期刊文献+
共找到395篇文章
< 1 2 20 >
每页显示 20 50 100
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
1
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
在线阅读 下载PDF
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
2
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
在线阅读 下载PDF
A blockchain-based transaction system for private data sharing and trading 被引量:1
3
作者 Wei Cui Yu Pan Zhendong Ai 《Control Theory and Technology》 EI CSCD 2022年第3期291-302,共12页
To address the private data management problems and realize privacy-preserving data sharing,a blockchain-based transaction system named Ecare featuring information transparency,fairness and scalability is proposed.The... To address the private data management problems and realize privacy-preserving data sharing,a blockchain-based transaction system named Ecare featuring information transparency,fairness and scalability is proposed.The proposed system formulates multiple private data access control strategies,and realizes data trading and sharing through on-chain transactions,which makes transaction records transparent and immutable.In our system,the private data are encrypted,and the role-based account model ensures that access to the data requires owner’s authorization.Moreover,a new consensus protocol named Proof of Transactions(PoT)proposed by ourselves has been used to improve consensus efficiency.The value of Ecare is not only that it aggregates telemedicine,data transactions,and other features,but also that it translates these actions into transaction events stored in the blockchain,making them transparent and immutable to all participants.The proposed system can be extended to more general big data privacy protection and data transaction scenarios. 展开更多
关键词 Private data sharing Blockchain data access control Proof of Transactions
原文传递
Construction of a reusable data access layer based on .NET
4
作者 王远斌 《Journal of Chongqing University》 CAS 2005年第2期76-79,共4页
A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution util... A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution utilizes the reflection technology of .NET and design pattern. A typical application of the solution demonstrates that the new solution of data access layer performs better than the current N-tier architecture. More importantly, the application suggests that the new solution of data access layer can be reused effectively. 展开更多
关键词 N-tier architecture data access layer reflection technology REUSE
在线阅读 下载PDF
Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Ciphertext-Policy Attribute-Based Encryption
5
作者 Zongbao Jiang Minqing Zhang +2 位作者 Weina Dong Chao Jiang Fuqiang Di 《Computers, Materials & Continua》 SCIE EI 2024年第10期1123-1155,共33页
With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed... With the rapid advancement of cloud computing technology,reversible data hiding algorithms in encrypted images(RDH-EI)have developed into an important field of study concentrated on safeguarding privacy in distributed cloud environments.However,existing algorithms often suffer from low embedding capacities and are inadequate for complex data access scenarios.To address these challenges,this paper proposes a novel reversible data hiding algorithm in encrypted images based on adaptive median edge detection(AMED)and ciphertext-policy attributebased encryption(CP-ABE).This proposed algorithm enhances the conventional median edge detection(MED)by incorporating dynamic variables to improve pixel prediction accuracy.The carrier image is subsequently reconstructed using the Huffman coding technique.Encrypted image generation is then achieved by encrypting the image based on system user attributes and data access rights,with the hierarchical embedding of the group’s secret data seamlessly integrated during the encryption process using the CP-ABE scheme.Ultimately,the encrypted image is transmitted to the data hider,enabling independent embedding of the secret data and resulting in the creation of the marked encrypted image.This approach allows only the receiver to extract the authorized group’s secret data,thereby enabling fine-grained,controlled access.Test results indicate that,in contrast to current algorithms,the method introduced here considerably improves the embedding rate while preserving lossless image recovery.Specifically,the average maximum embedding rates for the(3,4)-threshold and(6,6)-threshold schemes reach 5.7853 bits per pixel(bpp)and 7.7781 bpp,respectively,across the BOSSbase,BOW-2,and USD databases.Furthermore,the algorithm facilitates permission-granting and joint-decryption capabilities.Additionally,this paper conducts a comprehensive examination of the algorithm’s robustness using metrics such as image correlation,information entropy,and number of pixel change rate(NPCR),confirming its high level of security.Overall,the algorithm can be applied in a multi-user and multi-level cloud service environment to realize the secure storage of carrier images and secret data. 展开更多
