首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Despite the fact that most of the data centers are software-defined, the multifaceted network architecture and increase in network traffic make data centers to suffer from overhead. Multipath TCP supports multiple paths for a single routing session and ensures proper utilization of bandwidth over all available links. As rise in number of nodes in data center is frequent and drastic, scalability issue limits the performance of many existing techniques. Segment Routing is vibrant in reducing scalability disputes and routing overhead. Segment routing approach combined with MPTCP traffic result in efficient routing approach. The downfall of the link capacity due to drastic incoming traffic remains as a major concern in data center network which enforces preventing link energy depletion due to high network traffic. Our proposed work, segment routing based energy aware routing approach for software defined data center aims to achieve throughput maximization through preserving link residual capacity and proper utilization of links. As well, our approach shows a decrease in length of segment label stack with respect to maximum segment label depth. Analysis is done by comparing the executions of other existing approaches in a single-controller environment with our energy-aware routing approach in a distributed environment. Distributed controller setup prevents network from single point of failure. It helps to prevent controller overhead and provides improved network performance through throughput.  相似文献   

2.
安全依恋启动具有一系列积极心理效应,且表现出启动效应普遍性与特异性的共存。两种属性的区别在于个体非安全依恋风格是否参与调节,这一调节与个体的依恋策略使用和概念联结程度紧密相关。当前,对于安全依恋启动内在机制的探讨集中在情绪缓冲与认知调控过程,本文回顾现有关于安全依恋启动的主要结论与解释,整合安全依恋启动的神经基础,并纳入依恋风格的调节因素,提出一个安全依恋启动的情绪/认知协同作用模型。最后围绕需要深入探讨的关键问题进行了展望。  相似文献   

3.
Three studies tested and confirmed the hypothesis that secure attachment relationships lead to feelings of security and energy, as well as willingness to explore. In Study 1, priming a secure attachment relationship increased felt security and energy. In Studies 2 and 3, felt energy mediated the effect of (primed) secure attachment relationships on willingness to explore. In Study 3, the effect of (primed) secure attachment relationships on felt energy and willingness to explore was independent of general positive affect. Secure attachments energize partners, thus enabling exploration.  相似文献   

4.
In this research, we applied current theories of metacognition to study computer security and tested the idea that users' password selection is affected by the metacognitive belief that if a password is memorable, then it is not secure. In two experiments, different types of eight‐character passwords and longer, more secure sentences were presented. Participants rated perceived memorability and perceived security of the passwords and indicated whether they would use them in a critical and in a noncritical service. The results confirmed the belief. Sentences that are in fact highly secure and perceived as highly memorable were also perceived as weak passwords. The belief strongly affected password selection for critical services, but it had no effect on noncritical services. In sum, long sentences are a particularly interesting type of password because they meet both security and memorability criteria, but their use is limited by a false belief.  相似文献   

5.
Wireless Sensor Networks is one of the most significant area of research where large number of sensor nodes that are distributed in a geographical area operate on limited battery power. As these networks, depending on the application, are sometimes deployed in in-hostile environment, which makes energy conservation one of the major challenge faced in WSN. To reduce energy consumption, clustering is considered to be the most efficient technique. This work proposes a new clustering approach that decreases energy consumption and results in prolonged network lifetime which is an important requirement for networks operating in inaccessible areas. In the proposed approach, heterogeneity is also implemented to increase the stability and energy efficiency of random networks. We have evaluated the efficiency of the proposed protocol through simulations and comparison is performed with well-known existing distributed protocols. Proposed approach shows efficient results in terms of the stability period for different network configurations and Base Station positions. Also, the results are found better in terms of number of alive nodes and network lifetime.  相似文献   

6.
The more energy consumption is the major issue for wireless sensor network. In wireless sensor network (WSN), sensor nodes are fixed in various routing algorithms. In the same networks, mobile sensor and fixed sensor nodes are combine and its used in few applications. The function is corruption while mobility was achieved, since these nodes have minimum battery power, lower range of communication and a lessor amount of memory. To overcome this issue, Improved Energy Efficient Cluster Head Selection protocol (IEECHS-WSN) is proposed, in these technique is used to transfer the received information by using energy efficient routing protocol. In the CH election method, two cluster heads are selected in a separated cluster and its work in various functions, this can be prolong the network lifetime and decrease the energy consumption of IoT applications. Proposed technique is described on clustering of dual CHs in the method of data fusion for data entropy. This information entropy is used for fusion and classification, the result of fusion and classification are accurate and efficient for data transmission. Our proposed IEECHS protocol has better throughput, lifetime of network and energy consumption compared than the existing technique.  相似文献   

7.
Attachment security is known to have various positive outcomes. Recent evidence, however, suggests that security, especially high levels of it, may also have negative outcomes. Three studies tested this possibility. Studies 1 and 2 showed a linear rather than curvilinear trend between security and positive outcomes, suggesting that even at high levels security correlates with positive outcomes. Study 3, which focused on secure behaviors, found that exhibiting high levels of secure behaviors was related to a higher frequency of negative outcomes. However, dispositional attachment security was negatively correlated with negative outcomes, and engaging in secure behaviors strengthened this correlation. These findings suggest that secure behaviors rather than perceptions associated with attachment security (i.e., working models) may be related with negative outcomes.  相似文献   

