期刊文献+
共找到166篇文章
< 1 2 9 >
每页显示 20 50 100
基于WebOLTP的应用信息系统设计 被引量:1
1
作者 沈镇林 罗伟其 姚国祥 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 1998年第A10期109-112,共4页
阐述了如何改造和迁移两层客户/服务器体系结构的应用信息系统,设计和实现了基于Web。
关键词 服务器 OLTP 体系结构 服器 WEB 应用信息系统
下载PDF
高清视频多路传输系统的设计与实现 被引量:4
2
作者 张硕 王中刊 赵旦峰 《电子技术与软件工程》 2017年第13期44-45,共2页
将视频监控系统与互联网技术结合,在安防监控背景下设计高清视频传输系统。系统设计分为三个部分。视频采集编码端采用Hi3516D处理器实现视频的H.265硬编码。流媒体服务器端选择在阿里云平台基于Easy Darwin开源流媒体框架进行开发和设... 将视频监控系统与互联网技术结合,在安防监控背景下设计高清视频传输系统。系统设计分为三个部分。视频采集编码端采用Hi3516D处理器实现视频的H.265硬编码。流媒体服务器端选择在阿里云平台基于Easy Darwin开源流媒体框架进行开发和设计。客户端设计多路播放器实现视频的播放。实现客户端通过网络实时观看多路摄像头的视频画面。 展开更多
关键词 H.26 5/HEVC HI 3 51 6D 流媒体服器 高清视频 传输系统
下载PDF
Data Conversion Among Different Databases Under an Integrated Network Environment 被引量:2
3
作者 梁允荣 高玮玲 杨茜 《Journal of Beijing Institute of Technology》 EI CAS 2001年第2期209-214,共6页
Method for data conversion of heterogeneous DBMS's in the integrated network environment is introduced. The technical approach used can perform data conversion of heterogeneous databases located on different nodes... Method for data conversion of heterogeneous DBMS's in the integrated network environment is introduced. The technical approach used can perform data conversion of heterogeneous databases located on different nodes of the network, such as Oracle, Sybase, Informix, MS SQL Server, SQL Anywhere and Foxpro. The conversion system adopts the Client/Server architecture and provides visual integrated interface for users. 展开更多
关键词 heterogeneous DB data conversion CLIENT/SERVER visual interface
下载PDF
Design and implementation of a new special storage server
4
作者 韩德志 谢长生 +1 位作者 傅湘林 刘春 《Journal of Southeast University(English Edition)》 EI CAS 2004年第1期36-42,共7页
To improve I/O speed and system performance of network storage devices, a special storage server that is an iSCSI-based network-attached storage server (iSCSI-based network-attached storage server, for short iNAS) is ... To improve I/O speed and system performance of network storage devices, a special storage server that is an iSCSI-based network-attached storage server (iSCSI-based network-attached storage server, for short iNAS) is designed. The iNAS can provide both the file I/O and the block I/O services by an iSCSI module, and it converges with the NAS and the SAN (storage area network). The iNAS improves the I/O speed by the direct data access (zero copy) between the RAID (redundant array of inexpensive disks) controller and the user-level memory. The iNAS integrates the multi-RAID for a single storage pool by a multi-stage stripping device driver, and it implements the storage virtualization. In the experiments, the iNAS has ultra-high-throughput for both the file I/O requests and the block I/O requests. 展开更多
关键词 Input output programs INTERNET UNIX
下载PDF
PERFORMANOE EVALUATION OF HT-7 DATA PROOESSING SYSTEM
5
作者 舒炎泰 金志刚 刘根成 《Transactions of Tianjin University》 EI CAS 1999年第1期7-11,共5页
This paper describes the RTSS simulation-based performance evaluation method during the upgrade of the HT-7 data processing system to a distributed environment. We present the main concepts and steps of the method. Qu... This paper describes the RTSS simulation-based performance evaluation method during the upgrade of the HT-7 data processing system to a distributed environment. We present the main concepts and steps of the method. Queueing modeling and steady-state operational analysis techniques are also used for analytic modeling. Both simulation and analysis studies on the HT-7 data processing system indicate that in comparison with conventional time-shared systems,a client/server system can significantly reduce the completion time of raw data display,real-time data processing and data transfer in the online system,raise the workload capacity and reduce the average waiting time of the off-line system. 展开更多
