欢迎访问行业研究报告数据库

行业分类

重点报告推荐

当前位置: 首页 > 行业报告

找到报告 5731 篇 当前为第 512 页 共 574

报告分类:外文技术报告

  • 5111.使用地理信息系统的卡车路线转移

    [信息传输、软件和信息技术服务业] [2013-12-13]

    The objective of this paper is to develop an analytical model to identify key Interstate segments at which trucks are frequently diverted because of a disruption in service and to determine an appropriate alternate route under such circumstances. Through the use of a risk-based approach, segments of the Tennessee Interstate system were selected according to histories of serious incidents, incidents with diversions, and high truck volumes. In the selection of a preferred diversion route, the shortest alternate path may not be feasible for truck use because of varying size and performance characteristics. To address this consideration, a geographic information system (GIS) was used; in the GIS, restrictions and costs were applied to candidate diversion routes to either eliminate or penalize routes undergoing evaluation. The alternate route assessment methodology illustrates the need for improvements in nationwide truck freight networks as well as the ability for GIS tools to address complex routing problems. Most alternate routes studied as part of this project were affected by these restrictions. Use of this methodology can lead to reduced congestion and increased reliability in travel time for trucks and other vehicular traffic.
    关键词:电子信息;地理信息系统;路线转移
  • 5112.安全应用程序的毫米波和太赫兹成像

    [信息传输、软件和信息技术服务业] [2013-12-13]

    The relatively short wavelength of mm-wave and THz radiation coupled with good transmission through many dielectric materials allows images to be formed of concealed objects. This chapter gives an overview of the detectors, their associated circuitry, and system developments over the past 10 years, focussing on personnel security screening. We will discuss the phenomenology of imaging at these wavelengths, introduce the reader to the basic architectures being used and developed for image forming instruments, show examples of systems, and also discuss the feasibility of spectroscopic THz imaging for security screening applications.
    关键词:电子信息;信息安全;网络安全;毫米波;太赫兹
  • 5113.外行无线电分组交换网络的安全性

    [信息传输、软件和信息技术服务业] [2013-12-13]

    computer programs that radio amateurs use in their digital networks give various opportunities for checking user authentication before allowing access to sensitive parts of communication systems.
    关键词:电子信息;信息安全;网络安全;无线电;分组交换网络
  • 5114.无匙加密的SIMPL系统和原始安全性

    [信息传输、软件和信息技术服务业] [2013-12-13]

    We discuss a recent cryptographic primitive termed SIMPL system,where the acronym stands for SIMulation Possible, but Laborious. Like Physical Unclonable Functions (PUFs), SIMPL systems are disordered, unclonable physical systems with many possible inputs and a complex input-output behavior. Contrary to PUFs, however, each SIMPL system comes with a publicly known, individual numeric description that allows its slow simulation and output prediction. While everyone can determine a SIMPL system's output slowly by simulation, only its actual holder can determine the output fast by physical measurement. This added functionality allows new public key like protocols and applications. But SIMPLs have a second, perhaps more striking advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic security. Neither in the form of a standard digital key, nor as secret information hidden in the random, analog features of some hardware, as it is the case for PUFs. The security of SIMPL systems instead rests on (i) an assumption regarding their physical unclonability, and (ii) a computational assumption on the complexity of simulating their output. This provides SIMPL systems with a natural immunity against any key extraction attacks, including malware, side channel, invasive, and modeling attempts. In this manuscript, we give a comprehensive discussion of SIMPLs as a cryptographic and security primitive. Special emphasis is placed on the different cryptographic protocols that are enabled by this new tool.

    关键词:电子信息;信息安全;无匙加密;SIMPL系统
  • 5115.远程信息处理系统的安全性

    [信息传输、软件和信息技术服务业] [2013-12-13]

    Under telematic systems we usually understand the system consisting of many elements distributed in large territory where some of these elements are mobile elements. The behavior of the system consists of interaction among elements and we assume that these interactions have to be undisturbed - secure. Because we have seen some non-identical understanding in the scientific community, let us define the meaning of any possible misinterpreted term just for purpose of this chapter. Later on we will see important usage of these definitions.
    关键词:电子信息;信息安全;网络安全;远程信息处理系统
  • 5116.数据整合与建设经验的SMAP

    [信息传输、软件和信息技术服务业] [2013-12-10]

