期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
Cloud Storage Technology and Its Applications 被引量:1
1
作者 Zhou Ke Wang Hua Li Chunhua 《ZTE Communications》 2010年第4期27-30,共4页
Cloud storage employs software that interconnects and facilitates collaboration between different types of storage devices Compared with traditional storage methods, cloud storage poses new challenges in data security... Cloud storage employs software that interconnects and facilitates collaboration between different types of storage devices Compared with traditional storage methods, cloud storage poses new challenges in data security, reliability, and management. This paper introduces four layers of cloud storage architecture: data storage layer (connecting multiple storage components), data management layer (providing common support technology for multiple services), data service layer (sustaining multiple storage applications), and user access layer. A typical cloud storage application--Backup Cloud (B-Cloud)--is examined and its software architecture, characteristics, and main research areas are discussed. 展开更多
关键词 cloud storage SERVICE backup cloud
下载PDF
The Data Warehouse Model Based on Web Service Technology
2
作者 ZHONG Luo ZHANG Kaisong +1 位作者 XIA Hongxia ZHANG Kaipeng 《通讯和计算机(中英文版)》 2005年第1期26-30,共5页
关键词 WEB服务系统 数据库 编译程序 类别支撑系统
下载PDF
Energy optimal routing for long chain-type wireless sensor networks in underground mines 被引量:12
3
作者 Jiang Haifeng Qian Jiansheng +1 位作者 Sun Yanjing Zhang Guoyong 《Mining Science and Technology》 EI CAS 2011年第1期17-21,共5页
无线传感器网络是到存在在地下的矿监视系统的有用补充。他们起监视系统的安全提高和改善范围和灵活性的一个重要作用。对在在地下的矿的灾难以后的危险和环境敏感的区域要求节点的节省并且平衡的精力消费延长网络的 lifespan。基于一... 无线传感器网络是到存在在地下的矿监视系统的有用补充。他们起监视系统的安全提高和改善范围和灵活性的一个重要作用。对在在地下的矿的灾难以后的危险和环境敏感的区域要求节点的节省并且平衡的精力消费延长网络的 lifespan。基于一条隧道的结构,我们在场一个长链类型无线传感器网络(LC-WSN ) 掘监视地下的矿的安全。我们定义最佳的传播距离和关键区域和礼品的范围为 LC-WSN 到的一个精力最佳的路由(EOR ) 算法平衡节点的精力消费并且最大化网络的 lifespan。EOR 基于最佳的传播距离构造路由路径并且使用在关键区域平衡策略的一个精力。模拟结果证明 EOR 算法扩大一个网络的 lifespan,在关键区域平衡节点的精力消费并且有效地限制路由路径的长度,与类似的算法相比。 展开更多
关键词 无线传感器网络 网络路由 地下矿井 能量最优 链型 安全监测系统 能量平衡 网络寿命
下载PDF
Prime Factorization in the Duality Computer 被引量:8
4
作者 WANG Wan-Ying SHANG Bin +1 位作者 WANG Chuan LONG Gui-Lu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第3期471-473,共3页
我们把算法给 factorize 在两重性计算机的大整数。Weprovide 为因式分解的三个两重性算法基于一个天真的因式分解方法,在量计算的 Shoralgorithm,和 Fermat “在古典计算的 s 方法。所有这些算法可以是在输入尺寸的多项式。
关键词 素数 因式分解 波粒二相机 量子干涉
下载PDF
A New Design and Implementation of an Attendance Checking Node for Coal Mines 被引量:4
5
作者 XIA Shi-xiong QIAO Da-lei CHEN Dai ZHOU Yong 《Journal of China University of Mining and Technology》 EI 2007年第2期193-196,共4页
A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed... A novel design and implementation of an attendance checking node for coal mines based on the CAN bus is presented in this paper. Hardware circuits and programming methods for the attendance checking node are discussed,including the single-chip computer with CAN controller AT89C51CC03,the CAN bus transceiver TJA1050,the large capacity DataFlash memory,the real-time clock DS1302,the voice chip ISD2560 and the card-reading circuit in Wie-gand format. All the extended hardware satisfies the requirements for intrinsically safe circuits (GB3836.4-2000) and intrinsically safe authentication promoted by the national explosion-proof institute. Further,the software programming methods for the CAN controller (AT89C51CC03) and the implementation of the CAN communications protocol are presented as well. 展开更多
关键词 煤矿 校核密码 信息传递 矿山安全 局域控制
下载PDF
Mine-hoist fault-condition detection based on the wavelet packet transform and kernel PCA 被引量:3
6
作者 XIA Shi-xiong NIU Qiang ZHOU Yong ZHANG Lei 《Journal of China University of Mining and Technology》 EI 2008年第4期567-570,共4页
A new algorithm was developed to correctly identify fault conditions and accurately monitor fault development in a mine hoist. The new method is based on the Wavelet Packet Transform (WPT) and kernel PCA (Kernel Princ... A new algorithm was developed to correctly identify fault conditions and accurately monitor fault development in a mine hoist. The new method is based on the Wavelet Packet Transform (WPT) and kernel PCA (Kernel Principal Compo- nent Analysis, KPCA). For non-linear monitoring systems the key to fault detection is the extracting of main features. The wavelet packet transform is a novel technique of signal processing that possesses excellent characteristics of time-frequency localization. It is suitable for analysing time-varying or transient signals. KPCA maps the original input features into a higher dimension feature space through a non-linear mapping. The principal components are then found in the higher dimen- sion feature space. The KPCA transformation was applied to extracting the main nonlinear features from experimental fault feature data after wavelet packet transformation. The results show that the proposed method affords credible fault detection and identification. 展开更多
