首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
为了提高云计算环境下网络资源访问和调度能力,需要增强网络资源的活跃度,传统方法采用源信息系统最小方差粒子群优化算法实现资源活跃度增强调度,直接交互式多源信息的缺陷,导致信息访问的滞后和时延。提出一种基于粒子群(PSO)递阶进化的多出口网络资源活跃度增强算法,构建多出口网络资源调度和网络系统结构,粒子群进化按照属性的数据波动进行递阶分层,得到一个资源数据聚类的高密度区域,使得每一个初始种群中的个体都应有一个解,在多波束搜索PSO空间中实现粒子群PSO递阶进化,提高网络资源访问的活跃度。仿真实验表明,采用该算法,能避免粒子群在进行网络资源搜索调度过程中陷入局部最优,有效提高控制搜索精度,运行时间较短,能有效增强多出口网络资源的活跃度,进而提高了资源搜索成功率。  相似文献   

2.
嵌入权向量编码的数据库优化访问路径控制   总被引:1,自引:0,他引:1  
对网络数据库进行访问路径优化控制,提高数据访问调度能力。传统的网络数据库访问路径控制采用关联特征分析的平均互信息法进行关联维提取,当关联维特征出现独立同分布状态时,提取性能受限,导致数据库访问路径失控。提出一种嵌入权向量编码的数据库优化访问路径控制技术。计算权向量编码信息,通过权向量编码,得到数据库访问路径控制的信息增益为二叉分类回归编码信息,实现对数据库访问路径状态空间优化重组,提高控制能力。仿真实验表明,该算法进行大型网络数据库的数据访问和调度,具有较少的时间开销,提高了数据访问的吞吐量,有效提高数据库访问控制的性能,减少访问路径偏移,具有较高的特征贡献率。  相似文献   

3.
对私有云计算平台上资源最优路径匹配,实现对资源的有效调度和检测,提高资源共享能力。传统算法采用云平台的资源置换算法实现云资源目标匹配,受限于机器学习技术自身的复杂性,性能不好。提出一种基于委托管理节点角色量化合成的私有云计算平台上资源最优搜索路径匹配算法。构建私有云计算平台终端数据访问和资源调度模型,根据贪心算法的收缩原则,在资源访问管理中引入互斥锁机制以保证资源共享操作的完整性,路径匹配有向图模型,提高资源路径匹配搜索能力。以全局度量为中心节点,计算逆向追踪搜索频度,实现算法优化。仿真实验结果表明,采用该算法进行私有云计算平台上资源最优路径匹配优化,能有效提高私有云平台上的资源路径匹配准确度,从而提高资源搜索成功率,实现资源优化共享,展示优越的适用价值。  相似文献   

4.
随着Web数据库技术的发展,需要对云数据进行索引管理,提高Web数据库访问能力。传统方法采用高斯边缘化路径控制方法进行索引,在无法及时获知Web云数据的先验语义特征信息时,索引精度不高。提出一种基于自适应特征映射的云数据管理索引算法。构建云数据管理模型,提取云数据自适应特征,采用语义相似度特征分析方法实现特征映射,采用一维搜索方法进行峰值搜索,初始化数据库索引起始时间点,设置语义高斯边缘化索引复激活函数,对本层链路和跨层链路进行均衡处理,达到云数据管理和优化索引的目的。仿真结果表明,采用该算法能有效提高云数据管理索引精度,提高云数据的准确调度和访问能力。  相似文献   

5.
提出一种基于信息融合的虚拟数据分离动态云存储设计方法。构建了虚拟数据的分离动态云存储调度模型,进行信息特征提取,对提取的云存储信息特征进行信息融合处理,实现虚拟数据分离动态云存储改进设计。仿真结果表明,采用该算法进行云存储设计,能较为准确地反映虚拟数据的细节信息特征,提高数据融合精度,为实现动态分离存储提供优化索引通道,进而提高云存储中数据调度性能。  相似文献   