关键词 Ciphertext-policy attribute-based encryption complex data access structure reversible data hiding large embedding space
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
6
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD data STORAGE CLOUD Service PROVIDER Formula-Based CLOUD data access Control Multi-Agent system and Secure Java Agent Development Framework
在线阅读 下载PDF
Database-oriented storage based on LMDB and linear octree for massive block model 被引量:6
7
作者 毕林 赵辉 贾明涛 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2016年第9期2462-2468,共7页
Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, incl... Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, including ACID-compliant, concurrency support, data sharing, and efficient access. Each block model is organized by linear octree, stored in LMDB(lightning memory-mapped database). Geological attribute can be queried at any point of 3D space by comparison algorithm of location code and conversion algorithm from address code of geometry space to location code of storage. The performance and robustness of querying geological attribute at 3D spatial region are enhanced greatly by the transformation from 3D to 2D and the method of 2D grid scanning to screen the inner and outer points. Experimental results showed that this method can access the massive data of block model, meeting the database characteristics. The method with LMDB is at least 3 times faster than that with etree, especially when it is used to read. In addition, the larger the amount of data is processed, the more efficient the method would be. 展开更多
关键词 block model linear octree lightning memory-mapped database mass data access digital mine etree
在线阅读 下载PDF
非法获取计算机信息系统数据罪中“数据”范围的界定
8
作者 王玉珏 李雁飞 《犯罪研究》 2025年第3期48-58,共11页
非法获取计算机信息系统数据罪中的“数据”范围应当随着社会对数据应用方式的演变作出契合时代背景的解释。立法与司法解释并未限制本罪中“数据”用语的含义范围,“数据”也并不局限于身份认证信息。现阶段对“数据”范围的理解应当... 非法获取计算机信息系统数据罪中的“数据”范围应当随着社会对数据应用方式的演变作出契合时代背景的解释。立法与司法解释并未限制本罪中“数据”用语的含义范围,“数据”也并不局限于身份认证信息。现阶段对“数据”范围的理解应当把握住数据分析性价值的内核,将数据价值释放的动态安全纳入本罪的保护范围。数据不仅是信息的载体还是信息产生的渊源,信息不仅是数据的内容而且是数据的价值和意义所在。应当将“数据集合”纳入“数据”概念的范围之内,同时明确不同类型数据的认定标准与裁判规则。“云存储数据”理应属于本罪“数据”的范围。在立法规定尚存解释空间时,修正司法解释是改进当下非法获取计算机信息系统数据罪司法适用的最优方案。 展开更多
关键词 非法获取计算机信息系统数据罪 范围界定 数据集合 数据要素
在线阅读 下载PDF
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
9
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3GPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5G mobile communication
在线阅读 下载PDF
应用Access数据库建立的一种卫生检验数据管理系统 被引量:1
10
作者 林吉年 《职业与健康》 CAS 2006年第2期129-130,共2页
