首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
提出一种基于动态密钥双向认证的云平台环境下网络交互数据加密算法,并进行隐私保护设计。构建云平台环境下的数据交互节点拓扑模型,通过部分链路失效多路径加密方法使得数据聚集具有很高的容错功能。对云平台环境下的未加密比特序列的识别率进行分解,构建副本-感知的数据聚集容错机制,将随机抽样原理引入到比特序列信息的提取过程,实现隐私保护。仿真实验表明,该算法对加密数据具有较好的纠错性能,通信量和吞吐量提高,能实现对隐私数据的全时态跟踪监测,预测值与实际值匹配较好,隐私保护安全性较高,具有较好的工程应用价值。  相似文献   

2.
提出一种面向决策树目标路径编码的相空间嵌入维计算优化算法。构建云平台环境下的数据交互节点拓扑模型,通过部分链路失效多路径加密方法使得数据聚集具有很高的容错功能,然后采用决策树目标路径编码方案,在给定带宽约束和量化阈值的情况下,对决策树目标路径编码的相空间嵌入维数据进行自适应的量化分解,以实现对决策树目标路径编码的相空间嵌入维的准确估计,降低误码率。仿真结果表明,该算法能准确估计相空间嵌入维,提高估计精度,能有效降低误码率,提高数据动态交互通信的准确性,信号保真度较高。展示了其优越性和较好的应用价值。  相似文献   

3.
突发浪涌数据下差异云平台数据间的关联性破坏概率逐渐增加,降低了数据在冗余环境下查询效率。按照突发浪涌数据下云平台的弱关联数据调度特征,通过基于Apriori的弱关联数据挖掘方法,采集突发浪涌数据下差异云平台的弱关联数据,通过改进离散粒子群算法优化任务节点数字串的编码形式,实现数据调度任务,对粒子位置更新公式进行优化,采用优化离散粒子群算法进行节点寻优,获取最佳调度节点集,实现突发浪涌数据下差异云平台的弱关联数据调度。实验结果表明,该调度方案能够优化云平台资源的使用效率和服务响应时间,提高了总执行效率,节省了云资源,具有较高的节能开销比和用户满意度。  相似文献   

4.
提出一种基于动态特征K-Means聚类的云计算中多源信息资源平台兼容性路由算法,构建了云计算环境下的多源信息资源通信模型,进行多源信息资源云分析及模型构建,基于动态特征K-Means聚类进行多源信息资源的平台的兼容性特征值挖掘与匹配。仿真结果表明,采用该算法进行云计算环境下的多源信息资源平台兼容路由设计,能提高了云计算平台资源使用效率,降低了CPU负载,节省了计算开销和通信开销,在云平台资源调度等领域就有较高的应用价值。  相似文献   

5.
对私有云计算平台上资源最优路径匹配,实现对资源的有效调度和检测,提高资源共享能力。传统算法采用云平台的资源置换算法实现云资源目标匹配,受限于机器学习技术自身的复杂性,性能不好。提出一种基于委托管理节点角色量化合成的私有云计算平台上资源最优搜索路径匹配算法。构建私有云计算平台终端数据访问和资源调度模型,根据贪心算法的收缩原则,在资源访问管理中引入互斥锁机制以保证资源共享操作的完整性,路径匹配有向图模型,提高资源路径匹配搜索能力。以全局度量为中心节点,计算逆向追踪搜索频度,实现算法优化。仿真实验结果表明,采用该算法进行私有云计算平台上资源最优路径匹配优化,能有效提高私有云平台上的资源路径匹配准确度,从而提高资源搜索成功率,实现资源优化共享,展示优越的适用价值。  相似文献   