关键词 PCA KPCA 断层探测 矿山开采
下载PDF
The Frame of DFL Programming Language 被引量:2
7
作者 Xiaofang Zhao Fanzhang Li 《通讯和计算机(中英文版)》 2006年第1期1-15,共15页
关键词 操作语言 编程语言 防火墙 计算机技术
下载PDF
A novel algorithm for routing and wavelength assignment considering the load balancing 被引量:1
8
作者 QI Xiao-gang LIU Li-fang LIU San-yang 《通讯和计算机(中英文版)》 2009年第7期26-29,共4页
关键词 电子邮件 RAW WDM 计算机网络 通信
下载PDF
Ontology-based P2P infrastructure for Web GIS services 被引量:1
9
作者 HUANG Zhi-qiang XIONG Hai-jun JU Shu-chun 《通讯和计算机(中英文版)》 2008年第10期23-27,36,共6页
关键词 P2P技术 网络技术 网站 GIS服务
下载PDF
FFT-DMAC: a tone based DMAC protocol
10
作者 李蓥 Li Mingtu +1 位作者 Shu Wei Wu Minyou 《High Technology Letters》 EI CAS 2009年第3期301-308,共8页
This paper presents the flip-flop tone(FFT)DMAC protocol,a tone based MAC protocol using di-rectional antennas to solve the deafness problem,hidden terminal and exposed terminal problems simulta-neously.It uses two pa... This paper presents the flip-flop tone(FFT)DMAC protocol,a tone based MAC protocol using di-rectional antennas to solve the deafness problem,hidden terminal and exposed terminal problems simulta-neously.It uses two pairs of flip-flop tones .The first pair of tone is to send omni-directionally to reachevery neighboring node to announce the start and the end of communication,and therefore to alleviate thedeafness problem.The second pair of tone is to send directionally towards the sender.It is used to solvethe hidden terminal problem as well as the exposed terminal problem.Evaluation shows that FFT-DMACcan achieve better performance compared to the 802 .11 and ToneDMAC protocol. 展开更多
关键词 MAC协议 DMAC 付费 音调 基础 DMA控制器 暴露终端 隐藏终端
下载PDF
ROUTING AND WAVELENGTH ASSIGNMENT ALGORITHMS BASED ON EQUIVALENT NETWORKS
11
作者 Qi Xiaogang Liu Lifang Liu Sanyang 《Journal of Electronics(China)》 2006年第5期723-730,共8页
In this paper, a Wavelength Division Multiplexing (WDM) network model based on the equivalent networks is described, and wavelength-dependent equivalent arc, equivalent networks, equivalent multicast tree and some oth... In this paper, a Wavelength Division Multiplexing (WDM) network model based on the equivalent networks is described, and wavelength-dependent equivalent arc, equivalent networks, equivalent multicast tree and some other terms are presented. Based on this model and relevant Routing and Wavelength Assign- ment (RWA) strategy, a unicast RWA algorithm and a multicast RWA algorithm are presented. The wave- length-dependent equivalent arc expresses the schedule of local RWA and the equivalent network expresses the whole topology of WDM optical networks, so the two algorithms are of the flexibility in RWA and the optimi- zation of the whole problem. The theoretic analysis and simulation results show the two algorithms are of the stronger capability and the lower complexity than the other existing algorithms for RWA problem, and the complexity of the two algorithms are only related to the scale of the equivalent networks. Finally, we prove the two algorithms’ feasibility and the one-by-one corresponding relation between the equivalent multicast tree and original multicast tree, and point out the superiorities and drawbacks of the two algorithms respectively. 展开更多
关键词 波长分割多路技术WDM光学网络 波长依靠等价弧 等效网络 等效多点传送树
下载PDF
Concept Lattice Construction through the Composition and Decomposition of Formal Contexts
12
作者 QI Jian-Jun WEI Ling LIU Wei 《浙江海洋学院学报(自然科学版)》 CAS 2010年第5期488-493,共6页
The purpose of this paper is to study the construction of concept lattice from variable formal contexts.Composition and decomposition theories are proposed for the unraveling of concept lattice from contexts with vari... The purpose of this paper is to study the construction of concept lattice from variable formal contexts.Composition and decomposition theories are proposed for the unraveling of concept lattice from contexts with variable attribute set in the process of information updating.The relationship between the extension sets of the original context and that of its sub-context is analyzed.The composition and decomposition theories are then generalized to the situation involving more than two sub-contexts and the situation with variable attribute set and object set. 展开更多
关键词 Knowledge discovery Concept lattice COMPOSITION DECOMPOSITION Data updating
下载PDF
An entropy-based stability QoS routing with priority scheduler in MANET using fuzzy controllers
13
作者 GUI Chao 《通讯和计算机(中英文版)》 2007年第3期52-54,共3页
关键词 模糊控制器 优先调度程序 移动特别网络 服务质量 邮件路由 QOS
下载PDF
Case Study of Service Oriented Enterprise Architecture Framework
14
作者 Nassir Dino Awel Dico +1 位作者 Dida Midekso Worku Alemu 《Computer Technology and Application》 2012年第3期240-249,共10页
关键词 面向服务架构 企业组织 框架 建筑风格 SOA 核心服务 组成部分 组织结构
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部