期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
基于移动GIS的景观缓冲区构建方法与系统实现 被引量:1
1
作者 张可文 赵庆展 +1 位作者 周可法 于宝华 《石河子大学学报(自然科学版)》 CAS 2017年第3期384-390,共7页
为提高景区导游精准化、智能化水平,本研究首先使用矢量要素缓冲区生成方法生成初步景观缓冲区,进而利用Voronoi图方法解决缓冲区的叠加冲突问题,最后利用可视性分析方法去除无效缓冲区,通过一系列GIS方法构建景区精确导览缓冲区,为基... 为提高景区导游精准化、智能化水平,本研究首先使用矢量要素缓冲区生成方法生成初步景观缓冲区,进而利用Voronoi图方法解决缓冲区的叠加冲突问题,最后利用可视性分析方法去除无效缓冲区,通过一系列GIS方法构建景区精确导览缓冲区,为基于移动终端的LBS智能导览应用提供算法支持。在此基础上,以移动GIS为平台,综合利用Arc GIS Server、空间数据库技术搭建智能导览信息系统。针对景区智能导览信息系统的测试结果表明,导览过程中可以根据游客GPS定位信息实时提供自动导览服务,缓冲区半径大小为<10 m、10-20 m、>20 m以上时的服务平均误差分别为29.6%、18.3%和9.8%,导游过程中景音对应,缓冲区划分大小合理。该景区导览缓冲区构建方法可为同类系统开发与应用提供参考。 展开更多
关键词 移动GIS 服务缓冲区 VORONOI图 视域分析
在线阅读 下载PDF
漏洞放大镜
2
《网络与信息》 2004年第3期104-104,共1页
关键词 MICROSOFT Word/Excel远程任意代码可执行漏洞 恶意文档 文件数据 MICROSOFT FrontPage扩展服务缓冲区溢出漏洞
在线阅读 下载PDF
Explicit Rate Based Transmission Control Scheme in Vehicle-to-lnfrastructure Communication Networks 被引量:2
3
作者 BI Yuanguo Xuemin (Sherman) SHEN ZHAO Hai 《China Communications》 SCIE CSCD 2014年第1期46-59,共14页
In Vehicle-to-infrastructure(V2I)communication networks,mobile users are able to access Internet services,such as video streaming,digital map downloading,database access,online gaming,and even safety services like acc... In Vehicle-to-infrastructure(V2I)communication networks,mobile users are able to access Internet services,such as video streaming,digital map downloading,database access,online gaming,and even safety services like accident alarm,traffic condition broadcast,etc.,through fixed roadside units.However,the dynamics of communication environment and frequent changing topology critically challenge the design of an efficient transport layer protocol,which makes it difficult to guarantee diverse Quality of Service(QoS) requirements for various applications.In this paper,we present a novel transport layer scheme in infrastructure based vehicular networks,and aim to resolve some challenging issues such as source transfer rate adjustment,congestion avoidance,and fairness.By precisely detecting packet losses and identifying various causes of these losses(for example,link disconnection,channel error,packet collision,buffer overflow),the proposed scheme adopts different reacting mechanisms to deal with each of the losses.Moreover,it timely monitors the buffer size of the bottleneck Road-Side Unit(RSU),and dynamically makes transfer rate feedbacks to source nodes to avoid buffer overflow or vacancy.Finally,analysis and simulation results show that the proposed scheme not only successfully reduces packet losses because of buffer overflow and link disconnection but also improves the utilization efficiency of channel resource. 展开更多
关键词 transmission control loss differentiation congestion avoidance buffer over- flow vehicle-to-infrastructure communications
在线阅读 下载PDF
浅谈网络攻击与防御技术 被引量:1
4
作者 杨妍 《信息通信》 2013年第7期133-134,共2页
Internet目前已经成为全球信息基础设施的骨干网络,Internet本身所具有的开放性和共享性对信息的安全问题提出了严峻的挑战,为此要了解网络攻击及常用的网络攻击技术,也要掌握网络攻击的防御技术。
关键词 网络攻击 网络监听 ARP欺骗 缓冲区溢出DoS(拒绝服务)与DDoS攻击(分布式拒绝服务 访问控制技术 防火墙技术 数据加密技术 入侵检测技术 反病毒技术
在线阅读 下载PDF
ANALYSIS OF DISCRETE-TIME QUEUES WITH BATCH RENEWAL INPUT AND MULTIPLE VACATIONS 被引量:1
5
作者 Veena GOSWAMI G.B.MUND 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2012年第3期486-503,共18页
This paper analyzes a discrete-time multiple vacations finite-buffer queueing system with batch renewal input in which inter-arrival time of batches are arbitrarily distributed. Service and vacation times are mutually... This paper analyzes a discrete-time multiple vacations finite-buffer queueing system with batch renewal input in which inter-arrival time of batches are arbitrarily distributed. Service and vacation times are mutually independent and geometrically distributed. The server takes vacations when the system does not have any waiting jobs at a service completion epoch or a vacation completion epoch. The system is analyzed under the assumptions of late arrival system with delayed access and early arrival system. Using the supplementary variable and the imbedded Markov chain techniques, the authors obtain the queue-length distributions at pre-arrival, arbitrary and outside observer's ob- servation epochs for partial-batch rejection policy. The blocking probability of the first, an arbitrary- and the last-job in a batch have been discussed. The analysis of actual waiting-time distributions measured in slots of the first, an arbitrary- and the last-job in an accepted batch, and other performance measures along with some numerical results have also been investigated. 展开更多
关键词 Batch input DISCRETE-TIME finite buffer multiple vacations partial-batch rejection.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部