In an effort to maintain safety while satisfying growing air traffic demand,air navigation service providers are considering the inclusion of advisory systems to identify potential conflicts and propose resolution commands for the air traffic controller to verify and issue to aircraft.To understand the potential workload implications of introducing advisory conflict-detection and resolution tools,this paper examines a metric of controller taskload:how many resolution commands an air traffic controller issues under the guidance of an advisory system.Through a simulation study,the research presented here evaluates how the underlying protocol of a conflict-resolution tool affects the controller taskload(system demands)associated with the conflict-resolution process,and implicitly the controller workload(physical and psychological demands).Ultimately,evidence indicates that there is significant flexibility in the design of conflict-resolution algorithms supporting an advisory system. 展开更多
关键词 Air traffic control Air traffic management conflict detection and resolution Decision-support tools Simulation analysis
原文传递
Packet: a privacy-aware access control policy composition method for services composition in cloud environments 被引量:2
9
作者 Li LIN Jian HU Jianbiao ZHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第6期1142-1157,共16页
Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service p... Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service providers' access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection ef- ficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance. 展开更多
关键词 cloud service composition access control PRIVACY policy composition unified policy format conflict detection similarity analysis conflict resolution
原文传递
Survey of Safety Management Approaches to Unmanned Aerial Vehicles and Enabling Technologies 被引量:1
10
作者 Xuejun Zhang Yanshuang Du +2 位作者 Bo Gu Guoqiang Xu Yongxiang Xia 《Journal of Communications and Information Networks》 2018年第4期1-14,共14页
Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an importan... Unmanned aerial vehicle(UAV)has a rapid development over the last decade.However,an increasing number of severe flight collision events caused by explosive growth of UAV have drawn widespread concern.It is an important issue to investigate safety management approaches of UAVs to ensure safe and efficient operation.In this paper,we present a comprehensive overview of safety management approaches in large,middle and small scales.In large-scale safety management,path-planning problem is a crucial issue to ensure safety and ordered operation of UAVs globally.In middle-scale safety management,it is an important issue to study the conflict detection and resolution methods.And in small-scale safety management,real-time collision avoidance is the last line of ensuring safety.Moreover,a UAV can be regarded as a terminal device connected through communication and information network.Therefore,the enabling technologies,such as sensing,command and control communication,and collaborative decision-making control technology,have been studied in the last. 展开更多
关键词 UAV safety management PATH-PLANNING conflict detection and resolution collision avoidance enabling technologies
原文传递
Resources Snapshot Model for Concurrent Transactions in Multi-Core Processors
11
作者 赵雷 杨季文 《Journal of Computer Science & Technology》 SCIE EI CSCD 2013年第1期106-118,共13页
Transaction parallelism in database systems is an attractive way of improving transaction performance. There exists two levels of transaction parallelism, inter-transaction level and intra-transaction level. With the ... Transaction parallelism in database systems is an attractive way of improving transaction performance. There exists two levels of transaction parallelism, inter-transaction level and intra-transaction level. With the advent of multi- core processors, new hopes of improving transaction parallelism appear on the scene. The greatest execution efficiency of concurrent transactions comes from the lowest dependencies of them. However, the dependencies of concurrent transactions stand in the way of exploiting parallelism. In this paper, we present Resource Snapshot Model (RSM) for resource modeling in both levels. We propose a non-restarting scheduling algorithm in the inter-transaction level and a processor assignment algorithm in the intra-transaction level in terms of multi-core processors. Through these algorithms, execution performance of transaction streams will be improved in a parallel system with multiple heterogeneous processors that have different number of cores. 展开更多
关键词 MULTI-CORE database transaction PARALLELISM CONCURRENCY conflict detection
原文传递
An authorization model for collaborative access control
12
作者 Chen-hua MA Guo-dong LU Jiong QIU 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第9期699-717,共19页
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that mul... Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks.Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights.Existing approaches to access control cannot satisfy the requirements of collaborative access control.To address this concern,we propose an authorization model for collaborative access control.The central notions of the model are collaborative permission,collaboration constraint,and collaborative authorization policy,which make it possible to define the collaboration among multiple subjects involved in gaining a permission.The implementation architecture of the model is also provided.Furthermore,we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies. 展开更多
关键词 Collaborative access control Collaborative permission conflict detection and resolution
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部