期刊文献+
共找到396篇文章
< 1 2 20 >
每页显示 20 50 100
Accessing Multi-Source Geological Data through Network in MORPAS Software System 被引量:3
1
作者 MeiHongbo HuGuangdao +1 位作者 ChinJian~o LiZhenhua 《Journal of China University of Geosciences》 SCIE CSCD 2003年第3期265-268,共4页
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,... MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system. 展开更多
关键词 multi-source geological data SQL Server accessing data through network
在线阅读 下载PDF
A blockchain-based transaction system for private data sharing and trading 被引量:1
2
作者 Wei Cui Yu Pan Zhendong Ai 《Control Theory and Technology》 EI CSCD 2022年第3期291-302,共12页
To address the private data management problems and realize privacy-preserving data sharing,a blockchain-based transaction system named Ecare featuring information transparency,fairness and scalability is proposed.The... To address the private data management problems and realize privacy-preserving data sharing,a blockchain-based transaction system named Ecare featuring information transparency,fairness and scalability is proposed.The proposed system formulates multiple private data access control strategies,and realizes data trading and sharing through on-chain transactions,which makes transaction records transparent and immutable.In our system,the private data are encrypted,and the role-based account model ensures that access to the data requires owner’s authorization.Moreover,a new consensus protocol named Proof of Transactions(PoT)proposed by ourselves has been used to improve consensus efficiency.The value of Ecare is not only that it aggregates telemedicine,data transactions,and other features,but also that it translates these actions into transaction events stored in the blockchain,making them transparent and immutable to all participants.The proposed system can be extended to more general big data privacy protection and data transaction scenarios. 展开更多
关键词 Private data sharing Blockchain data access control Proof of Transactions
原文传递
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
3
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
在线阅读 下载PDF
Construction of a reusable data access layer based on .NET
4
作者 王远斌 《Journal of Chongqing University》 CAS 2005年第2期76-79,共4页
A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution util... A new design solution of data access layer for N-tier architecture is presented. It can solve the problems such as low efficiency of development and difficulties in transplantation, update and reuse. The solution utilizes the reflection technology of .NET and design pattern. A typical application of the solution demonstrates that the new solution of data access layer performs better than the current N-tier architecture. More importantly, the application suggests that the new solution of data access layer can be reused effectively. 展开更多
关键词 N-tier architecture data access layer reflection technology REUSE
在线阅读 下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
5
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD data STORAGE CLOUD Service PROVIDER Formula-Based CLOUD data access Control Multi-Agent system and Secure Java Agent Development Framework
在线阅读 下载PDF
Database-oriented storage based on LMDB and linear octree for massive block model 被引量:6
6
