首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 61 毫秒
1.
针对数据流量爆发式增长所引发的网络拥塞、用户体验质量恶化等问题,提出一种用户属性感知的边缘缓存机制。首先,利用隐语义模型获知用户对各类内容的兴趣度,进而估计本地流行内容,然后微基站将预测的本地流行内容协作缓存,并根据用户偏好的变化,将之实时更新。为进一步减少传输时延,根据用户偏好构建兴趣社区,在兴趣社区中基于用户的缓存意愿和缓存能力,选择合适的缓存用户缓存目标内容并分享给普通用户。结果表明,所提机制性能优于随机缓存及最流行内容缓存算法,在提高缓存命中率、降低传输时延的同时,增强了用户体验质量。   相似文献   

2.
企业网络隔离方案探讨   总被引:1,自引:0,他引:1  
廖永松 《武钢技术》2006,44(6):32-35
分析威胁网络安全的主要因素及网络隔离对网络风险的防范作用。根据几种网络隔离技术的特点和企业网的应用需求,提出企业网中3个典型网络边界上的网络隔离方案,展望网闸隔离技术在企业网中的应用前景。  相似文献   

3.
社交焦虑是大学生社交障碍的主要表现之一,对他们的正常人际交往有很多负面影响。研究发现,影响大学生社交焦虑的因素既有客观的,也有主观的。作为大学生,很有必要学会从主观上降低乃至消除社交焦虑的影响,以建立和谐的人际关系。调整认知,这是解决问题的根本。放松心态,积极应对,这是成功的保障。  相似文献   

4.
由于种种原因,职业学校学生(以下简称"职校生")不仅在学习上成绩欠佳,而且在思想上对自己要求也不严,礼仪素养较差.所以,加强对职校生的礼仪教育是当前职业学校德育工作的一项重要内容.  相似文献   

5.
随着互联网和数字技术的飞速发展,越来越多的作品通过网络传播,网络衍生的法律问题直接挑战着传统的著作权法律制度,现行著作权法律在网络环境下出现了真空地带,网络环境中的侵犯著作权情况层出不穷.基于此,本文试从以下几个方面探析网络环境中的著作权保护难题.  相似文献   

6.
7.
随着ERP系统的不断发展和运用,系统面临的安全威胁也越来越多。我们必须提高安全认识,尽量减少核心数据被窃取、篡改,满足企业越来越高的安全需求。我们通过对ERP网络架构和网络安全威胁进行深入分析,为企业为用户提出增强ERP系统安全性的可行性方案。  相似文献   

8.
基于冶金企业设备监测的背景提出了一种无线传感器网络多跳同步时分协议.该协议采用自组织的层次拓扑控制方式,以簇头构成系统的骨干网,通过可靠路由方式传输数据.簇内节点组成局部网络以较小的发射功率采用分时多跳的方式将数据传输到距离较远的簇头,通过同步休眠机制降低功耗、满足传输时延要求.在冶金企业实际设备监测系统中的应用表明该协议具有扩展性强、传输可靠、信号延迟小和功耗低等特点.  相似文献   

9.
随着网络信息技术的发展和用户对服务要求的提高,按照个人需求的不同实现个性化服务是网络信息服务的发展趋势,也是网络信息服务向纵深发展的一个重要内容。阐述了网络环境下网络信息服务个性化的主要服务模式。  相似文献   

10.
网络信息安全在当今社会、经济、政治生活越来越显重要、大到国家安全,小到单位反个人知识产权都有所涉及.本文从保密工作的管理角度探讨网络信息安全的存在问题,并在此基础上提出了相应的网络信息安全解决方案,针对当今信息安全新发展的模式提出个人的几点思考.  相似文献   

11.
Social networks that are missing relations among some of their members--termed incomplete networks--have been of critical theoretical and empirical interest in sociological research on weak ties and structural holes but typically have been overlooked in social psychological studies of network learning. Five studies tested for schematic processing differences in the encoding and recalling of incomplete networks. In Studies 1 and 2, prior knowledge of missing relations facilitated learning an unfamiliar, incomplete network. Study 3 ruled out differences in general pattern recognition ability as an explanation. Study 4 manipulated the degree of familiarity with missing relations, which produced predicted differences in learning rates. Finally, Study 5 examined how improved learning of an incomplete network affected a strategic organizational choice. The findings suggest that people can become schematic for complex, incomplete social networks. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

