期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Development of a distributed and integratable manufacturing execution system framework 被引量:4
1
作者 杨浩 周娜 +1 位作者 朱剑英 罗翔 《Journal of Southeast University(English Edition)》 EI CAS 2003年第1期64-69,共6页
Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, d... Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, distributed, configurable, interoperable and maintainable. Moreover, the design patterns for the framework .are developed and a variety of functional components are designed by inheriting appropriate patterns. And then an application is constructed by invoking corresponding methods of related components. An MES system implementing the framework and design patterns can be facilely integrated with other manufacturing applications, such as enterprise resource planning (ERP) and floor control system (FCS) . 展开更多
关键词 manufacturing execution system framework design pattern distributed object-oriented remote method invocation
下载PDF
基于JavaRMI的分布计算系统的探索
2
作者 许高攀 《科技广场》 2006年第11期4-6,共3页
研究JavaRMI分布式系统结构及实现步骤,利用JavaRMI的分布式对象技术实现并行计算。
关键词 JavaRMI(Remote Method Invocation) 分布式技术 并行计算
下载PDF
Trustworthy Assurance of Service Interoperation in Cloud Environment 被引量:6
3
作者 Bing Li Bu-Qing Cao +1 位作者 Kun-Mei Wen Rui-Xuan Li 《International Journal of Automation and computing》 EI 2011年第3期297-308,共12页
Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in c... Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation. 展开更多
关键词 Quality of service (QoS) trust service discovery service interoperation service invocation success-rate cloud computing.
下载PDF
Data Transfer Over the Internet for Real Time Applications 被引量:3
4
作者 Roger Knott 《International Journal of Automation and computing》 EI 2006年第4期414-424,共11页
Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web bas... Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web based applications. The mechanism incorporates the eXtensible Markup Language (XML) and Hierarchical Data Format (HDF) to provide a flexible and efficient data format. Heterogeneous transfer data is classified into light and heavy data, which are stored using XML and HDF respectively; the HDF data format is then mapped to Java Document Object Model (JDOM) objects in XML in the Java environment. These JDOM data objects are sent across computer networks with the support of the Java Remote Method Invocation (RMI) data transfer infrastructure. Client's defined data priority levels are implemented in RMI, which guides a server to transfer data objects at different priorities. A remote monitoring system for an industrial reactor process simulator is used as a case study to illustrate the proposed data transfer mechanism. 展开更多
关键词 eXtensible Markup Language (XML) Hierarchical Data Format (HDF) Remote Method Invocation (RMI) data transfer web based application and real time
下载PDF
RMI Parameter Organization and Conversion from DELPHI to JAVA
5
作者 夏阳 《International Journal of Mining Science and Technology》 SCIE EI 1999年第2期200-202,3+204,共5页
The methods to implement RMI parameter conversion and to generate the relevant client stub and server skeleton in DAPOOL (the system for distributed application programming with object-oriented languages ) are discuss... The methods to implement RMI parameter conversion and to generate the relevant client stub and server skeleton in DAPOOL (the system for distributed application programming with object-oriented languages ) are discussed in this paper. The algorithm with which some kinds of parameter type in DELPHI language can be converted into JAVA data representation is described. And how to use the object-oriented programming method to organize a class module of parameter conversion which is clear in hierarchy, unanimous in form and easy to generate is also discussed. 展开更多
关键词 OBJECT-ORIENTED PROGRAMMING remote method invocation (RMI) JAVA DELPHI class module
下载PDF
Event-based Implicit Invocation Decentralized in Ada
6
作者 Liang Xian zhong, Wang Zhen yu Wuhan Digital Engineering Institute, P. O. Box 74223, Wuhan 430074, China 《Wuhan University Journal of Natural Sciences》 CAS 2001年第Z1期239-246,共8页
