首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 153 毫秒
1.
基于OPC技术的上位监控机与PLC的通信程序设计   总被引:2,自引:0,他引:2  
介绍了OPC技术和OPC数据访问方式,分析了OPC对象的分层结构.本文综合四种OPC数据访问方式的特点,分析了此通信程序所采用的OPC数据访问方式.以某配餐公司自动化立体仓库控制系统为例,采用西门子公司提供的OPC接口,用VB编写了客户端通信程序,实现了上位机与西门子S7-300PLC之间的数据交互,通过实际应用,比较分析了OPC技术在监控系统中的优势.  相似文献   

2.
Distributed information systems require complex access control which depends upon attributes of protected data and access policies. Traditionally, to enforce the access control, a file server is used to store all data and act as a reference to check the user. Apparently, the drawback of this system is that the security is based on the file server and the data are stored in plaintext. Attribute-based encryption (ABE) is introduced first by Sahai and Waters and can enable an access control mechanism over encrypted data by specifying the users’ attributes. According to this mechanism, even though the file server is compromised, we can still keep the security of the data. Besides the access control, user may be deprived of the ability in some situation, for example paying TV. More previous ABE constructions are proven secure in the selective model of security that attacker must announce the target he intends to attack before seeing the public parameters. And few of previous ABE constructions realize revocation of the users’ key. This paper presents an ABE scheme that supports revocation and has full security in adaptive model. We adapt the dual system encryption technique recently introduced by Waters to ABE to realize full security.  相似文献   

3.
Cloud computing provides a wide platform for information sharing. Users can access data and retrieve service easily and quickly. Generally, the data in cloud are transferred with encrypted form to protect the information. As an important technology of cloud security, access control should take account of multi-factor and ciphertext to satisfy the complex requirement for cloud data protection. We propose a proxy re-encryption (PRE) based multi-factor access control (PMAC) for cipher text in the above background. The PMAC adapts to the privacy and the protection of data confidently. We explain the motivation and some assumptions of PMAC at first. Then we define system model and algorithm. The system model and algorithm show how to create the data with corresponding accessing policy and how to grant and revoke the permission.  相似文献   

4.
基于上海浦东国际机场出发旅客出行调查数据,研究航空旅客机场接驳方式选择的影响因素。将潜在变量分为接驳方式服务水平(包括时间、费用等)和旅客个体属性(包括旅客类型、出发地等),通过相关性检验等方法确定关键解释变量。以嵌套Logit(NL)模型为理论基础,指出机场不同类型旅客接驳方式选择的差异性,并以商务旅客为例,利用模型预测各接驳方式比例。模型结果显示:出行时间和出行费用是影响机场接驳方式选择的最重要因素;车内时间和车外时间在两类潜在变量中体现出不同的显著性;携带行李数量(便捷性)和舒适性等也影响接驳方式的选择。最后,利用北京首都国际机场数据对模型实用性进行评价。  相似文献   

5.
本文从当前城市轨道交通车站接驳工作中存在的问题入手,阐明了接驳客流预测工作的重要性,并着重抓住天气因素对接驳客流预测的影响,结合现实调查数据,找出了晴天和雨天的各种接驳交通方式客流分担率变化规律;在此基础之上借助于经典的Logit模型构建了城市轨道交通接驳客流预测的改进模型,指出各种接驳方式的设施需根据不同天气条件下客流需求的最大值进行配置.  相似文献   

6.
为研究地铁车站留乘特征,基于地铁自动售检票(auto fare collection,AFC)刷卡数据和运行图数据,研究了地铁车站留乘概率分布估计方法.首先,基于乘客进、出站刷卡时刻与列车到、发时刻的关系,构造了聚集时间最大值、疏解时间的概率分布函数,提出了基于截断样本的聚集、疏解时间分布估计方法;其次,通过研究乘客进...  相似文献   

7.
空间信息网格的数据互操作方法   总被引:1,自引:0,他引:1  
空间数据互操作是空间信息网格(SIG)的关键技术之一,文中提出了一种较为通用的SIG数据互操作方法.该方法基于OGSA-DAI扩展了一个空间数据访问活动,设计了一套空间数据访问接口,从而以空间数据网格服务的形式实现对分布、异构的多维空间数据的互操作,是基于Web服务的空间数据互操作方法的一种具体实现,实验系统以二/三维空间数据为例验证了其可行性.  相似文献   