作者 毕林 赵辉 贾明涛 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2016年第9期2462-2468,共7页
Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, incl... Data organization requires high efficiency for large amount of data applied in the digital mine system. A new method of storing massive data of block model is proposed to meet the characteristics of the database, including ACID-compliant, concurrency support, data sharing, and efficient access. Each block model is organized by linear octree, stored in LMDB(lightning memory-mapped database). Geological attribute can be queried at any point of 3D space by comparison algorithm of location code and conversion algorithm from address code of geometry space to location code of storage. The performance and robustness of querying geological attribute at 3D spatial region are enhanced greatly by the transformation from 3D to 2D and the method of 2D grid scanning to screen the inner and outer points. Experimental results showed that this method can access the massive data of block model, meeting the database characteristics. The method with LMDB is at least 3 times faster than that with etree, especially when it is used to read. In addition, the larger the amount of data is processed, the more efficient the method would be. 展开更多
关键词 block model linear octree lightning memory-mapped database mass data access digital mine etree
在线阅读 下载PDF
应用Access数据库建立的一种卫生检验数据管理系统 被引量:1
7
作者 林吉年 《职业与健康》 CAS 2006年第2期129-130,共2页
为了提高卫生检验数据管理的质量和工作效率,并使检验报告科学化、规范化。应用Access数据库进行卫生检验数据管理系统的编程。应用Access数据库编写的卫生检验数据管理系统具有操作简单、直观、易掌握、易修改、安全和方便的特点,大大... 为了提高卫生检验数据管理的质量和工作效率,并使检验报告科学化、规范化。应用Access数据库进行卫生检验数据管理系统的编程。应用Access数据库编写的卫生检验数据管理系统具有操作简单、直观、易掌握、易修改、安全和方便的特点,大大提高了工作效率。应用Access建立卫生检验数据管理系统是目前最简单实用的方法之一,适合各基层单位开发使用。 展开更多
关键词 access数据库 检验数据 管理系统
暂未订购
巧用Access和Excel实现对高校招生数据的处理 被引量:1
8
作者 李建飞 《闽西职业技术学院学报》 2017年第2期109-112,共4页
"全国普通高校招生管理系统"在实现远程录取中起到了关键的作用,但该系统的院校子系统版本,缺乏对录取信息的直观统计功能。综合利用通俗易懂的Access和Excel等办公自动化软件,可轻松实现对高校招生数据的处理,大幅提高工作... "全国普通高校招生管理系统"在实现远程录取中起到了关键的作用,但该系统的院校子系统版本,缺乏对录取信息的直观统计功能。综合利用通俗易懂的Access和Excel等办公自动化软件,可轻松实现对高校招生数据的处理,大幅提高工作效率。 展开更多
关键词 高校招生管理系统 数据处理 access EXCEL
在线阅读 下载PDF
用VB.NET和ACCESS实现监督监测报告报表编制系统
9
作者 蔡焕兴 龙湘 《环境监测管理与技术》 北大核心 2006年第4期42-44,共3页
将V isual basic.net 2003作为前台界面开发,Access2000作为后台数据库的监测数据管理系统用于环境监测报告和报表的编制时,既提高了报告的编制速度和质量,又提高了监测数据的安全性和监测数据应用查询效率。
关键词 VB.NET access 监测数据 系统管理
在线阅读 下载PDF
基于Access数据库船舶设备智能诊断系统 被引量:1
10
作者 蔡冬林 《南通航运职业技术学院学报》 2005年第4期31-35,共5页
船舶的轮机管理人员通常仅能解决一些普通的维修问题,大多数疑难、综合故障仍得靠船舶维修专家来处理。特别是现代化的船舶,机舱设备种类众多,结构复杂,自动化程度高,对轮机人员的专业水平要求更高,一旦出现故障,部分轮机人员往往束手无... 船舶的轮机管理人员通常仅能解决一些普通的维修问题,大多数疑难、综合故障仍得靠船舶维修专家来处理。特别是现代化的船舶,机舱设备种类众多,结构复杂,自动化程度高,对轮机人员的专业水平要求更高,一旦出现故障,部分轮机人员往往束手无策,这将会影响航行安全和航期,船舶公司每年要为此花费大量的成本。因此开发智能诊断系统并装船使用就显得非常必要。 展开更多
关键词 船舶设备 故障诊断 专家系统 access数据库
在线阅读 下载PDF
基于Delphi和Access开发使用林地数据管理系统 被引量:1
11
作者 张煜 《林业调查规划》 2013年第3期48-50,54,共4页
以Microsoft Access作为后台数据库,应用程序开发软件Delphi 2007开发了"使用林地数据管理系统",目的在于减轻数据统计的工作量,保证成果数据的准确性,完善数据档案的管理,进而提高工作效率。
关键词 使用林地 数据管理系统 数据库设计 access DELPHI
在线阅读 下载PDF
基于ACCESS的仓储管理系统的设计 被引量:3
12
作者 周茜 兰羽 《电子设计工程》 2013年第23期47-49,共3页
为了实现企业产品管理的系统化、规范化和自动化,从而提高企业管理效率。针对中小企业仓储产品管理情况,以ACCESS软件为开发平台,设计了仓储产品信息管理系统。系统经测试,运行效果良好,数据准确性高,而且具有界面美观、操作简单、安全... 为了实现企业产品管理的系统化、规范化和自动化,从而提高企业管理效率。针对中小企业仓储产品管理情况,以ACCESS软件为开发平台,设计了仓储产品信息管理系统。系统经测试,运行效果良好,数据准确性高,而且具有界面美观、操作简单、安全性高。设计的管理系统提高了产品管理流通效率,为中小企业仓储产品管理提供了一种仓储产品管理平台,实现了企业产品管理的信息化。 展开更多