关键词 data processing system C/S (client/server ) PERFORMANCE
下载PDF
Research on web service wrapping for command line programs
6
作者 季光 韩燕波 +1 位作者 王菁 陈旺虎 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期284-288,共5页
A web service wrapping approach for command line programs,which are commonly used in scientific computing,is proposed.First,software architecture for a basic web service wrapper implementation is given and the functio... A web service wrapping approach for command line programs,which are commonly used in scientific computing,is proposed.First,software architecture for a basic web service wrapper implementation is given and the functions of the main components are explained.Then after a comprehensive analysis of data transmission and a job life cycle model,a novel proactive file transmission and job management mechanism is devised to enhance the software architecture,and the command line programs are wrapped into web services in such a way that they can efficiently transmit files,supply instant status feedback and automatically manage the jobs.Experiments show that the proposed approach achieves higher performance with less memory usage compared to the related work, and the usability is also improved.This work has already been put into use in a production system of scientific computing and the data processing efficiency of the system is greatly improved. 展开更多
关键词 service-oriented computing scientific computing web service wrapping web service wrapper
下载PDF
出土文献与典籍诠释一则
7
作者 李俊涛 《汉字汉语研究》 2023年第1期58-62,127,共6页
《韩非子》中有句作“好宫室台榭陂池,事车服器玩好”,其中后半句“事车服器玩好”似脱漏一字,应为竹简传抄过程中脱了重文符号,当补一个“服”字,为“事车服服器玩好”。“服器”为祭祀用品,“车服”“服器”“玩好”典籍中多见,这里... 《韩非子》中有句作“好宫室台榭陂池,事车服器玩好”,其中后半句“事车服器玩好”似脱漏一字,应为竹简传抄过程中脱了重文符号,当补一个“服”字,为“事车服服器玩好”。“服器”为祭祀用品,“车服”“服器”“玩好”典籍中多见,这里为三个名词词组组成并列结构,与上句相呼应。 展开更多
关键词 重文 车服 服器
下载PDF
基于Modbus/TCP的WinCC食品配料控制系统
8
作者 钟华 《可编程控制器与工厂自动化(PLC FA)》 2008年第12期114-120,共7页
本文主要介绍了以西门子WinCC、S7-200PLC、变频器和减速电机为核心所组成的全自动食品配料管控一体化解决方案,着重阐述了系统的设计思想、架构组成、功能、性能及特点;应用实践表明,系统大大地提高了工厂的自动化程度、食品安全性和... 本文主要介绍了以西门子WinCC、S7-200PLC、变频器和减速电机为核心所组成的全自动食品配料管控一体化解决方案,着重阐述了系统的设计思想、架构组成、功能、性能及特点;应用实践表明,系统大大地提高了工厂的自动化程度、食品安全性和配料准确性,减轻了劳动强度,实现了配料加工由手工化、机械化向信息化、智能化的跳跃式发展,具有广阔的应用前景。 展开更多
关键词 配料系统 食品安全 视窗控制中心 OPC server MODBUS/TCP
下载PDF
世界建筑遗产的保护 被引量:2
9
作者 许昊皓 黄子云 《中外建筑》 2012年第8期10-11,共2页
时间:2012/7/10星期五晚19:00地点:湖南大学建筑学院一楼大报告厅主讲人:黄运昇Y.S.Huang美国弗吉尼亚大学终身教授主持人:陈飞虎教授,湖南大学建筑学院副院长/博导在2012年春季学期即将结束时,来自美国弗吉尼亚大学的黄运昇教授... 时间:2012/7/10星期五晚19:00地点:湖南大学建筑学院一楼大报告厅主讲人:黄运昇Y.S.Huang美国弗吉尼亚大学终身教授主持人:陈飞虎教授,湖南大学建筑学院副院长/博导在2012年春季学期即将结束时,来自美国弗吉尼亚大学的黄运昇教授访问了湖南大学建筑学院,并为师生带来了一场有关"世界建筑遗产保护"的学术讲座。从巴黎圣母院到中国的长城,从法国的雨果(Hugo)到西班牙的梅里美(ProsperMerimee),黄教授深入浅出的讲述了世界建筑遗产保护的起源、发展和现状。西方建筑遗产保护的思想起源于雨果等一些著名的作家的思考,如雨果认为不管未来的建筑是怎样的,新建的建筑不能割裂历史。梅里美不仅仅是一位文学家。 展开更多
关键词 建筑遗产保护 世界 美国弗吉尼亚大学 建筑学院 湖南大学 巴黎圣母院 学术讲座 主持人
下载PDF
Determination of Astragaloside IV in Yupingfeng Oral Solution by HPLC-ELSD Method
10
作者 王建舫 张倩 穆祥 《Agricultural Science & Technology》 CAS 2015年第2期197-199,共3页