8.
研究了网络化人力资源管理(HRM)系统中功能模块和页面的访问权限控制方法与实现问题.采用基于角色的访问控制(RBAC,Role-Based Access Control)模型,实现网络化HRM系统的访问权限控制,其最大特点是:通过引入角色(R)的概念,建立用户(U)和权限(P)之间的关联,通过为用户分配角色、为角色分配权限,达到控制用户访问权限的目的.某大型跨地域HRM系统的成功实施表明:基于RBAC模型的访问权限控制方法,不仅简化用户权限配置工作量,而且大大提高系统与数据的安全性和可靠性,使得系统具有方便性、灵活性、安全性和易扩展性.  相似文献   

9.
以宽带CDMA网络为研究对象,结合3种主要业务类型(话音、视频、数据)的精确建模,提出了用户连接接纳控制与用户分组接纳控制协作的CAC机制,以及基于优先级的改进CAC方案.该方案根据无线分组网络中以分组为最小资源管理单位的特点,结合系统剩余容量以及不同类型业务的特点,为不同业务设置不同的接入准则.优先接纳对实时性要求高的用户连接和分组,同时尽可能地保证实时性要求较低业务的服务质量.仿真结果表明,所提出的策略有效降低了业务接人的阻塞率和平均接纳延时,同时提高了系统资源利用率.  相似文献   

10.
随着GSM网络增值业务快速发展,GPRS成为数据终端和数据网络的一种新连接,它为终端用户提供了高速无线IP和X.25分组数据接入服务。本文介绍了实现基于GSM网络的嵌入式远程终端控制单元的设计方案,介绍了该设计的硬件模块和软件设计流程,采用S3C44BOX作为微控制器芯片,用GT47模块接人无线网络,实现了控制中心对远程终端的控制。  相似文献   

11.
文章讨论了利用ObjectARX技术从AutoCAD的DXF文件中提取图形数据信息,并将这些信息存储到外部数据库中,采用ADO技术实现数据库访问的方法。该方法能够快速、有效地实现基于外部数据库的AutoCAD图形的数据交换。  相似文献   

12.
从蜂窝无线接入技术、非蜂窝无线接入技术、异构智融车载网络接入技术三方面,分析了国内外轨道交通车载网络的研究现状;针对非蜂窝无线接入技术和蜂窝无线接入技术的问题,阐述了协同利用轨道交通周边异构无线资源进行网络融合、协同通信的优越性;从网络模型、网络架构两方面论述了异构智融车载网络的融合方案;结合智能轨道交通业务需求,从可靠性和资源利用率两方面对现有的异构智融车载网络研究进行了系统性的归类梳理;从人工智能、安全性和云边结合三方面提出未来异构智融车载网络的发展趋势。研究结果表明:异构智融车载网络可靠性分为网络架构的可靠性和数据传输的可靠性,其中在网络架构可靠性方面,主要研究了通过冗余网络架构、车云传输架构、软件定义网络构架和智慧协同网络架构4种方式提升可靠性,在数据传输可靠性方面,主要研究了通过多路径传输、网络编码和切换算法降低传输过程中的丢包率;异构智融车载网络资源利用率分为无线接入的资源利用率和链路调度的资源利用率,其中在无线接入资源利用率方面,主要通过信道状态预测、频谱划分、频移补偿3种方式增加网络吞吐量,提高资源利用率,在链路调度的资源利用率方面,主要通过调度算法、接收缓存算法和拥塞控制算法来减少异构链路对数据传输的影响,降低数据重传次数,提高网络资源利用率。   相似文献   

13.
This paper aims at analyzing the security issues that lie in the application layer (AL) protocols when users connect to the Internet via a wireless local area network (WLAN) through an access point. When adversaries launch deauthentication flood attacks cutting users’ connection, the connection managers will automatically research the last access point’s extended service set identifier (ESSID) and then re-establish connection. However, such re-connection can lead the users to a fake access point with the same ESSID set by attackers. As the attackers hide behind users’ access points, they can pass AL’s authentication and security schemes, e.g. secure socket layer (SSL). We have proved that they can even spy on users’ account details, passwords, data and privacy.  相似文献   

