首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
A data management paradigm that incrementally and transparently constructs the relationship among VLSI design objects is proposed. This paradigm is based on a design history model and the specifications of CAD-tool execution semantics. Based on this paradigm, algorithms are developed to automatically establish interobject relationships as a side effect of CAD-tool execution. This paradigm represents a vastly different approach in that it exploits history information, as well as domain knowledge, to deduce useful metadata for data management  相似文献   

2.
在信息化迅速发展的今天,市场经济高速发展,全球经济贸易的复杂多变,对会计电算化软件提出了更高的要求。会计软件必须从“核算型”向“管理型”的迅速转变,即基于ERP思想进行设计;会计软件所使用的数据不仅能满足会计核算的要求,还能够满足企业决策的需求和安全可靠的要求。文章从ERP思想、数据共享、数据控制三个方面分析电算化会计软件设计方法。  相似文献   

3.
电力需求侧管理突破了传统的电力管理模式,改变了依靠单纯地扩大供应能力以满足日益增长的电力需要的方式,在更高层次上处理供应侧和需求侧的关系,特别强调用户参与负荷管理的积极性,做到和用户共同实施用电管理。针对这一特点,通过分析时下最热门的数据挖掘技术的现状,并结合数据挖掘技术分别从电力需求侧管理的需求侧响应,有序用电和能效管理三个方面对基于数据挖掘的电力需求侧管理进行了综述。结论得出,基于数据挖掘的电力需求侧管理是未来电力需求侧管理的主要发展方向,研究如何将数据挖掘技术应用到用户需求侧管理中,不仅可以推动电力需求侧管理的进一步发展,还可以加快电力行业的快速转型,为能源互联网的快速建设提供技术支持。  相似文献   

4.
Harold Weiss 《EDPACS》2013,47(11):1-9
Abstract

In spite of an ambiguous standard with regard to definition, spyware is one of the most challenging problems confronting the information technology (IT) community in terms of privacy violations. This problem is magnified in the business arena. Despite the increasing technical endeavors made toward spyware mitigation, no panacea exists for spyware control and management, which is now becoming a serious business strategic issue. This article focuses on the vicious side of spyware. A framework is proposed to identify five involved parties for spyware management and control along with respective recommendations to cope with spyware pervasion.  相似文献   

5.
Both performance and energy cost are important concerns for current data center operators. Traditionally, however, IT and mechanical engineers have separately optimized the cyber and physical aspects of data center operations. This paper considers both of these aspects with the eventual goal of developing performance and power management techniques that operate holistically to control the entire cyber-physical complex of data center installations. Toward this end, we propose a balance of payments model for holistic power and performance management. As an example of coordinated cyber-physical system management, the energy-aware cyber-physical system (EaCPS) uses an application controller on the cyber side to guarantee application performance, and on the physical side, it utilizes electric current-aware capacity management (CACM) to smartly place executables to reduce the energy consumption of each chassis present in a data center rack. A web application, representative of a multi-tier web site, is used to evaluate the performance of the controller on the cyber side, the CACM control on the physical side, and the holistic EaCPS methods in a mid-size instrumented data center. Results indicate that coordinated EaCPS outperforms separate cyber and physical control modules.  相似文献   

6.
Industrial Cyber-Physical Systems have benefitted substantially from the introduction of a range of technology enablers. These include web-based and semantic computing, ubiquitous sensing, internet of things (IoT) with multi-connectivity, advanced computing architectures and digital platforms, coupled with edge or cloud side data management and analytics, and have contributed to shaping up enhanced or new data value chains in manufacturing. While parts of such data flows are increasingly automated, there is now a greater demand for more effectively integrating, rather than eliminating, human cognitive capabilities in the loop of production related processes. Human integration in Cyber-Physical environments can already be digitally supported in various ways. However, incorporating human skills and tangible knowledge requires approaches and technological solutions that facilitate the engagement of personnel within technical systems in ways that take advantage or amplify their cognitive capabilities to achieve more effective sociotechnical systems. After analysing related research, this paper introduces a novel viewpoint for enabling human in the loop engagement linked to cognitive capabilities and highlighting the role of context information management in industrial systems. Furthermore, it presents examples of technology enablers for placing the human in the loop at selected application cases relevant to production environments. Such placement benefits from the joint management of linked maintenance data and knowledge, expands the power of machine learning for asset awareness with embedded event detection, and facilitates IoT-driven analytics for product lifecycle management.  相似文献   

7.
基于三层B/S的规划计划信息管理平台   总被引:2,自引:2,他引:0  
电网规划计划管理的科学化和信息化发展对信息管理平台的灵活性、高效性、安全性等方面提出了更高的要求,基于此,本文提出了采用三层B/S架构设计国家电网公司规划计划信息管理平台的开发方法.文章在分析三层B/S架构特点的基础上,利用SoTower工具进行开发,设计并实现了系统的客户显示层、应用逻辑层、数据层三层,系统客户端采用富客户端技术进行设计,并分别采用Weblogic、Oracle作为应用服务器和数据库服务器.最终实现的系统具有功能完整性,且具有较高的综合性能,现该系统已在试点单位试运行,并取得了良好的效果.  相似文献   