6.
在Petri网下构建电商虚拟机离散并行系统,海量的电子商务信息数据以云存储方式寄存在虚拟机离散并行系统中,需要对数据进行准确访问,提高电商数据调度能力。提出一种基于结构进化的Petri网下电商虚拟机数据访问方法,构建Petri网下电商虚拟机数据库模型,进行电商虚拟机数据的信号模型构建的特征信息分析,设计基于结构进化的改进的遗传算法,采用多窗谱特征提取分析电商虚拟机数据访问过程中的数据偏移,通过结构进化控制数据访问过程中的指向性分布差异,实现对电商虚拟机数据访问算法改进。仿真结果表明,采用该算法能有效实现电商虚拟机数据访问幅度特征提取,在不同虚警干扰下对Petri网下的电商虚拟机数据进行访问的数据准确检测概率较高,数据访问抗干扰能力强。  相似文献   

7.
研究GPS全球定位系统大数据库的分区方位特征分割问题,提高GPS大数据访问的抗干扰能力。传统方法采用基于块匹配的GPS大数据定位信号调度方法实现数据访问,在弱信号强干扰环境下干扰抑制能力差,算法稳健性不好。为解决这一问题,提出一种基于模式匹配的GPS大数据库分区访问特征分割算法,构建GPS大数据库数据访问模型,数据块按可靠性需求划分为若干个等级,得到储节点模块匹配模型,设计GPS大数据信息流集合划分机制,对流量信息占用概率进行特征匹配,实现GPS大数据库分区访问特征分割,通过计算数据访问的精确度和抗干扰能力等指标进行性能测试分析,仿真结果表明,采用该算法能较好地反映GPS大数据信息流的分区特征,特征分割效果较好,数据访问中抗干扰能力强,实时性好,GPS大数据定位信息访问精度较高,具有优越性。  相似文献   

8.
对层次网络数据库的敏感信息快速索引是提高数据库访问技术的基础,传统方法采用矢量模型特征聚类算法进行数据库敏感信息特征提取和索引,当数据库中的信息呈现多源化状态时,数据库索引精度不高。提出一种基于多源数据相位谱补偿的数据库索引算法。构建多源数据库模型,进行数据库访问信道分配设计,分析多源数据的相位谱特征,进行相位谱补偿实现数据库索引算法优化,仿真结果表明,采用该算法对含有多源信息特征的数据库进行信息检索和访问,信息匹配准确度较高,特征提取准确,提高数据库访问性能。  相似文献   

9.
提出一种基于标准混合蛙跳算法的ASP数据库脚本程序边缘局部搜索最优路径提取算法,在进行ASP数据库信息交互中的脚本程序边缘局部搜索最优路径提取中,把路径搜索比喻为青蛙在觅食过程的位置更新,将搜索加速因子引入族群内部的搜索策略中,一定程度上提高了算法的全局搜索能力,利用局部最优个体、局部最差个体及全局最优个体的信息实现对脚本程序边缘局部最优路径搜索算法的改进。仿真结果表明,算法在时间成本及空间成本大幅降低,加速比提高。能摆脱局部最优解的能力强,收敛速度快,通过搜索最优路径的提取,信息交互中的信息配准提高。在ASP数据信息交互中实现可靠有效的数据通信。  相似文献   

10.
通过对智能数据库的特征优化挖掘,实现特征数据融合,优化数据库分组访问信道,提高数据调度效率。当前的智能数据库特征挖掘算法采用相关度匹配的特征级联挖掘技术,当分层特征之间的具有较大的相似度时,挖掘效果不好。提出一种基于小波多窗谱提取的智能数据库特征挖掘算法。构建数据库模型,建立GMS方法以最小的代价和以最小的样本偏差来实现最高质量的样本数据集,采用粗糙概念格的生成算法进行数据流的频繁访问特征分区,构建小波函数,得到智能数据库的特征双曲调频母小波,提取数据库信息流的多窗谱特征,进行智能数据库特征挖掘算法改进。仿真结果表明,该算法进行数据库特征挖掘的运行时间较短,数据库特征挖掘精确度较高,提高了对数据库的访问和数据调度的精度和效率。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

16.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

17.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号