前沿技术 之 CORBA 3

CORBA & Internet: How does it work?
Based on hypertext principles, the World Wide Web technology was developed as a technology standard for distribution and presentation of data. It let's you link documents that are located on different network nodes. WWW is based on the TCP/IP protocol, of course.

However, the developers at CERN in Geneva did certainly not expect the popularity that the WWW achieved meanwhile. With this popularity, more features were added including dynamic pages or to sending data from the client to the server for further processing. In 1995, the Common Gateway Interface (CGI) was introduced for that purpose. With CGI, the client send information via a file transfer mechanism to the server where the data is read and processed. The server side is usually implemented with the language PERL. To implement such a PERL interface is tedious and difficult. And once in operation, performance is poor. Additionally, dynamic dialogues between client and server are impossible due to the block-oriented nature of data transfer.

At this point, the "Internet Inter-ORB Protocol" (IIOP) enters the scene. Early versions (1.x) of CORBA did not specify an ORB-internal communication protocol. That is, every ORB vendor determined how its ORB would communicate internally. For that reason, it was impossible to send messages from one ORB to an object living in another ORB vendor's server process. Consequently, CORBA 2.0 defined IIOP. IIOP as a standardized protocol allows communication between different ORB-products. There was a proof of concept at Object World West in August 1995: object request brokers from more than a dozen ORB vendors communicated as they were a single system! Many different HW and OS platforms were involved and several implementation languages like C, C++ and Smalltalk.

Thanks to Java and ORBs supporting Java, the inter-ORB concept was taken to the Internet. Today, WWW-browsers can act as clients that access objects on the server via IIOP. The traditional WWW-protocol (HTTP) is not used anymore. The following figure depicts the bootstrapping of a IIOP connection between a client browser and the IIOP-server.

  1. The client requests a HTML-page at the HTTP-server. The client loads it and recognizes that it references Java-code.

  2. The client requests the Java classes at the HTTP-server. The downloaded classes in our example are not standard applets but "ORBlets". They enable the browser to communicate with the CORBA server. ORBlets are application level classes, e.g. a customer object proxy.
    In case that the browser does not have the IIOP java archive, the server must download the basic IIOP classes, too.

  3. The client establishes not the connection to the CORBA server. If done successfully, the client can send messages to objects living in the CORBA server, avoiding the HTTP/CGI bottleneck.

Advantages:

  • client and server communicate with much less overhead

  • server functions can have a return value

  • real Data Types - and not only strings - can be exchanged

  • the server side objects can be implemented in any language (where an CORBA 2.0 compliant ORB is available)

We don't want to give the impression here that IIOP is the infamous "Silver Bullet". Especially when used in Wide-Area-Networks, data often needs to be cached on the client and it is useful to do certain processing directly on the client-side, thus ??undermining a clean 3-tier-architecture. Security is another topic, but that's not specific to IIOP. CORBA offers here a great set of mechanisms (see our security page). However, it can be tricky to work around certain Internet security mechanisms that come with the browsers or with firewall products.

Besides these drawbacks, IIOP allows the Internet browser to act as a true application shell. Netscape recognized that and included the necessary ORB components in their client and server products. Microsoft goes a very similar way, but uses its proprietary ActiveX/DCOM technology instead of CORBA.

d-tec Distributed Technologies GmbH, 1998
 

摘自 Internet
深度学习是机器学习的一个子领域,它基于人工神经网络的研究,特别是利用多层次的神经网络来进行学习和模式识别。深度学习模型能够学习数据的高层次特征,这些特征对于图像和语音识别、自然语言处理、医学图像分析等应用至关重要。以下是深度学习的一些关键概念和组成部分: 1. **神经网络(Neural Networks)**:深度学习的基础是人工神经网络,它是由多个层组成的网络结构,包括输入层、隐藏层和输出层。每个层由多个神经元组成,神经元之间通过权重连接。 2. **前馈神经网络(Feedforward Neural Networks)**:这是最常见的神经网络类型,信息从输入层流向隐藏层,最终到达输出层。 3. **卷积神经网络(Convolutional Neural Networks, CNNs)**:这种网络特别适合处理具有网格结构的数据,如图像。它们使用卷积层来提取图像的特征。 4. **循环神经网络(Recurrent Neural Networks, RNNs)**:这种网络能够处理序列数据,如时间序列或自然语言,因为它们具有记忆功能,能够捕捉数据中的时间依赖性。 5. **长短期记忆网络(Long Short-Term Memory, LSTM)**:LSTM 是一种特殊的 RNN,它能够学习长期依赖关系,非常适合复杂的序列预测任务。 6. **生成对抗网络(Generative Adversarial Networks, GANs)**:由两个网络组成,一个生成器和一个判别器,它们相互竞争,生成器生成数据,判别器评估数据的真实性。 7. **深度学习框架**:如 TensorFlow、Keras、PyTorch 等,这些框架提供了构建、训练和部署深度学习模型的工具和库。 8. **激活函数(Activation Functions)**:如 ReLU、Sigmoid、Tanh 等,它们在神经网络中用于添加非线性,使得网络能够学习复杂的函数。 9. **损失函数(Loss Functions)**:用于评估模型的预测与真实值之间的差异,常见的损失函数包括均方误差(MSE)、交叉熵(Cross-Entropy)等。 10. **优化算法(Optimization Algorithms)**:如梯度下降(Gradient Descent)、随机梯度下降(SGD)、Adam 等,用于更新网络权重,以最小化损失函数。 11. **正则化(Regularization)**:技术如 Dropout、L1/L2 正则化等,用于防止模型过拟合。 12. **迁移学习(Transfer Learning)**:利用在一个任务上训练好的模型来提高另一个相关任务的性能。 深度学习在许多领域都取得了显著的成就,但它也面临着一些挑战,如对大量数据的依赖、模型的解释性差、计算资源消耗大等。研究人员正在不断探索新的方法来解决这些问题。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值