8.
在数据流管理系统(data stream management system,DSMS)中嵌入数据挖掘算法对数据库研究者是一项新的挑战,而在数据流管理系统中嵌入快速决策树(very fast decision tree,VFDT),尚未见报道。利用DSMS原有的机制在Esper中实现了VFDT算法。其主要思想是将VFDT算法转换为Esper的数据查询语言(Esper query language,EQL)。给出了在DSMS中实现VFDT算法的两种方法:普通方法。直接将VFDT算法转化为EQL语言并在DSMS中实现(记作DVFDT);改进方法。通过Esper中固有的批量处理模式来实现(记作optimal-DVFDT)。通过一系列实验比较分析了两种方法对海量数据流分类的准确率和性能;将提出的两种方法与用Java实现的VFDT算法(记作JVFDT)在分类精度和时间上进行比较。结果表明,在DSMS中实现的VFDT算法具有较好的性能,并且该算法对大规模数据流数据的子集同样具有较高的性能。  相似文献   

9.
倾斜问题是并行系统普遍存在的问题,对系统的性能影响很大.事件流数据库作为数据流应用的后端分析处理系统具有连续大量的事件流加载与用户查询并存的特点,传统的解决数据倾斜的方法无法适应其动态加栽的特点.以主干网的网络安全监控应用为研究背景,结合事件流负载特征,针对基于无共享结构的事件流并行数据库提出了一种基于周期计数的能力感知加栽均衡策略.该方法在保证加载性能的同时,可以根据加栽节点的能力在线自动调解数据分布,不仅有效预防和解决了系统倾斜,还为查询服务的性能奠定了良好的基础.模拟分析和真实测试都证明这种加栽均衡策略较其他策略更有效.  相似文献   

10.
The British Geological Survey (BGS) is responsible for managing a major geoscience data archive on behalf of the UK Nuclear Decommissioning Authority (NDA). Much of this geological data was captured during the 1990s and early 2000s using now obsolete software and data formats. This data asset remains an important resource for the NDA and the wider scientific community. The NDA wishes to ensure the data remain accessible and usable for many decades into the future. BGS has been working closely with Radioactive Waste Management (RWM), a wholly owned subsidiary of the NDA, on a program of data management and digital continuity measures to ensure the long-term usability of the data. This article describes some of the challenges and outlines the approaches we have taken to address these issues.  相似文献   

11.
Gray  J. 《Computer》1996,29(10):38-46
Computers can now store all forms of information: records, documents, images, sound recordings, videos, scientific data, and many new data formats. Society has made great strides in capturing, storing, managing, analyzing, and visualizing this data. These tasks are generically called data management. This article sketches the evolution of data management systems. There have been six distinct phases in data management. Initially, data was manually processed. The next step used punched-card equipment and electromechanical machines to sort and tabulate millions of records. The third phase stored data on magnetic tape and used stored-program computers to perform batch processing on sequential files. The fourth phase introduced the concept of a database schema and on-line navigational access to the data. The fifth step automated access to relational databases and added distributed and client server processing. We are now in the early stages of sixth-generation systems that store richer data types, notably documents, images, voice, and video data. These sixth-generation systems are the storage engines for the emerging Internet and intranets. Early data management systems automated traditional information processing. Today they allow fast, reliable, and secure access to globally distributed data. Tomorrow's systems will access and summarize richer forms of data. It is argued that multimedia databases will be a cornerstone of cyberspace  相似文献   

12.
传统区块链技术处理交易能力弱、吞吐量低,不仅难以处理工业环境下的海量数据,而且其访问控制策略权限管理效率低,安全性不足。针对上述问题,提出一种基于主侧链合作的工业物联网访问控制策略。通过Plasma Cash框架构建高性能DPOS侧链,并根据合约将侧链与主链双向锚定,实现区块链的主侧链扩容。根据工业物联网的节点特点和主侧链区块链的运行环境,设计适用于主侧链环境的访问控制模型,访问控制模型内的主客体信息收集点阻隔外部实体直接访问,信息处理点实现访问控制策略执行与存储分离。将模型编写成图灵完备智能合约后放至侧链上,侧链负责合约的执行并通过稀疏默克尔树算法与主链进行数据的批量同步验证。实验结果表明,该策略可对基于工业物联网的区块链传输速度和稳定性进行有效优化,提高了控制策略的管理效率和安全性,可满足工业物联网中的使用需求。  相似文献   

