首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 156 毫秒
1.
收到客户的反馈,说运行了一年的网站突然遭到黑客的攻击,系统cpu一直保持在100%,有进程也干不掉,然后客户就进行杀毒了,然后就把所有的exe文件都杀了,然后系统也就很多功能不正常了,数据库的服务也干掉了,然后笔者去看了下,发现网站目录下面被上传了大量的asp、php,htm的页面,里面的目录也有黑客上传了自己的目录,浏览哪些defalut. asp等方面的页面,就是黑客植入的页面,那要是被用户看见了,那真是一炮走红啊,黑客还很牛B的留下了脚印,果断写了自己的大名,在这种情况下,意识到这是中了WebShell木马,我立刻关闭了网站,然后来找解决方案。  相似文献   

2.
许秀华 《网友世界》2014,(6):143-143
科学技术的日新月异发展,多媒体技术已经进入了课堂,优化了课堂教学,提高了教学效率,突出了学生主体地位,激发了学生学习欲望,调动了学生学习的积极性、主动性、创造性,扩大了知识容量,促进了学生想象思维的发展,实现了课堂教学过程的最优化。本文试就多媒体技术在小学语文教学中的应用进行了探讨。  相似文献   

3.
基于HLA的分布式传感器管理系统仿真   总被引:1,自引:0,他引:1  
研究了我国传感器管理的现状,阐述了HLA仿真技术的发展,建立了基于HLA的分布式传感器管理系统的体系结构,并设计了系统的联邦成员类型,说明了它们的属性和特点,对该系统进行了仿真设计,实现了传感器管理的智能化、自动化,为研究复杂系统的仿真设计提供了一种方法.  相似文献   

4.
因特网的发展引起了新的产业革命,变革了经济的运行模式,刺激了广大企业的创新意识,促进了教育的普及和提高,大大改变发展中国家的工业化模式,甚至会改变国家之间的力量对比。不仅如此,互联网还造就了崭新的一代群体。就像60年代电视改变了人们的娱乐方式,造就了“电视一代”;80年代电脑改变了人们的工作方式,促成了“电脑一代”一样,九十年代Internet改变了人们获取信息的方式,诞生了“网络一代”。互联网对人类社会的影响是深刻而长远的,即给人们带来挑战,更给人们带来机遇。  相似文献   

5.
倒退个五年左右吧,那时国外有个蛮著名的什么经济学家,提出了一个概念——眼球经济。大致的意思就是说——扯住你的眼球,那些网站之类的就能非常爽。因为他们可以烧钱嘛,有了众多的眼球来看,不对,他们的说法叫浏览——有了众多的眼球来浏览他们的站点,就能有大笔的投资,有了投资,就能让那些CEO们财大气粗地烧钱——反正不是他们的钱,不烧白不烧,烧了才NB。后来,时代进步了,金融风暴来了,网络泡沫破裂了,一批又一批网络公司倒闭了,烧钱的CEO们下台了,网民大叫不好了,中国网络经济完蛋了……谁知有线网络崩溃了,无线联络崛起了,手机短信火…  相似文献   

6.
随着信息的技术发展,我国大部分医院都建立了自己的信息化系统,不仅促进了医院的管理水平,提升了医院的服务质量,而且增强了医院的竞争力,提高了医院的经济效益。文章阐述了医院信息化系统的内涵,介绍了医院信息系统建设的重要意义以及具体措施。  相似文献   

7.
为了提高整个远程复制系统的性能,对卷复制系统进行了优化.采用了多线程并行处理技术和流水线技术,设计了一种高性能的日志和位图,采用了网络自适应的复制协议和高效的请求合并策略.实验结果表明,该优化策略减少了应用等待的时间,降低了网络发送的时间开销,合理利用了有限的复制带宽,提高了复制效率.  相似文献   