关键词 access软件 仓储管理系统 E-R模型 数据库
在线阅读 下载PDF
Access数据库在高校招生管理系统中的应用
13
作者 原民民 《职业技术教育》 2006年第35期37-38,共2页
基于Access数据库系统可设计出一个不依赖于当前数据库的通用数据库报表,方便输出符合学校实际的通知书和信封的格式。其具体操作包括打开数据库、设置表间关系、建立查询、制作报表等内容。
关键词 高等学校 招生管理系统 access数据库
在线阅读 下载PDF
浅谈基于VB与ACCESS的应用程序体系的安全问题 被引量:1
14
作者 黄雅琼 《电脑知识与技术》 2013年第11X期7398-7399,7407,共3页
VB是MicroSoft公司推出的可视化编程软件,虽然采用它的数据控件和绑定控件项可以对数据库进行操作,但是在应用程序运行的时候,VB中的控件并不能从底层实现对数据库的所有操作,Access是MicroSoft公司研发的数据库管理系统,所以ACCESS和V... VB是MicroSoft公司推出的可视化编程软件,虽然采用它的数据控件和绑定控件项可以对数据库进行操作,但是在应用程序运行的时候,VB中的控件并不能从底层实现对数据库的所有操作,Access是MicroSoft公司研发的数据库管理系统,所以ACCESS和VB相结合的应用,是一种实用性很强的技术方案。数据库的主要任务是存储信息和管理信息,而这些信息往往对于人来说极具隐秘性,所以这些信息的安全问题成为人们最关心的问题之一。数据库作为信息的聚集体,它的安全性问题也就成为了信息安全的最大挑战。Access是一种关系型数据库管理系统,它是一种桌面应用程序,并不是Web应用程序,所以Access在网络环境中会存在很多安全隐患,该文从这些安全隐患入手,做了一些探讨,并且提出了几种解决方案,希望能增强信息管理体系的数据库安全性。 展开更多
关键词 access VB 数据库 信息管理系统 数据安全
在线阅读 下载PDF
基于Delphi+Access的会议签到系统设计及实现
15
作者 潘承斌 《电脑编程技巧与维护》 2011年第10期25-27,共3页
介绍一种基于Delphi+Access的会议签到系统的设计及实现方案,并给出了相应的系统结构图与软件流程图和部分程序源代码。
关键词 会议签到系统 DELPHI access 数据库
在线阅读 下载PDF
STEP-based Feature Recognition System for B-spline Surface Features 被引量:4
16
作者 Bitla Venu Venkateswara Rao Komma Deepanshu Srivastava 《International Journal of Automation and computing》 EI CSCD 2018年第4期500-512,共13页
The geometrical and topological information of 3D computer aided design (CAD) models should be represented as a neut- ral format file to exchange the data between different CAD systems. Exchange of 3D CAD model data... The geometrical and topological information of 3D computer aided design (CAD) models should be represented as a neut- ral format file to exchange the data between different CAD systems. Exchange of 3D CAD model data implies that the companies must exchange complete information about their products, all the way from design, manufacturing to inspection and shipping. This informa- tion should be available to each relevant partner over the entire life cycle of the product. This led to the development of an international standard organization (ISO) neutral format file named as standard for the exchange of product model data (STEP). It has been ob- served from the literature, the feature recognition systems developed were identified as planar, cylindrical, conical and to some extent spherical and toroidal surfaces. The advanced surface features such as B-spline and its subtypes are not identified. Therefore, in this work, a STEP-based feature recognition system is developed to recognize t--spline surface features and its sub-types from the 3D CAD model represented in AP203 neutral file format. The developed feature recognition system is implemented in Java programming language and the product model data represented in STEP AP203 format is interpreted through Java standard data access interface (JSDAI). The developed system could recognize B-spline surface features such as B-Spline surface with knots, quasi uniform surface, uniform surface, rational surface and Bezier surface. The application of extracted B-spline surface features information is discussed with reference to the toolpath generation for STEP-NC (STEP AP238). 展开更多
关键词 Feature recognition 3D computer aided design(CAD)model geometrical information standard for the exchange ofproduct model data(STEP)AP203 Java standard data access interface(JSDAI).
