首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
随着企业的信息化程度的提高,越来越多的企业将它们的内部网络联入了互联网,这在给企业带来巨大的便利的同时,也带来了不容忽视的安全问题。本文对企业网络的安全防护所能采取的各种措施作了介绍,并分析了不同方式的优缺点,为构建安全的企业信息网络提供了有价值的参考意见。  相似文献   

3.
分析了高校公共计算机房的现状和存在的问题,介绍了NC机的工作原理,提出利用NC机建设高校公共计算机房。NC机机房能够满足学生的上机要求,而且还能节省成本降低能耗:  相似文献   

4.
Due to significant changes in agro-ecological contexts, farmers need new solutions to produce goods. Modelling complements field experiments in the design of new farming systems. French researchers involved in such design issues developed a specific modelling platform to help model, simulate and evaluate cropping systems. After testing several existing environments, the RECORD platform was developed under the VLE environment, allowing the design of atomic and coupled models. It integrates different time steps and spatial scales and proposes some standard formalisms used to model agro-ecosystems (e.g. difference equations, differential equations, state charts…). A graphic user interface was designed to simplify coding tasks. A variety of research projects already use this platform. Examples are given showing the ability to recode simple models, encapsulate more complex models, link with GIS and databases, and use the R statistical package to run models and analyse simulation outputs. The option to use web interfaces enables application by non-scientist end-users. As the models follow a given standard, they can be placed in a repository and used by other researchers. Linking RECORD to other international platforms is now a compelling issue.  相似文献   

5.
在知识经济时代,计算机技术已经被应用于各行各业的发展之中,并为人们的生产生活带来极大便利.另外,就企业发展与竞争来说,计算机技术的应用也将不断提高企业经营生产水平.所以,企业想要在市场竞争环境中立于不败之地,就一定要积极构建信息化企业,应用计算机技术促使企业能够更方便、快捷的进行发展.  相似文献   

6.
使用Eucalyptus作为私有云的实现平台,并利用KVM制作VM镜像实例,搭建了一个适合实验室资源管理控制的实验云计算平台。  相似文献   

7.
计算机技术的不断发展,网络的不断普及,在给我们的工作,学习,生活,娱乐带来了极大的方便和好处同时,也给我们带来了新的威胁,那就是计算机系统安全问题。而我们的常常讨论的计算机系统安全包括计算机安全、网络安全和信息安全。其中信息安全是主线,它贯穿于计算机安全和网络安全之中。正是网络的广泛应用,在工作和生活中扮演如此重要的角色,如何来保障信息安全已经成为一个重要的问题。值得注意的是在实际应用中,由于操作系统的不同,网络拓扑技术的区别,连接介质的选择,网络接入技术的变化给实现计算机系统安全带来了复杂的操作性。根据参考资料,总结出3个层次的安全策略:技术安全,行为安全,意识安全。  相似文献   

8.
Enterprise models cover all aspects of modern enterprises, from accounting, through management of custom orders and invoicing, to operational data such as records on machines and workers. In other words, all data necessary for running the company are available in enterprise models. However, these data are not in the proper format for some tasks such as scheduling and optimization. Namely, the concepts and terminology used in enterprise models are different from what is traditionally used in scheduling and optimization software. This paper deals with the automated translation of data from the enterprise model to a scheduling model and back. In particular, we describe how to extract data from the enterprise model for solving the scheduling problem using constraint-based solvers.  相似文献   

9.
企业级信息集成平台中的数据中心承担着对企业进行跨业务、多角度、多层次的综合管理的任务,将原来分散、孤立的数据资源集中存储、统一管理。在数据中心的建设中必须进行有效的数据存储与备份,以便在灾难发生时能够快速地恢复数据,从而将灾难带来的损失降到最低点,采用成熟先进的存储备份结构,满足用户需求的备份方式,减少了管理复杂度,提高了利用率,充分的保护了用户的成本。  相似文献   

10.
As the structural and behavioral complexity of systems has increased, so has interest in reusing modules in early development phases. Developing reusable modules and then weaving them into specific systems has been addressed by many approaches, including plug-and-play software component technologies, aspect-oriented techniques, design patterns, superimposition, and product line techniques. Most of these ideas are expressed in an object-oriented framework, so they reuse behaviors after dividing them into methods that are owned by classes. In this paper, we present a crosscutting reuse approach that applies object-process methodology (OPM). OPM, which unifies system structure and behavior in a single view, supports the notion of a process class that does not belong to and is not encapsulated in an object class, but rather stands alone, capable of getting input objects and producing output objects. The approach features the ability to specify modules generically and concretize them in the target application. This is done in a three-step process: designing generic and target modules, weaving them into the system under development, and refining the combined specification in a way that enables the individual modules to be modified after their reuse. Rules for specifying and combining modules are defined and exemplified, showing the flexibility and benefits of this approach.
Shmuel KatzEmail:
  相似文献   

11.
It is usually difficult to design and install complex computer integrated manufacturing (CIM) systems without a large amount of time spent on debugging. In many cases miniature computer controlled physical models can provide information that reduces the time spent in the design and installation of larger systems. This paper describes how miniature physical models can be used to help industrial engineers design and install CIM systems.  相似文献   

12.
In this study, we argue that important IT change processes affecting an organization’s enterprise architecture are also mirrored by a change in the organization’s business model. An analysis of the business model may establish whether the architecture change has value for the business. Therefore, in order to facilitate such analyses, we propose an approach to relate enterprise models specified in ArchiMate to business models, modeled using Osterwalder’s Business Model Canvas. Our approach is accompanied by a method that supports business model-driven migration from a baseline architecture to a target architecture and is demonstrated by means of a case study.  相似文献   

