为了更好地解决分布式遥感数据检索的问题,提出了基于REST Web Services的分布式检索实现方法。根据分布式数据检索的需求和遥感数据检索系统的特点,研究了分布式数据检索的实现技术、REST的基本概念、目标与设计原则、主要思想以及实...为了更好地解决分布式遥感数据检索的问题,提出了基于REST Web Services的分布式检索实现方法。根据分布式数据检索的需求和遥感数据检索系统的特点,研究了分布式数据检索的实现技术、REST的基本概念、目标与设计原则、主要思想以及实现方式,在此基本上设计了基于REST Web Services分布式遥感数据检索原型系统,并实现了基于REST Web Services分布式遥感数据检索原型系统。展开更多
In wastewater treatment process(WWTP), the accurate and real-time monitoring values of key variables are crucial for the operational strategies. However, most of the existing methods have difficulty in obtaining the r...In wastewater treatment process(WWTP), the accurate and real-time monitoring values of key variables are crucial for the operational strategies. However, most of the existing methods have difficulty in obtaining the real-time values of some key variables in the process. In order to handle this issue, a data-driven intelligent monitoring system, using the soft sensor technique and data distribution service, is developed to monitor the concentrations of effluent total phosphorous(TP) and ammonia nitrogen(NH_4-N). In this intelligent monitoring system, a fuzzy neural network(FNN) is applied for designing the soft sensor model, and a principal component analysis(PCA) method is used to select the input variables of the soft sensor model. Moreover, data transfer software is exploited to insert the soft sensor technique to the supervisory control and data acquisition(SCADA) system. Finally, this proposed intelligent monitoring system is tested in several real plants to demonstrate the reliability and effectiveness of the monitoring performance.展开更多
In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for...In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for product data sharing of manufacturing enterprises in geographically dispersed, heterogeneous system platform. In order to integrate enterprise level product data management (PDM) system and shop floor level distributed numerical control (DNC) system, based on the description of Web services technology, a Web-services-based integration approach is presented for facilitating seamless sharing of product data between PDM and DNC systems in a networked manufacturing environment. In order to verify the validity of the proposed approach, an example-based integration development has been implemented with Java 2 Software Development Kit and Java Web Services Developer Pack in Windows 2000 Professional environment.展开更多
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces...Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.展开更多
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ...In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.展开更多
利用 .NET Web Service构建分布式异构应用平台是当今软件设计的一个热点。文章介绍了 .NET框架中基于 Web Service的分布式异构应用平台体系结构及主要的后台工作协议 XML (e Xtensible Markup L anguage,可扩展标识语言 ) ,阐述了利用...利用 .NET Web Service构建分布式异构应用平台是当今软件设计的一个热点。文章介绍了 .NET框架中基于 Web Service的分布式异构应用平台体系结构及主要的后台工作协议 XML (e Xtensible Markup L anguage,可扩展标识语言 ) ,阐述了利用 XML作为异构数据转换的中介 ,Web Service作为分布式应用的平台来实现分布式异构数据透明转换的机制。展开更多
文摘为了更好地解决分布式遥感数据检索的问题,提出了基于REST Web Services的分布式检索实现方法。根据分布式数据检索的需求和遥感数据检索系统的特点,研究了分布式数据检索的实现技术、REST的基本概念、目标与设计原则、主要思想以及实现方式,在此基本上设计了基于REST Web Services分布式遥感数据检索原型系统,并实现了基于REST Web Services分布式遥感数据检索原型系统。
基金Supported by the National Natural Science Foundation of China(61622301,61533002)Beijing Natural Science Foundation(4172005)Major National Science and Technology Project(2017ZX07104)
文摘In wastewater treatment process(WWTP), the accurate and real-time monitoring values of key variables are crucial for the operational strategies. However, most of the existing methods have difficulty in obtaining the real-time values of some key variables in the process. In order to handle this issue, a data-driven intelligent monitoring system, using the soft sensor technique and data distribution service, is developed to monitor the concentrations of effluent total phosphorous(TP) and ammonia nitrogen(NH_4-N). In this intelligent monitoring system, a fuzzy neural network(FNN) is applied for designing the soft sensor model, and a principal component analysis(PCA) method is used to select the input variables of the soft sensor model. Moreover, data transfer software is exploited to insert the soft sensor technique to the supervisory control and data acquisition(SCADA) system. Finally, this proposed intelligent monitoring system is tested in several real plants to demonstrate the reliability and effectiveness of the monitoring performance.
基金Project supported by the National Nature Science Foundation, China (Grant No60574054)Program for NewCentury Excellent Talents in University (2006) the Shanghai Science and Technology Climb Action Foundation( Grant No06DZ11202)
文摘In a networked manufacturing environment, product data integration is the foundation of collaborative manufacturing among manufacturing enterprises. It is very important to build an effective integration mechanism for product data sharing of manufacturing enterprises in geographically dispersed, heterogeneous system platform. In order to integrate enterprise level product data management (PDM) system and shop floor level distributed numerical control (DNC) system, based on the description of Web services technology, a Web-services-based integration approach is presented for facilitating seamless sharing of product data between PDM and DNC systems in a networked manufacturing environment. In order to verify the validity of the proposed approach, an example-based integration development has been implemented with Java 2 Software Development Kit and Java Web Services Developer Pack in Windows 2000 Professional environment.
文摘Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm.
文摘In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain.
文摘利用 .NET Web Service构建分布式异构应用平台是当今软件设计的一个热点。文章介绍了 .NET框架中基于 Web Service的分布式异构应用平台体系结构及主要的后台工作协议 XML (e Xtensible Markup L anguage,可扩展标识语言 ) ,阐述了利用 XML作为异构数据转换的中介 ,Web Service作为分布式应用的平台来实现分布式异构数据透明转换的机制。