8.
《中国信息化》2014,(7):F0003-F0003
人类进入20世纪50年代以后,特别是进入70年代以来,金融创新进入了一个大规模、全方位的高峰期。不断形成的新市场和层出不穷的新工具、新交易、新服务冲击着金融领域,不仅革新了传统的银行业务活动和经营管理方式,模糊了各类金融机构的业务界限,加剧了金融业的竞争,打破了金融活动的国界局限,而且改变了金融总量与结构,重塑了金融运作机制,提高了金融在经济中的地位与作用,形成了世界金融的新格局,导致金融业发生了全面而深刻的变化,呼唤着金融业务载体的全方位更新,这些部为网络金融营造了良好的萌生和发展环境。  相似文献   

9.
白丽  蒋彬 《微电脑世界》2007,(11):118-125
电脑无法启动,忘记密码了,账号被盗了,咖啡泼在键盘上了,刚给老板发了封难堪的邮件就后悔了等等,我们整理出了PC日常应用中最常见和最容易发生的11个大灾难。在这里为每一种灾难的发生都给出了相应的解决方案,同时还给出了避免灾难的预防性措施,希望能够对您有所帮助,帮助您远离这些灾难。  相似文献   

10.
简介了物联网网关的应用背景,提出了网关的总体方案,列举了其中关键技术,给出了应用案例,介绍了研究团队。  相似文献   

11.
The blockchain is a radical innovation that has a considerable effect on payments, stock exchanges, cybersecurity, and computational law. However, its limitations in terms of the uncertainty involved in transaction confirmation are significant. In this paper, we describe the design of a decentralized voting protocol for the election of a block generator in a consortium blockchain and propose a new system framework that allows fast and exact confirmation of all transactions. In addition, to replace a transaction’s owner signature, a new interactive incontestable signature between the dealer and owner is used to confirm a transaction. By means of this signature, the dealer can assure the owner that a transaction will be permanently included in the blockchain in a non-repudiation manner. Moreover, the signatures of all transactions in a block share only one witness that provides membership proof between the block and these transactions. Finally, a security and performance analysis shows that the proposed schemes are provably secure and highly efficient.  相似文献   

12.
Concept and design of Ad Hoc and Mobile classrooms   总被引:3,自引:0,他引:3  
Abstract This investigation describes the concept of mobile learning and the design of Ad Hoc and Mobile classrooms. Four classes of mobile learning and implementation of Ad Hoc and eSchoolbag systems are presented. The paper discusses the development of advanced wireless technologies for building an ad hoc classroom to create a modern and new learning environment. As in a traditional classroom, information technology is developed to provide the teacher with aids, such as a blackboard, a board rubber, coloured chalk, a microphone, a voice recorder, a video recorder, and so on, to support teaching and discussions. Additionally, students are provided with an electronic schoolbag which contains electronic books, a notebook, a parents' contact book, a pencil case, writing materials, sheets, a calculator, an address book, and other items. Taking lessons in a lively, vivid and new learning environment, it is expected that students will improve their learning performance with perhaps less attendance in a physical classroom and they gain the flexibility of being able to learn at their own convenience.  相似文献   

13.
文章在跟踪和分析最新磁盘加密技术研究成果的基础上,设计了一种基于RFID的磁盘分区加密系统。该系统由磁盘分区加密软件Partition Crypt与RFID射频卡、USB射频读写端等硬件模块共同组成。软件部分对计算机硬件系统要求低、安装方便、使用简单、加密效果好;硬件部分由单片机与射频模块完成。其中,USB接口采用虚拟USB接口的方法,降低硬件复杂性与成本,具有很高的性价比。经过测试,整个系统功能稳定、性价比高、保密性好,可为广泛使用的基于Windows操作系统的涉密计算机提供加密技术保障,应用前景广阔。  相似文献   

14.
针对充电桩现场测试设备的充电需求与实际输出不一致,出现电压、电流不匹配的问题,设计了一套检测方案,构建出包括电流检测模块、电压检测模块和示波器检测模块的检测电路,通过采样电压和电流信号,计算出不同负载下充电桩输出电流和电压值,并设计了包括直流电能采集电路,由双通道AD转换AD7380、可编程增益放大器、可编程增益放大器、增益电阻Rg2和电源变换器、低通滤波器电容CL、低通滤波器电阻RL组成的检测电路,在检测电路中,为了提高检测效率,还设置了校正电路。通过试验,本研究方法分析直观,误差低。  相似文献   