[Objective] This study aimed to establish a method for determining the content of Astragaloside IV in Yupingfeng oral solution.[Method] The HPLC-ELSD method was adopted.The chromatographic column was Venusil MP(4.6 m... [Objective] This study aimed to establish a method for determining the content of Astragaloside IV in Yupingfeng oral solution.[Method] The HPLC-ELSD method was adopted.The chromatographic column was Venusil MP(4.6 mm × 150 mm,5 μm).The mobile phase was acetonitrile-water(35∶65).The ELSD evaporator tube temperature was 65 ℃.N2 was used as the carrier gas(pressure,30 psi).[Result] When the content of Astragaloside IV ranged from 0.5 to 5.0 μg,the Astragaloside IV content showed a good linear relationship with peak area(r=0.999,n=6).The average recovery was 96.36%,and the RSD was 2.46%.[Conclusion] This method is accurate and reliable,and can be applied in the quality control of Yupingfeng oral solution. 展开更多
关键词 HPLC ELSD Yupingfeng oral solution Astragaloside IV
下载PDF
CIT/XML Security Platform Syntax and Processing 被引量:1
11
作者 安南 张申生 《Journal of Southeast University(English Edition)》 EI CAS 2002年第2期108-113,共6页
Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made availabl... Today companies and organizations are using the Web as the main informationdissemination means both at internal and external level. Information dissemination often takes theform of XML documents that are made available at Web servers, or that are actively broadcasted byWeb servers to interested clients. These documents often contain information at different degrees ofsensitivity, therefore a strong XML security platform and mechanism is needed. In this paper wedeveloped CIT/XML security platform and take a close look to syntax and processing of CIT/digitalsignature model, CIT/encryption model, CIT/smart card crypto and SPKI interface security models.Security services such as authentication, integrity and confidentiality to XML documents and non-XMLdocuments, which exchanged among various servers, are provided. 展开更多
关键词 electronic commerce security digital certificates smart card digitalcommerce AUTHENTICATION SPKI XML
下载PDF
A hybrid DVE architecture based on temp server
12
作者 吴言华 蔡云泽 许晓鸣 《Journal of Southeast University(English Edition)》 EI CAS 2006年第2期180-184,共5页
A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The... A hybrid distributed virtual environment (DVE) architecture is presented by importing a peer-to-peer (P2P) idea into the traditional client/server (C/S) architecture to improve the DVE system's scalability. The mathematical model of the overload of the center server was built and a series of simulation experiments were performed to validate the conclusions. When the client number increases to a certain value, the hybrid architecture can reduce server overload with some special clients (temp servers) selected with a certain heuristic strategy. With this architecture, the DVE system can support more system clients with the same server hardware than the C/S architecture can. The server overload "pulse" phenomena causing by the exiting of the temp server can be resolved by adopting a more optimized temp server selecting strategy and by reducing the child client capability of the temp server. By combining the advantages of the C/S architecture and the P2P architecture, the hybrid DVE architecture can effectively improve the scalability of the DVE system. This is validated by theoretical analysis and simulation experiments. 展开更多
关键词 distributed virtual environment temp server user scale PEER-TO-PEER CLIENT/SERVER
下载PDF
Steiner Tree Based Optimal Resource Caching Scheme in Fog Computing 被引量:11
13
作者 SU Jingtao LIN Fuhong +1 位作者 ZHOU Xianwei Lü Xing 《China Communications》 SCIE CSCD 2015年第8期161-168,共8页