原文传递
Flight Characteristics Analysis Based on QAR Data of a Jet Transport During Landing at a High-altitude Airport 被引量:5
17
作者 C.Edward Lan WU Kaiyuan YU Jiang 《Chinese Journal of Aeronautics》 SCIE EI CSCD 2012年第1期13-24,共12页
Flight data of a twin-jet transport aircraft in revenue flight are analyzed for potential safety problems. Data from the quick access recorder (QAR) are first filtered through the kinematic compatibility analysis. T... Flight data of a twin-jet transport aircraft in revenue flight are analyzed for potential safety problems. Data from the quick access recorder (QAR) are first filtered through the kinematic compatibility analysis. The filtered data are then organized into longitudinal- and lateral-directional aerodynamic model data with dynamic ground effect. The dynamic ground effect requires the radio height and sink rate in the models. The model data are then refined into numerical models through a fuzzy logic algorithm without data smoothing in advance. These numerical models describe nonlinear and unsteady aerodynamics and are used in nonlinear flight dynamics simulation. For the jet transport under study, it is found that the effect of crosswind is significant enough to excite the Dutch roll motion. Through a linearized analysis in flight dynamics at every instant of time, the Dutch roll motion is found to be in nonlinear oscillation without clear damping of the amplitude. In the analysis, all stability derivatives vary with time and hence are nonlinear functions of state variables. Since the Dutch roll motion is not damped despite the fact that a full-time yaw damper is engaged, it is concluded that the design data for the yaw damper is not sufficiently realistic and the contribution of time derivative of sideslip angle to damping should be considered. As a result of nonlinear flight simulation, the vertical wind acting on the aircraft is estimated to be mostly updraft which varies along the flight path before touchdown. Varying updraft appears to make the descent rate more difficult to control to result in a higher g-load at touchdown. 展开更多
关键词 jet transport unsteady aerodynamics nonlinear aerodynamics flight dynamics flight safety quick access recorder data
原文传递
电子信息系统中的数据隐私保护与加密技术研究
18
作者 杨洪金 《计算机应用文摘》 2026年第2期241-242,245,共3页
文章从数据隐私保护的重要性角度出发,系统分析了当前常用的加密技术及其在电子信息系统中的应用,并提出了一种结合对称加密、非对称加密和访问控制策略的综合保护方案。实践应用表明,该方案在保证数据安全性和隐私性的同时,对系统性能... 文章从数据隐私保护的重要性角度出发,系统分析了当前常用的加密技术及其在电子信息系统中的应用,并提出了一种结合对称加密、非对称加密和访问控制策略的综合保护方案。实践应用表明,该方案在保证数据安全性和隐私性的同时,对系统性能的影响程度较低,能够有效应对电子信息系统中潜在的数据泄露风险。 展开更多
关键词 电子信息系统 数据隐私 加密技术 信息安全 访问控制
在线阅读 下载PDF
A distributed authentication and authorization scheme for in-network big data sharing 被引量:3
19
作者 Ruidong Li Hitoshi Asaeda +1 位作者 Jie Li Xiaoming Fu 《Digital Communications and Networks》 SCIE 2017年第4期226-235,共10页
Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, w... Big data has a strong demand for a network infrastructure with the capability to support data sharing and retrieval efficiently. Information-centric networking (ICN) is an emerging approach to satisfy this demand, where big data is cached ubiquitously in the network and retrieved using data names. However, existing authentication and authorization schemes rely mostly on centralized servers to provide certification and mediation services for data retrieval. This causes considerable traffic overhead for the secure distributed sharing of data. To solve this problem, we employ identity-based cryptography (IBC) to propose a Distributed Authentication and Authorization Scheme (DAAS), where an identity-based signature (IBS) is used to achieve distributed verifications of the identities of publishers and users. Moreover, Ciphertext-Policy Attribnte-based encryption (CP-ABE) is used to enable the distributed and fine-grained authorization. DAAS consists of three phases: initialization, secure data publication, and secure data retrieval, which seamlessly integrate authentication and authorization with the in- terest/data communication paradigm in ICN. In particular, we propose trustworthy registration and Network Operator and Authority Manifest (NOAM) dissemination to provide initial secure registration and enable efficient authentication for global data retrieval. Meanwhile, Attribute Manifest (AM) distribution coupled with automatic attribute update is proposed to reduce the cost of attribute retrieval. We examine the performance of the proposed DAAS, which shows that it can achieve a lower bandwidth cost than existing schemes. 展开更多
关键词 Big data Security Authentication access control In-network data sharing Information-centric network
在线阅读 下载PDF
Quick System-Level DDR3 Signal Integrity Simulation Research 被引量:2
20
作者 Run-Jing Zhou Yuan-Yuan Hao Jin-Song Hu 《Journal of Electronic Science and Technology》 CAS 2013年第3期286-290,共5页
---Double data rate synchronous dynamic random access memory (DDR3) has become one of the most mainstream applications in current server and computer systems. In order to quickly set up a system-level signal integri... ---Double data rate synchronous dynamic random access memory (DDR3) has become one of the most mainstream applications in current server and computer systems. In order to quickly set up a system-level signal integrity (SI) simulation flow for the DDR3 interface, two system-level SI simulation methodologies, which are board-level S-parameter extraction in the frequency-domain and system-level simulation assumptions in the time domain, are introduced in this paper. By comparing the flow of Speed2000 and PowerSI/Hspice, PowerSI is chosen for the printed circuit board (PCB) board-level S-parameter extraction, while Tektronix oscilloscope (TDS7404) is used for the DDR3 waveform measurement. The lab measurement shows good agreement between simulation and measurement. The study shows that the combination of PowerSI and Hspice is recommended for quick system-level DDR3 SI simulation. 展开更多
关键词 Index Terms--Double data rate synchronousdynamic random access memory HSPICE PowerSI signal integrity system-level signal integrity simulation.
在线阅读 下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部