Nowadays more and more attraction is drawn by the event based implicit invocation one of useful architectural patterns, because of its loose coupling between components in the architecture and reactive integration... Nowadays more and more attraction is drawn by the event based implicit invocation one of useful architectural patterns, because of its loose coupling between components in the architecture and reactive integration in software systems. Analyzing object oriented interaction with objects, this paper, based upon the principle of software architecture, presents an approach on event based object model with Ada exception handler. Consequently it is possible for us to improve, with adding specific architectural patterns, traditional programming languages into architectural description languages. 展开更多
关键词 implicit invocation architectural pattern EBO (event based object) exception handler
下载PDF
A Jave-Based Multi-tier Distributed Object Enterprise Computing Model
7
作者 李春林 李腊元 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2001年第4期85-90,共6页
In this paper, we adopt Java platform to achieve a multi-tier distributed object enterprise computing model which provides an open, flexible, robust and cross-platform standard for enterprise applications of new gener... In this paper, we adopt Java platform to achieve a multi-tier distributed object enterprise computing model which provides an open, flexible, robust and cross-platform standard for enterprise applications of new generation. In addition to this model, we define remote server objects as session or entity objects according to their roles in a distributed application server, which separate information details from business operations for software reuse. A web store system is implement by using this multi-tier distributed object enterprise computing model. 展开更多
关键词 Distributed object computing Remote method invocation (RMI) Java Servlet.
下载PDF
Decrease of RMI Application Coupling Degree Based on Dynamic Proxy and Interceptor
8
作者 闫波 战守义 张艳 《Journal of Beijing Institute of Technology》 EI CAS 2003年第S1期109-113,共5页
Based on Java RMI framework, a new design is introduced to plug common services into RMI application without modifying the remote interface. This design improves the mechanism of RMI, which is based on dynamic proxy a... Based on Java RMI framework, a new design is introduced to plug common services into RMI application without modifying the remote interface. This design improves the mechanism of RMI, which is based on dynamic proxy and interceptor technology. The implementation of class loader and stub is custom. The design ensures both the integrity of RMI mechanism and the plug-ins of some common services that are based on component. The design improves the modularization of application and decreases the coupling degree among different modules; by this means these middle-ware's modules gain more scalability and flexibility. 展开更多
关键词 dynamic proxy INTERCEPTOR RMI (remote method invocation)
下载PDF
Construction and preliminary application of large language model for reservoir performance analysis
9
作者 PAN Huanquan LIU Jianqiao +13 位作者 GONG Bin ZHU Yiheng BAI Junhui HUANG Hu FANG Zhengbao JING Hongbin LIU Chen KUANG Tie LAN Yubo WANG Tianzhi XIE Tian CHENG Mingzhe QIN Bin SHEN Yujiang 《Petroleum Exploration and Development》 SCIE 2024年第5期1357-1366,共10页
A large language model(LLM)is constructed to address the sophisticated demands of data retrieval and analysis,detailed well profiling,computation of key technical indicators,and the solutions to complex problems in re... A large language model(LLM)is constructed to address the sophisticated demands of data retrieval and analysis,detailed well profiling,computation of key technical indicators,and the solutions to complex problems in reservoir performance analysis(RPA).The LLM is constructed for RPA scenarios with incremental pre-training,fine-tuning,and functional subsystems coupling.Functional subsystem and efficient coupling methods are proposed based on named entity recognition(NER),tool invocation,and Text-to-SQL construction,all aimed at resolving pivotal challenges in developing the specific application of LLMs for RDA.This study conducted a detailed accuracy test on feature extraction models,tool classification models,data retrieval models and analysis recommendation models.The results indicate that these models have demonstrated good performance in various key aspects of reservoir dynamic analysis.The research takes some injection and production well groups in the PK3 Block of the Daqing Oilfield as an example for testing.Testing results show that our model has significant potential and practical value in assisting reservoir engineers with RDA.The research results provide a powerful support to the application of LLM in reservoir performance analysis. 展开更多