8.
Parent and peer attachment in early adolescent depression   总被引:7,自引:0,他引:7  
Insecure attachment relations have been theorized to play a significant role in the development of depressogenic modes of adaptation and to thus form a vulnerability factor for the emergence of depressive disorder in children. This study examined security of parent and peer attachment among four groups of early adolescents: clinically depressed, nondepressed psychiatric controls, nonpsychiatric controls, and adolescents with resolved depression. Depressed adolescents reported significantly less secure parent attachment than either of the control groups, and less secure peer attachment than the nonpsychiatric control group. Attachment security of adolescents with resolved depression was on a par with the nonpsychiatric control group. Among all psychiatric patients, security of attachment to parents was negatively correlated with severity of depression according to interview and self-report ratings. Less secure attachment to parents, but generally not to peers, was also related to more maladaptive attributional styles, presence of separation anxiety disorder, and history of suicidal ideation.  相似文献   

9.
The aim of this article is to make attachment research findings available in a form that family therapists can use. In attachment theory, parents are conceptualized as providing a secure base from which a child can explore. Family therapists, however, need a systemic concept that goes beyond the parent/child dyad. The concept of a secure family base is proposed, in which a network of care is made available for all family members of whatever age so that all family members feel secure enough to explore, in the knowledge that support is available if needed. Factors that contribute to the security or insecurity of the family base are outlined. The overall aim of therapy is to establish a secure family base from which the family can explore new solutions to family problems both during and after therapy. The role of the therapist is to help to resolve conflicts that threaten relationships, and to explore relevant belief systems that may be contributing to a sense of insecurity. The conceptual framework presented allows for an integration of family therapy techniques and ideas into a coherent whole. A new school of family therapy is not proposed.  相似文献   

10.
This article explores four legal issues relevant to the provision of care in secure hospitals. These include the current status of right to treatment litigation; the potential impact of the Americans with Disabilities Act; new developments in laws governing restraint and seclusion; and the need for uniform institutional policies on risk assessment. These issues illustrate the potential conflicts between individual autonomy and institutional control that have been at the heart of mental health law for three decades. The article suggests that because of the diminishing oversight provided by the federal judiciary, institutional custodians have a particular obligation to ensure that individual rights are not overwhelmed by concerns with security.  相似文献   

11.
The contact hypothesis suggests that the interaction between members of different groups decreases prejudice. Moderators and mediators shaping this link have been investigated. However, research about the factors that facilitate contact is not frequent. This article examines secure attachment as an antecedent of contact. Three studies provide information about various aspects of the relationship between secure attachment and contact: security is positively associated with (a) intergroup contact, which in turn is related to reduced prejudice (Study 1); (b) implicit approach tendencies toward the outgroup (Study 2); and, once again, (c) with contact through the indirect effect of openness to exploration (Study 3). In the discussion, we recommend priming both secure and insecure schemas to investigate their unique effects on intergroup contact.  相似文献   

12.
This paper propose a novel secure routing mechanism called Spatial and Energy Aware Trusted Dynamic Distance Source Routing (SEAT-DSR) algorithm for enhancing the network life time of wireless sensor networks. Here, the spatial information, energy level, and the effectiveness of data quality are equalized by the Quality of Service (QoS) based energy aware routing algorithms. In addition to this approach, a standard clustering algorithm is also incorporates for grouping the wireless sensor nodes based on the trust score, spatial information, energy level and the distance between the nodes. In this SEAT-DSR is also capable of making decision over the evaluation metrics that are decided and expressed the QoS. Moreover, a new hierarchical trust mechanism is also introduced in this model which adopts multi-attributes of many wireless sensor nodes according to the data communication speed, data size, energy consumption, and the recommendation. This new hierarchical trust method relies over an improved the sliding window time by considering the presence of various attacks frequency to identify the attackers by discovering their anomalous behaviour. The proposed SEAT-DSR is evaluated by conducting many experiments in a simulation environment that creates by using Network Simulator-2 (NS2). The experimental results of the proposed algorithm are proved that the average packet transfer rate is increased drastically than the existing secure routing methodologies.  相似文献   

13.
The importance of image steganography is unquestionable in the field of secure multimedia communication. Imperceptibility and high payload capacity are some of the crucial parts of any mode of steganography. The proposed work is an attempt to modify the edge-based image steganography which provides higher payload capacity and imperceptibility by making use of machine learning techniques. The approach uses an adaptive embedding process over Dual-Tree Complex Wavelet Transform (DT-CWT) subband coefficients. Machine learning based optimization techniques are employed here to embed the secret data over optimal cover-image-blocks with minimal retrieval error. The embedding process will create a unique secret key which is imperative for the retrieval of data and need to be transmitted to the receiver side via a secure channel. This enhances the security concerns and avoids data hacking by intruders. The algorithm performance is evaluated with standard benchmark parameters like PSNR, SSIM, CF, Retrieval error, BPP and Histogram. The results of the proposed method show the stego-image with PSNR above 50 dB even with a dense embedding of up to 7.87 BPP. This clearly indicates that the proposed work surpasses the state-of-the-art image steganographic systems significantly.  相似文献   