13.
14.
基于J2EE的应用支撑平台的设计与实现   总被引:3,自引:0,他引:3  
刘俊琦  程虎 《计算机工程与设计》2006,27(15):2821-2823,2845
文章旨在解决目前政府机关应用系统多而杂,造成资源无法共享、管理、维护困难的问题。文中提出了一种基于J2EE的电子政务应用支撑平台系统方案的设计思想。它可以做到对各独立的应用系统进行统一的权限、基础信息资源管理;支持各种主流操作系统,多种数据库,并能够将各种语言开发的应用整合到同一个界面中,方便用户的管理和使用;运用LDAP技术管理全局的基础信息,安全便于维护;并为应用系统提供丰富的扩展接口。目前已被一些政府机关信息系统所采用。  相似文献   

15.
控制与数据投机优化技术的研究   总被引:1,自引:0,他引:1  
控制投机和数据投机是提高程序指令级并行度的有效方法.为了保证投机指令的正确执行,须解决两个问题,即延迟触发控制投机指令导致的异常和数据投机中的别名歧义.这需要硬件的支持才能做到,所以以前在这方面的研究大多是在模拟器上进行的,侧重于描述对模拟器结构的扩展.而IA-64是第一个同时支持这两种优化的体系结构.基于此,作者用一个统一的框架在IA-64开放源码研究编译器(ORC)中首次实现了控制与投机优化.该文以编译器为侧重点,介绍了投机优化中的几个核心问题及其解决方法,其中包括一种新的用来维护投机代码正确性的算法.实验结果表明这种方法是有效的.  相似文献   

16.
The increasing deployment of artificial intelligence has placed unprecedent requirements on the computing power of cloud computing. Cloud service providers have integrated accelerators with massive parallel computing units in the data center. These accelerators need to be combined with existing virtualization platforms to partition the computing resources. The current mainstream accelerator virtualization solution is through the PCI passthrough approach, which however does not support fine-grained resource provisioning. Some manufacturers also start to provide time-sliced multiplexing schemes and use drivers to cooperate with specific hardware to divide resources and time slices to different virtual machines, which unfortunately suffer from poor portability and flexibility. One alternative but promising approach is based on API forwarding, which forwards the virtual machine''s request to the back-end driver for processing through a separate driver model. Yet, the communication due to API forwarding can easily become the performance bottleneck. This paper proposes Wormhole, an accelerator virtualization framework based on the C/S architecture that supports rapid delegated execution across virtual machines. It aims to provide upper-level users with an efficient and transparent way to accelerate the virtualization of accelerators with API forwarding while ensuring strong isolation between multiple users. By leveraging hardware virtualization feature, the framework minimizes performance degradation through exitless inter-VM control flow switch. Experimental results show that Wormhole''s prototype system can achieve up to 5 times performance improvement over the traditional open-source virtualization solution such as GVirtuS in the training test of the classic model.  相似文献   

17.
数据仓库技术在大型超市中的应用   总被引:1,自引:1,他引:1  
为了克服大型超市管理中的盲目性和决策中的随意性,有利于对超市进行科学和规范的现代化管理,提高工作效率,笔者运用数据仓库技术,针对大型超市销售经营模式,构造了大型超市数据仓库系统。数据库平台采用SOL Server 2000,数据仓库集成模块采用VC++开发,数据仓库客户端程序和OLAP分析采用Power Builder开发。该系统性能价格比高,系统运行速度快,对超市两年的历史数据进行分析操作获得了令人满意的效果。此系统具有良好的通用性,能适应不同超市的销售情况,为今后的维护、增量开发提供了良好的基础。  相似文献   

18.
NATO STANAG 4626 ASAAC已广泛应用于综合化模块化航空电子系统,在STANAG 4626中,分布式通用系统管理划分为四个功能组件(健康管理、故障管理、配置管理和安全管理),通过对四个功能组件间的消息通信过程进行分析,提出一种基于分布式通用系统管理的消息交互机制,具体包括消息类型划分、消息封装机制、消息收发派遣机制、消息底层传输机制,满足通用系统管理消息通信中多节点、多数据流通信需求,减少系统设计冗余。  相似文献   

19.
在智能交通、无人驾驶等场景中,车辆节点与路边设施进行数据交换以实现车路协同,有助于提高交通安全、缓解交通拥堵。但该场景下的数据交换面临很多安全问题,隐私泄露是其中的主要安全风险之一。现有智能交通隐私保护方案多涉及复杂度较高的运算或需配置高成本的防篡改设备,效率较低,不能满足无人驾驶等智能交通应用的实时要求。为此,文章提出一种轻量级基于假名的条件隐私保护认证协议,该协议包括基于变色龙哈希的身份认证与基于椭圆曲线的消息认证,实现了车辆节点在数据交换过程中的匿名性与可追踪性,并可抵抗多种安全攻击。性能分析表明,该协议在计算、通信及存储等方面的开销均优于对比方案,在智能交通场景下的可行性更强。  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号