为了提高卫生检验数据管理的质量和工作效率,并使检验报告科学化、规范化。应用Access数据库进行卫生检验数据管理系统的编程。应用Access数据库编写的卫生检验数据管理系统具有操作简单、直观、易掌握、易修改、安全和方便的特点,大大... 为了提高卫生检验数据管理的质量和工作效率,并使检验报告科学化、规范化。应用Access数据库进行卫生检验数据管理系统的编程。应用Access数据库编写的卫生检验数据管理系统具有操作简单、直观、易掌握、易修改、安全和方便的特点,大大提高了工作效率。应用Access建立卫生检验数据管理系统是目前最简单实用的方法之一,适合各基层单位开发使用。 展开更多
关键词 access数据库 检验数据 管理系统
暂未订购
巧用Access和Excel实现对高校招生数据的处理 被引量:1
11
作者 李建飞 《闽西职业技术学院学报》 2017年第2期109-112,共4页
"全国普通高校招生管理系统"在实现远程录取中起到了关键的作用,但该系统的院校子系统版本,缺乏对录取信息的直观统计功能。综合利用通俗易懂的Access和Excel等办公自动化软件,可轻松实现对高校招生数据的处理,大幅提高工作... "全国普通高校招生管理系统"在实现远程录取中起到了关键的作用,但该系统的院校子系统版本,缺乏对录取信息的直观统计功能。综合利用通俗易懂的Access和Excel等办公自动化软件,可轻松实现对高校招生数据的处理,大幅提高工作效率。 展开更多
关键词 高校招生管理系统 数据处理 access EXCEL
在线阅读 下载PDF
用VB.NET和ACCESS实现监督监测报告报表编制系统
12
作者 蔡焕兴 龙湘 《环境监测管理与技术》 北大核心 2006年第4期42-44,共3页
将V isual basic.net 2003作为前台界面开发,Access2000作为后台数据库的监测数据管理系统用于环境监测报告和报表的编制时,既提高了报告的编制速度和质量,又提高了监测数据的安全性和监测数据应用查询效率。
关键词 VB.NET access 监测数据 系统管理
在线阅读 下载PDF
基于Access数据库船舶设备智能诊断系统 被引量:1
13
作者 蔡冬林 《南通航运职业技术学院学报》 2005年第4期31-35,共5页
船舶的轮机管理人员通常仅能解决一些普通的维修问题,大多数疑难、综合故障仍得靠船舶维修专家来处理。特别是现代化的船舶,机舱设备种类众多,结构复杂,自动化程度高,对轮机人员的专业水平要求更高,一旦出现故障,部分轮机人员往往束手无... 船舶的轮机管理人员通常仅能解决一些普通的维修问题,大多数疑难、综合故障仍得靠船舶维修专家来处理。特别是现代化的船舶,机舱设备种类众多,结构复杂,自动化程度高,对轮机人员的专业水平要求更高,一旦出现故障,部分轮机人员往往束手无策,这将会影响航行安全和航期,船舶公司每年要为此花费大量的成本。因此开发智能诊断系统并装船使用就显得非常必要。 展开更多
关键词 船舶设备 故障诊断 专家系统 access数据库
在线阅读 下载PDF
基于Delphi和Access开发使用林地数据管理系统 被引量:1
14
作者 张煜 《林业调查规划》 2013年第3期48-50,54,共4页
以Microsoft Access作为后台数据库,应用程序开发软件Delphi 2007开发了"使用林地数据管理系统",目的在于减轻数据统计的工作量,保证成果数据的准确性,完善数据档案的管理,进而提高工作效率。
关键词 使用林地 数据管理系统 数据库设计 access DELPHI
在线阅读 下载PDF
面向跨境的去中心分布式数字身份框架设计
15
作者 陈健 蔡智明 +1 位作者 齐佳音 方滨兴 《中国工程科学》 北大核心 2025年第1期88-97,共10页
进入数字化时代后,跨境数据流动衍生出数据主权要求,在个人数据隐私保护、灵活高效的授权访问之间矛盾凸显;数字身份框架作为解决这一矛盾的关键基础支撑,研究价值突出。本文在梳理跨境数字身份认证模型研究发展态势的基础上,提出了一... 进入数字化时代后,跨境数据流动衍生出数据主权要求,在个人数据隐私保护、灵活高效的授权访问之间矛盾凸显;数字身份框架作为解决这一矛盾的关键基础支撑,研究价值突出。本文在梳理跨境数字身份认证模型研究发展态势的基础上,提出了一种去中心化分布式跨境身份认证框架,引入数据分类分级策略,包含基于区块链的去中心化身份管理机制、动态数据属性分类与分级的通用认证池模型、隐私保护与访问控制策略3个核心模块,用于克服传统的集中式模型在跨境场景中的信任与合规性问题。进一步剖析了属性关联异构分级的效率和精度、跨境双方属性授权信任边界的博弈等跨境数字身份认证框架的应用难点,从认证框架应用封装的应用程序编程接口模型、认证框架的评估标准和实施路径等方面出发完善了相应解决方案。相关框架设计方案及发展理念,不仅为跨境数字身份认证提供了实践参考,而且为构建跨境数据流动的统一标准和安全规范提供了新的技术思路与实施路径。 展开更多
关键词 跨境数据 去中心化数字身份 分布式系统 隐私保护 访问控制 区块链技术
在线阅读 下载PDF
基于密文属性的物联网环境私有数据访问控制系统设计
16
作者 黄雄平 《计算机测量与控制》 2025年第9期127-134,共8页