14.
This study tested whether adolescents' attachment style is related to friendship interactions and perceptions of friendship quality. Attachment pairings were contrasted to examine whether dyad members' security of attachment or their models of others was more related to friendship. A total of 44 pairs of same-sex adolescent friends were videotaped as they engaged in an intimate conversation. Participants also completed self-report measures of attachment style and friendship quality. Compared with dyads with at least one insecure partner, dyads with two secure members interacted in ways that promoted a sense of connection with each other. In addition, they did not use as many clarification statements, suggesting a smooth conversational style between the friends. When friend pairs were examined based on positive or negative models of others (i.e., dismissing and fearful vs secure and preoccupied), there were no differences. The findings suggest that security of attachment, rather than type of insecurity, is most related to intimacy in friendship.  相似文献   

15.
This paper focuses on the computation issue of portfolio optimization with scenario-based Value-at-Risk. The main idea is to replace the portfolio selection models with linear programming problems. According to the convex optimization theory and some concepts of ordinary differential equations, a neural network model for solving linear programming problems is presented. The equilibrium point of the proposed model is proved to be equivalent to the optimal solution of the original problem. It is also shown that the proposed neural network model is stable in the sense of Lyapunov and it is globally convergent to an exact optimal solution of the portfolio selection problem with uncertain returns. Several illustrative examples are provided to show the feasibility and the efficiency of the proposed method in this paper.  相似文献   

16.
Constraint Handling Rules (CHR) is an extension to Prolog which opens up a spectrum of hypothesis-based reasoning in logic programs without additional interpretation overhead. Abduction with integrity constraints is one example of hypothesis-based reasoning which can be implemented directly in Prolog and CHR with a straightforward use of available and efficiently implemented facilities.The present paper clarifies the semantic foundations for this way of doing abduction in CHR and Prolog as well as other examples of hypothesis-based reasoning that is possible, including assumptive logic programming, hypotheses with priority and scope, and nonmonotonic reasoning.Examples are presented as executable code so the paper may also serve the additional purpose of a practical guide for developing such programs, and it is demonstrated that the approach provides a seamless integration with existing constraint solvers.  相似文献   

17.
Despite the abundant literature on attachment processes and the development of a secure or insecure attachment orientation during childhood, it is still unclear whether adult attachment style can be changed through systematic interventions, and if so how the change process works. One way to learn more about such change is to create it, on a small scale, in the laboratory. It is already known that a person's sense of security can be momentarily changed in the laboratory ( Mikulincer & Shaver, 2007a ). But there is clearly a difference between very short‐term and longer‐term change. According to Bowlby (1982) , the development of an attachment orientation in childhood is based on many encounters and interactions with caregivers, which gradually create a mental network of relatively stable expectations and concerns. Thus, it may take many episodes of security priming in a laboratory to begin to affect a young adult's attachment style in a lasting way. Here, we explore this possibility, review existing evidence from our own and other researchers’ laboratories, and discuss directions for future research.  相似文献   

18.
This study assessed the association between aspects of mother's employment and security of infant-mother attachment, in combination with proximal (maternal sensitivity) and distal (demographic, maternal, child, child-care) factors. Participants were 145 Australian mothers and their firstborn children. Attachment security was assessed with the Strange Situation at 12 months. Results showed that mothers' prenatal attitudes to work and timing of the return to work made significant, independent contributions to attachment outcomes over and above the effects of proximal and distal predictors. Mothers who expressed more commitment to work and less anxiety about using nonfamily child care, and who returned to work earlier, were more likely to have secure infants. These findings are considered in relation to contemporary expectations about mothers' participation in paid work and other predictors of secure attachment.  相似文献   

19.
OXlearn is a free, platform-independent MATLAB toolbox in which standard connectionist neural network models can be set up, run, and analyzed by means of a user-friendly graphical interface. Due to its seamless integration with the MATLAB programming environment, the inner workings of the simulation tool can be easily inspected and/or extended using native MATLAB commands or components. This combination of usability, transparency, and extendability makes OXlearn an efficient tool for the implementation of basic research projects or the prototyping of more complex research endeavors, as well as for teaching. Both the MATLAB toolbox and a compiled version that does not require access to MATLAB can be downloaded from http://psych.brookes.ac.uk/oxlearn/.  相似文献   

20.
This paper presents a multiple-objective metaheuristic procedure—Pareto simulated annealing. The goal of the procedure is to find in a relatively short time a good approximation of the set of efficient solutions of a multiple-objective combinatorial optimization problem. The procedure uses a sample, of so-called generating solutions. Each solution explores its neighbourhood in a way similar to that of classical simulated annealing. Weights of the objectives, used for their local aggregation, are tuned in each iteration in order to assure a tendency for approaching the efficient solutions set while maintaining a uniform distribution of the generating solutions over this set. A computational experiment shows that the method is a better tool for approximating the efficient set than some previous proposals. © 1998 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号