14.
Most existing media access control (MAC) protocols in power line communication (PLC) networks just discard the colliding data packets when collision occurs. The collision deteriorates throughput and delay performance of system under high traffic conditions. This article presents a novel media access scheme with fast collision resolution for in-home power line networks. It works by first recognizing the colliding stations through detecting the inserted unique ID sequence ahead of data packets, then the source nodes retransmitting their packets immediately after the collision slot. The proposed protocol maintains the benefits of ALOHA systems. It needs no scheduling overhead and is suitable for bursty sources, such as multimedia data packets. Computer simulations have demonstrated that this approach can achieve high throughput due to its ability of resolving collisions.  相似文献   

15.
移动数据库数据同步技术研究   总被引:1,自引:0,他引:1  
介绍移动数据库及其应用,分析数据同步技术的特点,针对目前流行的远程数据访问和合并复制数据同步技术提出了一种移动数据库同步实现模式,同时以移动征稽长江航道养护费为例,详细描述了数据同步的实现过程.  相似文献   

16.
Introduction Whenasenderwantstosecurelysendames-sagemtoagroupofreceivers(alsocalledpartici-pants),andallowseachreceivertoaccessthemes-sageseparately,thesendercanuseeachreceiver's publickeytoencryptmandsendtohim.Thisis notessentiallydifferentfromsendingamessageto asinglereceiver,becausethesenderonlyneedsto re-performthesendingprotocolofausualcryp-tosystemfortimes.However,ifthesenderre-quiresthattheseparticipantsshouldcooperatively accessthemessage,thatis,theycandecryptthe ciphertextofthemessage…  相似文献   

17.
基于VC++的GPS数据采集系统的设计与实现   总被引:1,自引:0,他引:1  
GPS数据采集系统定期接收由GPS接收器采集的GPS数据,把符合要求的数据进行处理后存储到数据库中,然后根据需要显示GPS数据。本文介绍了用VC++6.0实现GPS数据采集系统,分析了串口通信、数据库访问等技术的特点。  相似文献   

18.
随着Internet上连有越来越多的异构数据库系统,这就导致数据共享比较困难,造成了资源的极大浪费。本文建立了两种异构数据库平台,阐述了使用XML和Web Service实现异构数据库存取数据的原理,最后实现了异构数据库中表之间数据交换,为异构数据库之间数据共享提供了技术支持。  相似文献   

19.
The multi-source and single-sink (MSSS) topology in wireless sensor networks (WSNs) is defined as a network topology, where all of nodes can gather, receive and transmit data to the sink. In energy-constrained WSNs with such a topology, the joint optimal design in the physical, medium access control (MAC) and network layers is considered for network lifetime maximization (NLM). The problem of integrating multi-layer information to compute NLM, which involves routing flow, link schedule and transmission power, is formulated as a non-linear optimization problem. Specially under time division multiple access (TDMA) scheme, this problem can be transformed into a convex optimization problem. To solve it analytically we make use of the property that local optimization is global optimization in convex problem. This allows us to exploit the Karush-Kuhn-Tucker (KKT) optimality conditions to solve it and obtain analytical solution expression, i.e., the globally optimal network lifetime (NL). NL is derived as a function of number of nodes, their initial energy and data rate arrived at them.Based on the analysis of analytical approach, it takes the influence of data rates, link access and routing method over NLM into account. Moreover, the globally optimal transmission schemes are achieved by solution set during analytical approach and applied to algorithms in TDMA-based WSNs aiming at NLM on OMNeT<++> to compare with other suboptimal schemes.  相似文献   

20.
针对复杂条件下背景建模这一视频检测领域的难点,提出一种基于Nvidia CUDA架构图形处理器(GPU)的快速LBP纹理直方图背景建模算法,算法根据GPU的并发结构和硬件特点,采用纹理存储和分页存储方式,利用共享内存与多点访问技术,提高数据访问效率,降低了算法复杂度.实验结果表明,相比CPU实现,GPU方式能够明显改善实时性能,平均加速比在30x左右,帧处理速度达到40 f/s以上.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号