13.
Social content sites allow ordinary internet users to upload, edit, share, and annotate Web content with freely chosen keywords called tags. However, tags are only useful to the extent that they are processable by users and machines, which is often not the case since users frequently provide ambiguous and idiosyncratic tags. Thereby, many social content sites are starting to allow users to enrich their tags with semantic metadata, such as the GeoSocial Content Sites, for example, where users can annotate their tags with geographic metadata. But geographic metadata alone only unveils a very specific facet of a tag, which leads to the need for more general purpose semantic metadata. This paper introduces DYSCS – Do it Yourself Social Content Sites – a platform that combines Web 2.0 and Semantic Web technologies for assisting users in creating their own social content sites enriched with geographic and general purpose semantics. Moreover, DYSCS is highly reusable and interoperable, which are consequences of its ontology driven architecture.  相似文献   

14.
A virtual enterprise (VE) is a dynamic alliance of companies collaborating for the accomplishment of a specific business goal. To establish a VE, it is very important for the VE initiator to select appropriate partners. General criteria such as price, lead time, quality, etc. are the major concerns for most VE initiators. However, in today’s environmentally conscious society, environmental issues such as enterprise green image, product eco-design, etc. are increasingly receiving attention. Thus, it is worth to research on how to select the appropriate collaborative partners to establish an ecological VE.The objective of this paper is to establish a multi-agent system platform for individual companies to form an ecological VE based on ontology theory and intelligent agents. The ontological approaches include shared ontology construction, ontology matching, ontology integration, ontology storage and ontology reasoning. In the generalized case that the VE initiator is a manufacturer and the collaborating partner are suppliers, the multi-agent system comprises three types of intelligent agents, namely, knowledge manager agent (KMrA), manufacturer agent (MA) and supplier agent (SA). MA and SA represent the capabilities and interests of the VE initiator and the VE partners, respectively. KMrA is in charge of functioning sub-tasks of the ontological approach. To select partners for the ecological VE, the VE initiator will also consider the environmental criteria, in addition to the general supplier selection criteria such as price, quantity, quality and lead time. The environmental criteria may include factors such as environmental management, green image, green product and pollution control. The complete set of selection criteria, including the environmental criteria, are categorised into quantitative or qualitative criteria. The formation of ecological VE is then divided into two stages, that is, candidate supplier selection based on qualitative criteria, and ultimate supplier selection based on quantitative criteria. A simplified example is introduced to illustrate and justify the proposed ontological approaches and intelligent agent platform.  相似文献   

15.
A flexible computer vision is described which is able to recognize 3-D objects if their models are given. The models can be built in a CAD process using a geometric modeler GEOMAP. Three cases are studied: surface normals are available, a part of surface normals are available, and range data is available. In order to perform efficient matching, three methods are proposed for those cases: use of EGI representation, use of relative angles between surface normals, and use of kernels.  相似文献   

16.
Multimedia Tools and Applications - This paper presents the design and evaluation of the multipurpose platform for domestic ambient media research and applications through an improved method called...  相似文献   

17.
Models of pattern-generating cellular sheets were devised to gain insight into the origin of patterns in embryogenesis. Students, many of whom had no previous experience with computers, worked with these models to test the effect of various assumptions. A number of discoveries of possible biological importance were made, but an unexpected discovery was the usefulness of human intuition. When the computer and its program made user interaction easy, the user “played” the model as one might play an arcade game. The model's capabilities and limits were grasped intuitively. Later, analysis led us to new assumptions and new models. Thus the work progressed quite effectively with alternating intuition and cerebration. Microcomputers are particularly effective in this method of research.  相似文献   

18.
The technique of 3D geological modeling (3DGM) is an effective tool for representing complex geological objects. In order to improve the accuracy of geological models applied in numerical simulation methods such as finite elements and finite differences, we can use 3DGM as a modeling tool. To do this, however, 3DGM must provide the ability to model geological and artificial objects in a unified way, and its geological model must be seamless for mesh generation. We present the concept of a sealed engineering geological model (SEGM), and describe its topological representation. Three kinds of conditions: geometric continuity, topological consistency and geological consistency, which must be satisfied by SEGM, are discussed in detail. A new method for constructing an SEGM based on a wire frame is proposed. It includes three main components: wire frame construction, interface modification and reconstruction, and block tracing. Building a unitary wire frame, which is composed of many simple arcs and connects all interfaces seamlessly, is the key of this method. An algorithm, involving two intersections computations and partition of simple arcs, is proposed for building a wire frame. Additionally, we also propose a local iterative algorithm for computing fault traces. As an example, we build an SEGM for the dam area of a hydraulic engineering project in the HuNan province of China.  相似文献   

19.
In a data mining project developed on a relational database, a significant effort is required to build a data set for analysis. The main reason is that, in general, the database has a collection of normalized tables that must be joined, aggregated and transformed in order to build the required data set. Such scenario results in many complex SQL queries that are written independently from each other, in a disorganized manner. Therefore, the database grows with many tables and views that are not present as entities in the ER model and similar SQL queries are written multiple times, creating problems in database evolution and software maintenance. In this paper, we classify potential database transformations, we extend an ER diagram with entities capturing database transformations and we introduce an algorithm which automates the creation of such extended ER model. We present a case study with a public database illustrating database transformations to build a data set to compute a typical data mining model.  相似文献   

20.
In 1998 a survey was published on the extent to which software engineering papers validate the claims made in those papers. The survey looked at publications in 1985, 1990 and 1995. This current paper updates that survey with data from 2000 to 2005. The basic conclusion is that the situation is improving. One earlier complaint that access to data repositories was difficult is becoming less prevalent and the percentage of papers including validation is increasing.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号