12.
周瑛 《冶金信息导刊》2002,(6):33-34,37
阐述了网络环境中数据安全的概念,分析了网络中数据潜在的几种危险,在此基础上提出了建立相对安全的网络所需注意的几个问题。  相似文献   

13.
现代企业的营销活动已面向全球,分布式的数据环境更适合企业向外扩张的需要。本文从一个基本的企业模型出发,阐述分布式营销系统的设计方法。  相似文献   

14.
周芳  于真  郑雪峰 《工程科学学报》2011,33(11):1424-1429
大部分入侵检测系统的实现都会产生大量的报警信息,在一定程度上影响了系统管理,误报率也较高,影响了入侵检测的效果.针对这个问题,提出了一种基于节点关联的报警置信度计算方法,位于对等网络之上,节点在收到一系列入侵报警之后,需要进行节点关联,从而对报警信息进行融合,提取有效报警信息.其中根据关联对象的不同,节点关联又包括报警关联和信任关联两个层次,报警关联可用来判断入侵报警的有效性,信任关联可用来判断发起报警节点的可信性,给出了相关算法.仿真实验表明,使用该报警置信度计算方法可以提高入侵报警的检测准确率.  相似文献   

15.
The relationship between organizational networks and employees' affect was examined in 2 organizations. In Study 1, social network analysis of work ties and job-related affect for 259 employees showed that affect converged within work interaction groups. Similarity of affect between employees depended on the presence of work ties and structural equivalence. Affect was also related to the size and density of employees' work networks. Study 2 used a 10-week diary study of 31 employees to examine a merger of 2 organizational divisions and found that negative changes in employees' affect were related to having fewer cross-divisional ties and to experiencing greater reductions in network density. The findings suggest that affect permeates through and is shaped by organizational networks. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   

16.
本文介绍了校园无线网络的规划与设计的研究背景,详细说明了智能无线交换网络的优势,并利用智能无线交换网络为郑州升达学院设计出一套无线校园网规划方案。  相似文献   

17.
马湧  ;孙彦广 《中国冶金》2014,24(6):53-57
蒸气管网是具有典型大时滞特点的非线性网络系统结构,提高管网运行预测能力,对管网的安全高效运行有很好的指导意义。贝叶斯神经网络具有良好的泛化能力和准确计算能力,在网络目标函数中引入表示网络结构复杂性的惩罚项,以便能够在训练优化过程中降低网络结构的复杂性,达到避免网络过拟合的目的。实例验证表明,模型计算结果和泛化能力均有良好表现,优于传统BP算法计算性能,可提高企业蒸气管网运行管理水平,对流程工业节能减排建设有一定的帮助。  相似文献   

18.
New technology brings with it new opportunities for the practice of our profession. However, this technology is also a double-edged sword in that it can also cause problems for our profession and those we serve. The Canadian Code of Ethics for Psychologists (3rd edition) provides a foundation for approaching the issues that can arise in its use. It is argued that psychologists need not wait for specific rules and guidelines regarding the ethical use of new technologies; rather, psychologists can utilize the Canadian Code of Ethics for Psychologists immediately to address many of the issues involved. There is a wide range of areas in which ethical issues can arise. The focus in this paper is on three specific examples (online personal information accessibility, web-based advertising, and electronic data storage). These examples illustrate both the ethical issues involved and demonstrate the potential for how the Code can be used to think through and manage or resolve the issues. After a discussion of the three examples, the ongoing relevance of the Code to meeting the ethical challenges of continuously evolving technologies is discussed. (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   

19.
Four studies, using both experimental and correlational designs, explored the implications of being embedded within attitudinally congruent versus attitudinally heterogeneous social networks for individual-level attitude strength. Individuals embedded within congruent social networks (i.e., made up of others with similar views) were more resistant to attitude change than were individuals embedded within heterogeneous social networks (i.e., made up of others with a range of views). Mediational evidence suggests that attitudinally congruous social networks may increase attitude strength by decreasing attitudinal ambivalence and perhaps by increasing the certainty with which people hold their attitudes. These results suggest that features of the social context in which an attitude is held have important implications for individual-level attitude strength. (PsycINFO Database Record (c) 2011 APA, all rights reserved)  相似文献   

20.
周茜  张甲男 《山西冶金》2010,33(5):7-9,53
分析了产生网络隐患的多种因素,着重阐述了当前网络安全防范的现状,特别指出了已有网络安全的不足之处,并从多角度对网络安全提出了一些新想法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号

京公网安备 11010802026262号