Concurrency control mechanism can largely use the system resources;it develop the advantage of the database resource sharing and is one of the important indicator to measure the performance of the database management ...
详细信息
ISBN:
(纸本)9781457715846
Concurrency control mechanism can largely use the system resources;it develop the advantage of the database resource sharing and is one of the important indicator to measure the performance of the database management system(DBMS). There are many existing types of concurrency control algorithms. This paper introduces the concurrency control of the Multi - version Timestamp protocol and optimizes its shortcomings of the rollback problem, giving a new concurrency control of the Multi - version Timestamp protocol.
As an information extraction technology, clustering analysis for spatio-temporal trajectories of moving point objects focuses on spatial and temporal distribution and principle of group movement behavior. Potential ap...
详细信息
ISBN:
(纸本)9781457715846
As an information extraction technology, clustering analysis for spatio-temporal trajectories of moving point objects focuses on spatial and temporal distribution and principle of group movement behavior. Potential applications span a wide spectrum such as meteorology, traffic engineering, wildlife migration, mobile network allocation and logistics. Firstly some concepts related to clustering analysis for spatio-temporal trajectories of moving point objects are introduced. Then the current research progresses of this filed are elaborately summarized. Finally the open research problems are pointed out. Clustering analysis for spatio-temporal trajectories of moving point objects is a novel research field and many issues need to be solved. The review research on this topic has great theoretical and practical value.
With the rapid development of nanotechnology, nanometer material is used more and more widely. The contact of human beings, animals, plants and nanometer materials has become inevitable. This paper summarizes the prog...
详细信息
ISBN:
(纸本)9781457715846
With the rapid development of nanotechnology, nanometer material is used more and more widely. The contact of human beings, animals, plants and nanometer materials has become inevitable. This paper summarizes the progress of biologic security research of a variety of typical carbon nanometer material metals. and oxide nanomaterial and semiconductor (insulators), including fullerenes (C60), single-walled carbon nanotubes multi-walled carbon nanotubes, gold, iron oxide, alumina oxide: zinc oxide, titanium dioxide, silica, zinc sulfide, zinc selenide. This paper also analyzes the existing difficulties and problems during the research of biological safety of nanomaterial, and makes an outlook of the future development of the research on biological safety of nanomaterial as well.
Some of the humming retrieval system and the qualitative mapping are introduced briefly. Combining with the music theory, a qualitative mapping model for extracting humming melody and its algorithm are given in this p...
详细信息
ISBN:
(纸本)9781457715846
Some of the humming retrieval system and the qualitative mapping are introduced briefly. Combining with the music theory, a qualitative mapping model for extracting humming melody and its algorithm are given in this paper. The key points of the algorithm are the method to choose the criterion of the note segmentation dynamically and the dynamic measure to determine the pitch of a note. Experiments show that not only a better result of choosing flexibly and reasonably the criterion of the note segmentation can be determined, but also the note pitch can be extracted accurately. Eventually, the contour of humming melody can be achieved too
Service Availability is an important method meeting adaptive and general requirements of service failure detection and largely affected by failure detection indexes. Therefore, how to select appropriate indicators of ...
详细信息
ISBN:
(纸本)9781457715846
Service Availability is an important method meeting adaptive and general requirements of service failure detection and largely affected by failure detection indexes. Therefore, how to select appropriate indicators of service failure detection is an important issue. However, only small number of indicators in the existing service availability mechanism can't accurately describe the complex situation of a distributed system, thus difficult to meet the QoS requirements of applications. After researching on existing service failure detection algorithms, applications' failures and network survivability, this paper proposes a hierarchical index system for crash-stop service failure detection that considers ability to provide services, network performance, and load brought by failure detection.
To date, most identity-based key agreement protocols are based on a single PKG (private Key Generator) environment. However, it is not realistic to assume that all schemes use a single PKG and each PKG shares identica...
详细信息
ISBN:
(纸本)9781457715846
To date, most identity-based key agreement protocols are based on a single PKG (private Key Generator) environment. However, it is not realistic to assume that all schemes use a single PKG and each PKG shares identical system parameters but possesses a distinct master key. Recently, Lee et al. proposed an ID-based 2-party key agreement protocol between users whose private keys were issued by independent PKGs that do not share any system parameters. However, Lee et al. protocol has a flaw that allows attackers to impersonate others without knowing their private keys and the key escrow issues inherited in the identity-based schemes. In this paper, we propose a new certificateless-based two party authenticated key agreement protocol based on bilinear pairings in elliptic curves between users belonging to different PKGs that do not share identical system parameters. Compared with other two-party key agreement protocols for a multiple PKG environment, the proposed key agreement protocols satisfy every security requirements of key agreement protocols.
Earthquake Early Warning System is an important subsystem of the overall planning for railway information. On the basis of the research of foreign Earthquake Early Warning System, we have analyzed disaster monitoring ...
详细信息
ISBN:
(纸本)9781457715846
Earthquake Early Warning System is an important subsystem of the overall planning for railway information. On the basis of the research of foreign Earthquake Early Warning System, we have analyzed disaster monitoring technology and its trends. The dangers of train's safe operation caused by earthquake and other hazards, for example, objects, animals, and humans interfering, has also been presented. Combined with the reality of high-speed railways in our country, we raised the overall system structure, network architecture, system functions and of Earthquake Early Warning System. Furthermore, not only could the system get real-time monitoring information, but also is able for centralized management, emergency procedures, and comprehensive analysis.
To avoiding the deficiency of energy-saving in the Low Energy Adaptive Clustering Hierarchy(LEACH) of Wireless Sensor Network, an improved protocol-the Energy and Distance Based Clustering Protocol(EDBCP) is proposed....
详细信息
ISBN:
(纸本)9781457715846
To avoiding the deficiency of energy-saving in the Low Energy Adaptive Clustering Hierarchy(LEACH) of Wireless Sensor Network, an improved protocol-the Energy and Distance Based Clustering Protocol(EDBCP) is proposed. The energy and distance are introduced into the cluster_head selection method. The optimal number of cluster_heads is determined, the distribution of the heads can be more balanced, and the lifetime of WSN be extended.
This paper proposes the technology of land and resources law censorial information interaction based on Web Service to solve the existing problem of information exchanging behind time, inconvenient or not enough. This...
详细信息
ISBN:
(纸本)9781457715846
This paper proposes the technology of land and resources law censorial information interaction based on Web Service to solve the existing problem of information exchanging behind time, inconvenient or not enough. This technology can easily and rapidly exchange the business information of track, parcel, personnel and mission among multi-level law censorial platforms of land and resources. What's more, this technology can set an example for other multi-level information interaction systems.
暂无评论