15.
The advanced metering infrastructure (AMI) in a smart grid contains hardware, software, and other electronic components connected through a communication infrastructure. AMI transfers meter-reading data between a group of smart meters and a utility centre. Herein, a wireless mesh network (WMN) with a random mesh topology is used to deploy the AMI communication network. In a WMN, paths are identified using a hybrid wireless mesh routing protocol (HWMP) with a load balancing feature called load aware-HWMP (LA-HWMP). These paths reduce the demand on links with a minimal air time metric; however, the delay in the data transmission of certain smart meters is high, given the large number of retransmissions caused by packet drop. To avert this problem and enhance the end-to-end delay, a genetic algorithm is applied on the LA-HWMP to obtain the optimal path. The optimisation process will result in the selection of paths with minimal delay. The genetic algorithm is developed with a rank-based selection, a two-point crossover, and a random reset mutation with a repair function to eliminate duplicate entries. The proposed method is compared with the HWMP, the LA-HWMP, and a state-of-the-art method that uses a combination of the ant colony algorithm and simulated annealing (ACA-SA) for AMI networks of different sizes. The obtained results show that the path identified by the proposed method yields a shorter delay and higher throughput than paths identified using the other methods.  相似文献   

16.
In this paper, we propose an interactive designing method and a system based on it to create 3D objects and 2D images. This system consists of two subsystems for virtual sculpting to create a 3D shape and virtual printing to produce a picture with a printing block. In the virtual sculpting subsystem, a user can form solid objects with curved surfaces as if sculpting them. The user operates virtual chisels, and can remove or attach arbitrary shapes of ellipsoids or cubes from or to the workpiece. A 3D object generated by virtual sculpting looks like a real wooden sculpture. If using a board as a workpiece, a user can generate a virtual printing block. In the virtual printing subsystem, a user can synthesize a woodcut printing image from the virtual printing block mentioned above, a virtual paper sheet, and a printing brush. The user can synthesize a realistic woodcut print with a procedure similar to the actual woodcut printing.  相似文献   

17.
This paper analyzes the dynamics of the price and quantity bargaining betweenfour agents, in a current industrial structure, with a special attention tothe price bargaining. The structure combines a bilateral monopoly in a marketfor inputs, and a duopoly in a final market. After a simplified presentationof a model which proposes equilibrium solutions to the bargaining, we presentthe protocol and the results of an experiment whose objective is twofold. Thefirst one is to test the assumptions of the model. The second one is toidentify behavioral models and bargaining rules for a work of simulation. Theexperimental results do not confirm the solutions of the theoretical model,which predicted a Nash solution for the price bargaining, and used the cournotconjecture in the quantity bargaining. A detailed analysis of the resultsleads to some observations useful to parameterize a simulation model. Thesimulation runs a systematic analysis of the dynamics of the bargaining rulesin this structure.  相似文献   

18.
19.
面向图结构的分布式程序设计模型GOM   总被引:3,自引:1,他引:3  
很多分布式程序由一组分散在不同处理器结点上的松散耦合的进程协作完成某项任务。这些进程底层的逻辑结构可以用一个图来表示,进程间的通信和同步关系可以用图上的操作来表示。该文描述面向图结构的模型GOM以及它的实现GOS。在GOM层,一个分布式程序由一个概念图以及由消息激活的若干函数构成。  相似文献   

20.
In the research of software reuse, feature models have been widely adopted to capture, organize and reuse the requirements of a set of similar applications in a software domain. However, the construction, especially the refinement, of feature models is a labor-intensive process, and there lacks an effective way to aid domain engineers in refining feature models. In this paper, we propose a new approach to support interactive refinement of feature models based on the view updating technique. The basic idea of our approach is to first extract features and relationships of interest from a possibly large and complicated feature model, then organize them into a comprehensible view, and finally refine the feature model through modifications on the view. The main characteristics of this approach are twofold: a set of powerful rules (as the slicing criterion) to slice the feature model into a view automatically, and a novel use of a bidirectional transformation language to make the view updatable. We have successfully developed a tool, and a nontrivial case study shows the feasibility of this approach.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号