物联网环境中的设备和用户数量可能非常庞大且不断变化,系统需要能够适应这种动态性,并支持快速扩展;为此,设计一种基于密文属性的物联网私有数据访问控制系统;该系统由包括客户端模块、服务器模块和密钥生成模块组成;客户端模块主要负... 物联网环境中的设备和用户数量可能非常庞大且不断变化,系统需要能够适应这种动态性,并支持快速扩展;为此,设计一种基于密文属性的物联网私有数据访问控制系统;该系统由包括客户端模块、服务器模块和密钥生成模块组成;客户端模块主要负责数据的接收、加密、密钥管理和解密;服务器模块通过属性基加密算法生成部分密钥组件;通过将访问权限与密文属性绑定,系统可以实现更精细的访问控制,确保只有符合特定属性的用户或设备才能访问数据;利用重加密得出数据主密钥,将数据密钥储存到数据管理库中;密钥生成模块负责维护密钥组件和数据属性集,保证用户取消或新增访问时,及时更新数据属性列表,使得系统能够快速适应新的用户和设备,支持系统的扩展;最后由解密服务器对密钥解密输出明文,实现对物联网环境下私有数据的访问控制;系统测试结果表明,系统能在30 ms时间内完成物联网私有数据的加密和储存,加密强度可达95%,加密后的物联网数据频率直方图波动非常小,访问成功率非常高,确保物联网系统安全稳定的运行。 展开更多
关键词 物联网 数据访问 控制系统 数据加密 属性基加密 密钥生成
在线阅读 下载PDF
基于ACCESS的仓储管理系统的设计 被引量:3
17
作者 周茜 兰羽 《电子设计工程》 2013年第23期47-49,共3页
为了实现企业产品管理的系统化、规范化和自动化,从而提高企业管理效率。针对中小企业仓储产品管理情况,以ACCESS软件为开发平台,设计了仓储产品信息管理系统。系统经测试,运行效果良好,数据准确性高,而且具有界面美观、操作简单、安全... 为了实现企业产品管理的系统化、规范化和自动化,从而提高企业管理效率。针对中小企业仓储产品管理情况,以ACCESS软件为开发平台,设计了仓储产品信息管理系统。系统经测试,运行效果良好,数据准确性高,而且具有界面美观、操作简单、安全性高。设计的管理系统提高了产品管理流通效率,为中小企业仓储产品管理提供了一种仓储产品管理平台,实现了企业产品管理的信息化。 展开更多
关键词 access软件 仓储管理系统 E-R模型 数据库
在线阅读 下载PDF
基于区块链的政务数据共享方案研究
18
作者 罗振华 唐寅 《现代电子技术》 北大核心 2025年第18期22-28,共7页
随着国家数字政府的发展,政府部门间安全可靠的数据共享已成为研究热点。政务部门间的信息共享有助于强化政府机构的管理,提高政府机构的治理和服务水平,发掘政务数据中的经济价值和社会价值。在传统的政务数据管理体系中,数据往往通过... 随着国家数字政府的发展,政府部门间安全可靠的数据共享已成为研究热点。政务部门间的信息共享有助于强化政府机构的管理,提高政府机构的治理和服务水平,发掘政务数据中的经济价值和社会价值。在传统的政务数据管理体系中,数据往往通过集中式的存储方式进行保存,但这容易造成数据隐私泄露、单点故障、“数据孤岛”等问题。为解决该问题,提出一种基于区块链的政务数据共享方案。该方案用属性基加密方案加密政务数据,对数据请求者的属性进行了限制;改进了属性基加密方案,增加了访问控制中的细粒度和减少了计算开销;采用星际文件系统存储数据,缓解了区块链系统的存储压力。安全性分析和仿真实验结果表明,所提方案可满足政务数据安全共享的需求,为跨部门数据安全共享提供了一种可行方案。 展开更多
关键词 政务数据共享 区块链 属性基加密 访问控制 星际文件系统 数据存储
在线阅读 下载PDF
基于数字化服务的电网数据中台系统设计
19
作者 任昊文 何宇新 +1 位作者 刘明伟 王金贺 《微型电脑应用》 2025年第11期84-87,91,共5页
由于电网数据中台设置的限制条件较为单一,导致系统运行失稳,因此,设计基于数字化服务的电网数据中台系统。基于数字化服务技术设计电网数据中台硬件系统的整体架构,包括分析层、共享层和贴源层。分析层负责处理和分析从电网中获取的原... 由于电网数据中台设置的限制条件较为单一,导致系统运行失稳,因此,设计基于数字化服务的电网数据中台系统。基于数字化服务技术设计电网数据中台硬件系统的整体架构,包括分析层、共享层和贴源层。分析层负责处理和分析从电网中获取的原始数据;共享层负责存储和管理经过处理的数据;贴源层负责从各种数据源接入数据,并与这些数据源进行有效的通信和数据交换。在贴源层,需要实现规范化的数据接入,以确保数据的一致性和准确性。在整体架构设计过程中,构建数据流框图,以展示数据在系统中的流动路径和处理过程。通过规范化数据接入的设计,全过程数据处理将对接收到的数据进行进一步的处理和分析,实现对电网数据的高效应用。实验结果表明,所设计系统的数据存储性能好,负载均衡性好,具有较好的效果。 展开更多
关键词 数字化服务 电网数据中台系统 规范化数据接入 全过程数据处理 可能度函数
在线阅读 下载PDF
炮射导弹测试系统数据库设计与实现
20
作者 王云霞 葛双超 +2 位作者 李杰 高正阳 张林竹 《现代电子技术》 北大核心 2025年第22期71-75,共5页
为了满足炮射导弹自动测试系统的数据库功能需求,基于LabWindows/CVI虚拟仪器平台和Access数据库设计一个高效且通用的数据库管理系统。该系统旨在优化测试数据的存储、管理和分析流程,以提升测试效率和数据准确性。首先进行数据库需求... 为了满足炮射导弹自动测试系统的数据库功能需求,基于LabWindows/CVI虚拟仪器平台和Access数据库设计一个高效且通用的数据库管理系统。该系统旨在优化测试数据的存储、管理和分析流程,以提升测试效率和数据准确性。首先进行数据库需求分析;随后设计整体架构和表结构,并实现平台与Access数据库之间的通信;最后,开发了用户管理、数据检索、阈值设置和参数分析等核心功能模块。在实际应用中,该数据库管理系统针对炮射导弹的自动测试展现出了良好的性能,能够有效整合和管理大量的测试数据,不仅满足了测试的基本需求,还具备一定的通用性和可扩展性,为未来可能的系统升级和功能扩展提供了便利,为军事领域的数据管理奠定了坚实的基础。 展开更多
关键词 炮射导弹 自动测试系统 access数据库 LABWINDOWS/CVI 数据管理 架构设计 表设计
在线阅读 下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部