Fog Computing is a new platform that can serve mobile devices in the local area. In Fog Computing, the resources need to be shared or cached in the widely deployed Fog clusters. In this paper, we propose a Steiner tre... Fog Computing is a new platform that can serve mobile devices in the local area. In Fog Computing, the resources need to be shared or cached in the widely deployed Fog clusters. In this paper, we propose a Steiner tree based caching scheme, in which the Fog servers, when caching resources, first produce a Steiner tree to minimize the total path weight(or cost) such that the cost of resource caching using this tree could be minimized. Then we give a running illustration to show how the Fog Computing works and we compare the traditional shortest path scheme with the proposed one. The outcome shows that the Steiner tree based scheme could work more efficiently. 展开更多
关键词 steiner Tree resource caching fogcomputing ARCHITECTURE
下载PDF
遗传算法优化BP神经网络在中医按摩机器人中的应用 被引量:8
14
作者 张秋云 张营 李臣 《应用科技》 CAS 2017年第2期73-77,共5页
针对中医按摩设备的临床需求,研制了一种基于多种按摩手法的中医按摩机器人系统。同时,为了提高中医按摩机器人穴位寻找行为规划的精度,提出了一种基于遗传算法优化BP神经网络的中医按摩机器人穴位坐标预测方法,利用遗传算法弥补BP神经... 针对中医按摩设备的临床需求,研制了一种基于多种按摩手法的中医按摩机器人系统。同时,为了提高中医按摩机器人穴位寻找行为规划的精度,提出了一种基于遗传算法优化BP神经网络的中医按摩机器人穴位坐标预测方法,利用遗传算法弥补BP神经网络的缺陷,提高神经网络的预测精度,求解出最优解,保证了中医按摩机器人对患者做出精确的按摩治疗行为决策。并对上述方法进行了实现与仿真,结果表明,该方法对中医按摩机器人寻找患者穴位坐标具有较好的精度和较高的预测准确性。 展开更多
关键词 中医按摩机器人 行为规划 穴位寻找 遗传算法 神经网络
下载PDF
Interactive Web service choice-making based on extended QoS model 被引量:3
15
作者 MOU Yu-jie CAO Jian ZHANG Shen-sheng ZHANG Jian-hong 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期483-492,共10页
Quality of Service (QoS) is a key factor in Web service advertising, choosing and runtime monitoring. Web service QoS is multi-faceted, fuzzy and dynamic. Current researches focus on implementation level performance a... Quality of Service (QoS) is a key factor in Web service advertising, choosing and runtime monitoring. Web service QoS is multi-faceted, fuzzy and dynamic. Current researches focus on implementation level performance assurance, ignoring domain specific or application level metrics which are also very important to service users. Industry Web service standards lack QoS expression. The support for QoS based service choice-making is very limited. We proposed an extended Web service QoS model based on configurable fuzzy synthetic evaluation system. Web service QoS is evaluated dynamically according to the service context. A QoS requirement description model is also given for service QoS requirement definition. An interactive Web service choice-making process is described, which takes QoS as a key factor when choosing from functionally equivalent services. 展开更多
关键词 Quality of Service (QoS) Web service Choice-making Fuzzy synthetic evaluation
下载PDF
Web-based interactive visualization of 3D video mosaics using X3D standard 被引量:2
16
作者 CHON Jaechoon LEE Yang-Won SHIBASAKI Ryosuke 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第7期1259-1265,共7页
We present a method of 3D image mosaicing for real 3D representation of roadside buildings, and implement a Web-based interactive visualization environment for the 3D video mosaics created by 3D image mosaicing. The 3... We present a method of 3D image mosaicing for real 3D representation of roadside buildings, and implement a Web-based interactive visualization environment for the 3D video mosaics created by 3D image mosaicing. The 3D image mo- saicing technique developed in our previous work is a very powerful method for creating textured 3D-GIS data without excessive data processing like the laser or stereo system. For the Web-based open access to the 3D video mosaics, we build an interactive visualization environment using X3D, the emerging standard of Web 3D. We conduct the data preprocessing for 3D video mosaics and the X3D modeling for textured 3D data. The data preprocessing includes the conversion of each frame of 3D video mosaics into concatenated image files that can be hyperlinked on the Web. The X3D modeling handles the representation of concatenated images using necessary X3D nodes. By employing X3D as the data format for 3D image mosaics, the real 3D representation of roadside buildings is extended to the Web and mobile service systems. 展开更多
