With use of the Internet, web browser-enabled software applications are developed rapidly. Nowadays enterprises are paying more attention than ever on developing their business on the Web. The demand for rapidly deliv...
详细信息
With use of the Internet, web browser-enabled software applications are developed rapidly. Nowadays enterprises are paying more attention than ever on developing their business on the Web. The demand for rapidly delivering high quality web enabled software applications to the end users is high. The enterprise software developers are making efforts to develop the enterprise software applications that not only satisfy the business needs but also achieve the high quality within a short development process. However, the enterprise software development is normally complicated. For example, factors like the different enterprise environment, the critical business demand, the lack of knowledge and experience from the developers and so on can make the enterprise software development become rather hard work. Under such circumstances, something is needed to simplify the enterprise software development and also enable the sharing of the knowledge and experiences among the different developers. J2EE architecture is becoming the mainstream framework to develop the more complex enterprise application. The important problem arises, which is how to manage to each layer in J2EE and control the interior business data and the customer data, given that J2EE architecture has many complicated layers. There is respective data presentation in relevant layer of J2EE, with strictly rules to access and transform data objects between these layers. This paper adopts the case study method to discuss the data expression of J2EE and the detailed data expressing methods in corresponding layer with some instances. According to the Facade pattern of J2EE, it should control the access to data persistence layer seriously to protect important enterprise data and avoid showing database pattern to client directly. The data persistence layer hides behind the business logic layer and provide business interfaces via the business logic layer to communicate with the presentation layer to package the data persis
This paper firstly analyzed the front pattern matching algorithm of intrusion detection system, and improved on the pattern matching algorithm. Having immediately analyzed Rete algorithm and aimed at its shortage, the...
详细信息
This paper firstly analyzed the front pattern matching algorithm of intrusion detection system, and improved on the pattern matching algorithm. Having immediately analyzed Rete algorithm and aimed at its shortage, the paper introduced the FRete net algorithm on the basis of Rete net algorithm constituting an inference machine based on FRete matching algorithm, which could infer logical suspicious facts. Then the authors discussed and designed an intrusion detection system based on high-speed networks, and finally established a simulation and experiment platform to test the performance of IDS.
The user often retrieves few anticipated results when searching information in Internet via generalized search engine due that the web pages also exist the synonymous and ambiguous characteristic. How to classify the ...
详细信息
The user often retrieves few anticipated results when searching information in Internet via generalized search engine due that the web pages also exist the synonymous and ambiguous characteristic. How to classify the webpage is the key point to construct vertical search engine, which is known as solution for the problems. This paper proposes a conceptual framework based on Learning Vector Quantization (LVQ) network and Ontology to automatic classification for the webpage from agricultural website. System test shows that the framework can automatically classify Chinese agricultural products web pages and perfectly resolve the synonymous problem.
To analyze routing protocol in cognitive radio(CR) networks effectively, a dynamic routing model is necessary. Dynamic layered graphic(DG) was proposed aiming at the characteristic of dynamic spectrum access in CR net...
详细信息
To analyze routing protocol in cognitive radio(CR) networks effectively, a dynamic routing model is necessary. Dynamic layered graphic(DG) was proposed aiming at the characteristic of dynamic spectrum access in CR networks. In DG model, nodes were split into many sub-nodes, and each sub-node state could denote whether the related channel was available or *** DG model, sub-node state was taken as a stochastic process and the model of cognitive radio network's dynamic topology was set up by analyzing the dynamic characteristic of sub-node state. Simulation results show that in the aspect of the adaptability to CR network's variable SOP and depiction of the topology, the DG model outperforms the layered graph(LG) model, and can adapt well to CR networks environment.
Ant colony optimization (ACO for short) has been proved a successful meta-heuristic by a huge of empirical studies. This paper discusses the termination criteria of ACO and therefore provides research ideas to other m...
详细信息
A quality of service (QoS) or constraint-based routing selection needs to find a path subject to multiple constraints through a network. The problem of finding such a path is known as the multi-constrained path (MC...
详细信息
A quality of service (QoS) or constraint-based routing selection needs to find a path subject to multiple constraints through a network. The problem of finding such a path is known as the multi-constrained path (MCP) problem, and has been proven to be NP-complete that cannot be exactly solved in a polynomial time. The NPC problem is converted into a multiobjective optimization problem with constraints to be solved with a genetic algorithm. Based on the Pareto optimum, a constrained routing computation method is proposed to generate a set of nondominated optimal routes with the genetic algorithm mechanism. The convergence and time complexity of the novel algorithm is analyzed. Experimental results show that multiobjective evolution is highly responsive and competent for the Pareto optimum-based route selection. When this method is applied to a MPLS and metropolitan-area network, it will be capable of optimizing the transmission performance.
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym...
详细信息
ISBN:
(纸本)9783540725893
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult. In this paper, we identify access control requirements and propose a trust based access control framework for P2P file-sharing systems. The model integrates aspects of trust and recommendation, fairness based participation schemes and access control schemes.
Currently, there are many researches focusing on grid scheduling and more and more scheduling algorithms were proposed. However, those algorithms are not satisfied with the requirement of the grid for ignoring its cha...
详细信息
ISBN:
(纸本)9781595937575
Currently, there are many researches focusing on grid scheduling and more and more scheduling algorithms were proposed. However, those algorithms are not satisfied with the requirement of the grid for ignoring its characteristics of dynamics, autonomy, distributing, etc. Therefore, this paper proposes an adaptable dynamic job scheduling approach based on historical information (ADJSA). This approach adjusts the predicting model automatically by using the recent jobs execution historical information and then selects the appropriate resource to execute the job considering dynamic and real-time factors of the Grid.
This paper addresses an effective issue of content-based image retrieval (CBIR) by presenting Fuzzy Hamming Distance (FHD). Firstly, the theory of FHD is introduced, which includes degree of difference and cardinality...
详细信息
Semantic-based image retrieval bridges the gap between visual features and human understanding of image in the field of image retrieval. Image annotation is one important technology of image retrieval based on the sem...
详细信息
暂无评论