    Originally designed as a RESTful protocol to expose reading data from simple instruments, we discuss theshifting role of sMAP as a common interchange format for timeseries data within a number of building projects.Due to the change in role and resulting widened set of use cases, we discuss where sMAP has fallen short anddesign modifications necessary to address them. Key contributions are identifying a set of features required for the broad applicability of a protocol for publishing time-series data, and a concrete proposal and implementationof our design grounded in a diverse set of use cases and real deployments.
    关键词:时间序列数据;数据协议;广泛适用性;读取数据
  • 5117.在IBM的纯应用系统实现业务连续性

    [信息传输、软件和信息技术服务业] [2013-12-10]

    Achieving business continuity (that is, making sure that your critical business functions canbe performed in the face of a disaster) is always a tricky business. Designing systems to beavailable in the face of failure is one of the most complex problems in software engineering. Evenunderstanding what business continuity and disaster recovery mean is where things just beginto get complicated.For example, what most users mean when they discuss disaster recovery is the ability to get a siteup and running in a matter of minutes (or, at most, hours) from a last good state of an existingsystem in the case of a catastrophic failure where an entire data center is lost.Because such definitions can be so loose, it’s useful to define some terms for discussing businesscontinuity for IBM PureApplication System. Wikipedia, in its article on disaster recovery, refers totwo key measurements that are important to understand:Recovery point objective (RPO) is the measure of the maximum time period in which datamight be lost from an IT service due to a major incident.
    关键词:系统恢复;系统状态转移;备份恢复
  • 5118.云缩放,第3部分:探索视频分析在云中使用的方法,工具和系统设计用于视频和图像分析,监控和安全

    [信息传输、软件和信息技术服务业] [2013-12-10]

    Explore and consider methods, tools, and system design for video and image analysis withcloud scaling. As described in earlier articles in this series, video analytics requires a morebalanced data-centric compute architecture compared to traditional compute-centric, scalable,high-performance computing. The author examines the use of OpenCV and similar tools fordigital video analysis and methods to scale this analysis using cluster and distributed systemdesign.The use of coprocessors designed for video analytics and the new OpenVX hardwareacceleration discussed in previous articles can be applied to the computer vision (CV)examples presented in this article. This new data-centric technology for CV and video analyticsrequires the system designer to re-think application software and system design to meetdemanding requirements, such as real-time monitoring and security for large, public facilitiesand infrastructure as well as a more entertaining, interactive, and safer world.
    关键词:视频分析;基本结构;云缩放;信息安全
  • 5119.引入集体自由:云功能的应用服务器的管理基础

    [信息传输、软件和信息技术服务业] [2013-12-10]

    Evolutionary forces driving the IT industry toward cloud computing increase the pressureon application server management solutions to both accommodate traditional infrastructuredeployments and enable cloud-based deployments. Lightweight, standards-based, flexiblescalability are among the necessary hallmarks of an architecture that embraces this duality.Liberty collectives deliver next generation application server management for the IBM ebSphere Application Server Liberty profile both inside and outside the cloud.
    关键词:剖析;发展模型;配置管理;云计算
  • 5120.最小化所有对最短路径的通信

    [信息传输、软件和信息技术服务业] [2013-12-10]

    We consider distributed memory algorithms for the all-pairs shortest paths (APSP) problem. Scaling the APSP problem to high concurrencies requires both minimizing inter-processor communication as well as maximizing temporal data locality. Our 2.5D APSP algorithm, which is based on the divideand- conquer paradigm, satisfies both of these requirements: it can utilize the extra available memory to perform asymptotically less communication, and it is rich in semiring matrix multiplications, which have high temporal locality. We start by introducing a block-cyclic 2D (minimal memory) APSP algorithm. With a careful choice of block-size, this algorithm achieves known communication lower-bounds on latency and bandwidth. We extend this 2D block-cyclic algorithm to a 2.5D algorithm, which can use extra copies of data to reduce the bandwidth cost by a factor of c1=2, compared to its 2D counterpart.However, the 2.5D algorithm increases the latency cost by c1=2. We provide a tighter lower bound on latency, which dictates that the latency overhead is necessary to reduce bandwidth along the critical path of execution. Our implementation achieves impressive performance and scaling to 24,576 cores of a Cray XE6 supercomputer by utilizing well-tuned intra-node kernels within the distributed memory algorithm.
    关键词:最短路径算法;矩阵乘法;关键路径
首页  上一页  ...  507  508  509  510  511  512  513  514  515  516  ...  下一页  尾页  
© 2016 武汉世讯达文化传播有限责任公司 版权所有 技术支持:武汉中网维优
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服