关键词 3D video mosaics Interactive 3D visualization Web 3D
下载PDF
CONSTRUCTION OF PROXY BLIND SIGNATURE SCHEME BASED ON MULTI-LINEAR TRANSFORM 被引量:3
17
作者 ZhaoZemao LiuFengyu 《Journal of Electronics(China)》 2004年第6期505-510,共6页
A general method of constructing proxy blind signature is proposed based on multilinear transform. Based on this method, the four proxy blind signature schemes are correspondently generated with four different signatu... A general method of constructing proxy blind signature is proposed based on multilinear transform. Based on this method, the four proxy blind signature schemes are correspondently generated with four different signature equations, and each of them has four forms of variations of signs. Hence there are sixteen signatures in all, and all of them are proxy stronglyblind signature schemes. Furthermore, the two degenerated situations of multi-linear transform are discussed. Their corresponding proxy blind signature schemes are shown, too. But some schemes come from one of these degenerate situations are proxy weakly-blind signature scheme.The security for proposed scheme is analyzed in details. The results indicate that these signature schemes have many good properties such as unforgeability, distinguish-ability of proxy signature,non-repudiation and extensive value of application etc. 展开更多
关键词 Digital signature Proxy blind signature Multi-linear transform
下载PDF
A Practical SSL Server Performance Improvement Algorithm Based on Batch RSA Decryption 被引量:2
18
作者 李世群 吴永东 +1 位作者 周建英 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期67-70,共4页
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa... The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4. 展开更多
关键词 batch decryption secure socket layer (SSL) server public key algorithm
下载PDF
Security enhancement of WAPI access authentication protocol (WAI) 被引量:2
19
作者 刘永磊 金志刚 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期42-46,共5页
In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities o... In this paper, the current known attack methods against WAI and the improvements of WAI called WAI' were analyzed. Through analyzing the unicast key agreement protocol in the WAI' by CPN model, the vulnerabilities of WAI' were found out. The improvement of WAI' was made and a new protocol called WAI' - E was proposed. The WAI' -E was combined with the key exchange mechanism of Diffie-HeUman based on el- liptic curve cryptography. Moreover, by using CK mode, it is the fact that WAI'-E was SK-secure with PFS and was nrovided with inde^nendant sacuritv ,f cartifient~ mlthentientinn wn~ nravgd 展开更多
关键词 WLAN WLAN Authentication and Privacy Infrastructure Colored Petri Nets CK model
下载PDF
SECURITY ANALYSIS AND IMPROVEMENT OF A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME 被引量:2
20
作者 Lu Rongbo He Dake Wang Chanji 《Journal of Electronics(China)》 2008年第3期372-377,共6页
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. How... Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed. 展开更多
关键词 Proxy signature Threshold proxy signature Multi-proxy multi-signature Forgery attack
下载PDF
上一页 1 2 9 下一页 到第
使用帮助 返回顶部