6.
张海霞 《科技通报》2015,(2):176-178
大型云计算联合服务器中故障节点的快速挖掘模型构建可以实现对云服务器故障的准确定位和检测。传统方法中采用协议堆栈对节点进行约束与管理,达到故障节点快速挖掘的目的,然而该算法在Sink节点位置部署考虑欠好,在通信传输中很容易相邻节点信道间频谱主瓣重叠,故障节点挖掘性能不好。针对这一问题,提出一种基于正交通信信道载波均衡的云计算联合服务器故障节点快速挖掘算法,建立故障节点信息融合模型,进行特征分析,在信息融合过程中,组成新的云计算联合服务器接收端和发射端故障节点定位训练序列,构建基于OFDM系统的等效基带故障节点挖掘模型,通过正交通信信道载波均衡实现云服务器故障节点的快速挖掘。仿真结果表明,该算法在复杂云计算环境下,能实现对故障节点的准确定位,挖掘性能较高,检测概率较高,优越于传统模型。  相似文献   

7.
云计算数据预取算法设计是实现云平台环境下通信链路优化和任务调度均衡分配的基础技术。在传统的云计算据查询模式下,当由于缓存空间不足而导致新的缓存数据无法进入缓存时,导致数据预取拥堵,性能不好。提出一种基于Monte Carlo熵权决策的云计算数据预取算法,构建云计算数据查询模板模型,进行Hybrid缓存置换数据预取前置处理,采用Monte Carlo熵权决策方法,把云计算预取信号从缓存域变换到波束域,构建置换函数,实现了对算法的改进。仿真实验研究得出,该算法通过熵权特征提取,进行云计算数据预取决策,提高了云计算数据预取性能,大数据访问延迟率降低,云计算数据存取和调度效率提高,保真率较好。  相似文献   

8.
在云计算环境中,研究第三方互联网支付平台的电子支付密钥数据频度隐匿算法,提高密钥的安全性和可靠性。传统的电子支付密钥的数据频度隐匿算法采用威胁树风险评估模型,容易受到病毒攻击导致密钥失效。提出一种基于群签名和椭圆曲线加密的云计算中电子支付密钥的数据频度隐匿算法。构建云计算中电子支付系统总体设计模型,通过交易数据频度、交易数据深度和交易数据索引特性为特征进行云计算融合处理,由此预测出不同时间片内用户的任务提交规律以及用户期望完成时间,通过对混合云的特征压缩处理,得到压缩特征的熵编码结果,结合云计算的虚拟化技术建立一种基于群签名和椭圆曲线加密的电子支付系统密钥数据频度特征分解方案,实现数据频度隐匿算法改进。仿真结果表明,隐匿性和加密性能较好,保证了电子支付密钥的加密可靠性和不可识别性,为用户识别和选择第三方支付工具提供了一定的参考依据。  相似文献   

9.
在云计算构建下实现对旅游信息的优化调度,提高旅游资源数据的开发和利用效率。传统的旅游信息资源采用经验模态分解的调度算法,通过人工分区实现信息资源的调度模型具有随机性和无组织性,资源分配效率不高。提出一种基于逆模型参数预失真估计的云计算架构下旅游信息资源优化调度模型。设计旅游资源信息调度网络,云计算构架的逆模型网络结构采用BP网络的输出结构,训练包括前向传播信息,反向传播误差两个过程。设计循环堆栈的约束指向矢量,使旅游资源信息调度网络的路由节点的资源分配输出误差最小。采用三亚的5个旅游景点作为研究对象,以2003~2014年度的游客数据作为模型参量,仿真结果表明,模型对旅游资源的融合性能较好,有效剔除簇内非相干数据,提高数据融合效率,分层调度融合度能达到90%以上,优化调度性能优越。  相似文献   

10.
提出一种基于最大熵功率谱估计的Hadoop云平台下网络音视频数据特征挖掘方法,实现对数据信息的高速访问。构建数据挖掘Hadoop云平台和数据挖掘访问模型,设计最大熵功率谱特征提取算法,采用分段思想将同一时间段的视音频数据进行群体分割,分段提取最大熵功率谱特征。将提取的特征信息进行维度匹配分箱和溯源处理,实现信息恢复,最终完成高速数据访问。仿真测试表明,该算法能有效地实现对网络音视频数据的特征挖掘,提高访问效率,访问响应时间较当前方法缩短明显。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

14.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

15.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

16.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

17.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号