关键词 reservoir performance analysis artificial intelligence large model application-specific large language model in-cremental pre-training fine-tuning subsystems coupling entity recognition tool invocation
下载PDF
Helium enrichment theory and exploration ideas for helium-rich gas reservoirs
10
作者 QIN Shengfei Dou Lirong +6 位作者 TAO Gang LI Jiyuan QI Wen LI Xiaobin GUO Bincheng ZHAO Zizhuo WANG Jiamei 《Petroleum Exploration and Development》 SCIE 2024年第5期1340-1356,共17页
Using gas and rock samples from major petroliferous basins in the world,the helium content,composition,isotopic compositions and the U and Th contents in rocks are analyzed to clarify the helium enrichment mechanism a... Using gas and rock samples from major petroliferous basins in the world,the helium content,composition,isotopic compositions and the U and Th contents in rocks are analyzed to clarify the helium enrichment mechanism and distribution pattern and the exploration ideas for helium-rich gas reservoirs.It is believed that the formation of helium-rich gas reservoirs depends on the amount of helium supplied to the reservoir and the degree of helium dilution by natural gas,and that the reservoir-forming process can be summarized as"multi-source helium supply,main-source helium enrichment,helium-nitrogen coupling,and homogeneous symbiosis".Helium mainly comes from the radioactive decay of U and Th in rocks.All rocks contain trace amounts of U and Th,so they are effective helium sources.Especially,large-scale ancient basement dominated by granite or metamorphic rocks is the main helium source.The helium generated by the decay of U and Th in the ancient basement in a long geologic history,together with the nitrogen generated by the cracking of the inorganic nitrogenous compounds in the basement rocks,is dissolved in the water and preserved.With the tectonic uplift,the ground water is transported upward along the fracture to the gas reservoirs,with helium and nitrogen released.Thus,the reservoirs are enriched with both helium and nitrogen,which present a clear concomitant and coupling relationship.In tensional basins in eastern China,where tectonic activities are strong,a certain proportion of mantle-derived helium is mixed in the natural gas.The helium-rich gas reservoirs are mostly located in normal or low-pressure zones above ancient basement with fracture communication,which later experience substantial tectonic uplift and present relatively weak seal,low intensity of natural gas charging,and active groundwater.Helium exploration should focus on gas reservoirs with fractures connecting ancient basement,large tectonic uplift,relatively weak sealing capacity,insufficient natural gas charging intensity,and rich ancient formation water,depending on the characteristics of helium enrichment,beyond the traditional idea of searching for natural gas sweetspots and high-yield giant gas fields simultaneously. 展开更多
关键词 reservoir performance analysis artificial intelligence large model application-specific large language model incremental pre-training fine-tuning subsystems coupling entity recognition tool invocation
下载PDF
Fault-Tolerant Mechanism of the Distributed Cluster Computers 被引量:1
11
作者 尚毅梓 靳洋 吴保生 《Tsinghua Science and Technology》 SCIE EI CAS 2007年第S1期186-191,共6页
The distributed system with high performance and stability is commonly adopted in large scale scientific and engineering computing. In this paper, we discuss a fault-tolerant mechanism under Linux circumstance to impr... The distributed system with high performance and stability is commonly adopted in large scale scientific and engineering computing. In this paper, we discuss a fault-tolerant mechanism under Linux circumstance to improve the fault-tolerant ability of the system, namely a scheme and frame to form the stable computing platform. In terms of the structure and function of the distributed system, active list and file invocation strategies are employed in the task management. System multilevel fault-tolerance can be achieved by repeated processes in a single node and task migration on multi-nodes. Manager node agent introduced in this paper administrates the nodes using the list, disposes of the tasks according to the nodes’ performance, and hence, to be able to make full use of the cluster resources. An evaluation method is proposed to appraise the performance. The analyzed results show the usefulness of the scheme proposed except for some additional overhead of memory consumption. 展开更多
关键词 distributed system active list file invocation multilevel fault-tolerance
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部