首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 203 毫秒
1.
一种选择制造业信息系统应用的决策模型   总被引:7,自引:1,他引:7       下载免费PDF全文
给出一种选择制造业信息系统(IS)应用的决策模型,该模型基于系统的关联性原理,即各种IS应用之间相互关联有机结合而产生协同效应,使得总体功能大于各应用功能之和,利用层次分析法(AHP)对IS应用进行初始排序,建立处理协同效应与资金分配的数学模型,通过模型求解确定应加以引进的IS应用集合,并确定它们的实施顺序,给出一个分析实例来说明决策模型的使用方法。  相似文献   

2.
基于数据流管理平台的网络安全事件监控系统   总被引:1,自引:0,他引:1  
复杂而繁多的网络攻击要求监控系统能够在高速网络流量下实时检测发现各种安全事件.数据流管理系统是一种对高速、大流量数据的查询请求进行实时响应的流数据库模型.本文提出了一种将数据流技术应用到网络安全事件监控中的框架模型.在这个模型中,数据流管理平台有效地支持了对高速网络数据流的实时查询与分析,从而保证基于其上的网络安全事件监控系统能够达到较高的处理性能.利用CQL作为接口语言,精确描述安全事件规则与各种监拉查询,具有很强的灵活性与完整性.另外,系统能够整合入侵检测、蠕虫发现、网络交通流量管理等多种监控功能,具有良好的可扩展性,  相似文献   

3.
一种支持多目标的数据流操作语言   总被引:1,自引:0,他引:1  
随着数据流在各个应用领域的涌现和广泛应用,数据流相关的研究已经成为数据库技术中一个新的研究方向,并得到了越来越多的关注.数据流的操作语言作为用户与数据流管理系统之问进行语义交换的桥梁,从很大程度上体现出了数据流处理的特点.提出了一种数据流管理系统中支持多目标的数据流操作语言.它可以同时完成对数据流和关系表的操作.此外针对数据流的特性,语言中还引入了时间戳,时间粒度,连续查询,近似查询等相关概念,并以丰富灵活的语法支持了各种相关技术.  相似文献   

4.
四、系统设计指南1.总体设计总体设计是IS的宏观设计,应该设计出总的E-R图、总的功能层次图、总的功能实体图和总的功能布局图,同时应该修改与完善数据字典。E-R图是总体设计的重点与难点,是IS数据关系的总纲,是基本表设计的依据,是总体设计的主要文件。2.数据库设计数据库设计是IS设计的核心,是匕成败的关键。数据库设计的内容包括数据字典设计、E-R图设计、基本表与代码设计、主键与外键设计,中间表设计。在设计中应遵守以下原则:(1)数据字典中的元素,是IS的元数据。它由基本表和代码表的表名与字段名所组成。(2)…  相似文献   

5.
数据流定性化方法研究   总被引:2,自引:0,他引:2  
数据流定性化处理,是在考虑噪声影响的情况下,对数据流进行处理,最终将数据流 化分为单调变化的区段.这是定性仿真应用中的一个关键问题.本文在分析基于线性最小方 差拟合的数据流定性化方法的基础上,改进其定性核心函数.提出了基于偏度系数的数据流 定性化方法.并通过具体数据分析,证明了该方法的有效性.  相似文献   

6.
分布式复式数据流的处理   总被引:3,自引:1,他引:3  
在分布式数据流环境中,系统的通信带宽是一种瓶颈资源.在保证查询精度的前提下,为了有效地减少网络中数据流的传输量,提出了一种新的数据流传输方式,称为复式数据流.复式数据流方法是将分布式数据流系统中的原始数据流分组合并成复式数据流之后再进行传输.在定义了复式数据流的基础上,给出了复式数据流的生成算法,并且分析了基于复式数据流的查询操作的误差度,讨论了构造复式数据流的相关问题,最后通过实验验证了这种方法的有效性.  相似文献   

7.
随着信息安全领域研究和应用的深入,网络行为和流量分析等应用对网络流的处理提出了更高的要求。从数据流管理系统的角度重新诠释了网络流分析,设计并实现了一个能够匹配千兆网络的高速数据流管理系统IS—DSMS(Data Stream Management System for Information Security)。系统利用了采样技术、概要技术、滑动窗口等技术对常用的五类聚合查询进行了优化。实验证明,系统具备千兆网络条件下实际使用的性能,可作为网络数据流实时查询和统计分析引擎,为入侵检测、网络监控等系统提供高速有效的支持。  相似文献   

8.
完善入侵检测蜜罐系统的方法   总被引:2,自引:0,他引:2  
薛强  孙济洲 《计算机工程》2004,30(15):111-113
首先介绍了蜜罐系统的起源、工作机制及存在的问题;然后从攻击者身份识别的角度出发,提出了键盘指纹图谱的思想以完善入侵检测蜜罐系统。这种方法对攻击者的键盘行为进行直接捕获或通过监视攻击者与目标机之间的会话数据流进行间接捕获,然后利用数据挖掘的方法完成数据流时间序列的分析以建立键盘指纹图谱。重点介绍了键盘指纹图谱中各种数据挖掘技术的各种方法和特点,并在最后提出了一种基于Win32全局钩子技术的键盘指纹图谱实现方法。  相似文献   

9.
本文通过对机械产品特征造型设计过程的分析,以EUCLID-IS、AUTOCAD等为软件平台,利用软件二次开发技术建立机械产品特征造型系统,论述了系统建模方法、系统结构及系统功能,阐明应用系统实现机械产品特征造型设计的方法和步骤。  相似文献   

10.
在企业的生产经营活动中,对各类信息系统产生的数据流进行实时监控,有助于发现业务之间的关联性,从而为企业的业务流程优化和管理决策提供助力。本文论述一种基于业务数据隐含的关联性、数据流变化的联动性和延迟性,实现数据流监控和分析的方法,详细论述了方法中管道、数据流的概念和构建方法。通过应用实例表明本方法具有可行性。  相似文献   

11.
《Information & Management》2005,42(3):483-501
We use information theory to justify use of a method to help managers better understand what new IT applications and features will be most valued by users and why and then apply this method in a case study involving the development of financial service applications for mobile devices. We review five methods for data gathering, analysis, modeling, and decision-making and compare them with information processing methods for IS planning. Then we develop an IS planning method, an extended version of ‘critical success chains’ (CSC), that supports five of six of the identified information processing needs. We use this method in a project to develop ideas for mobile financial services applications at Digia, a Finland-based R&D firm. We select a group of experts and potential early adopting users. In structured individual interviews, we ask why participants prefer particular specific features the participant would expect to be part of an application. We record this data as linked chains connecting features with consequential performance and with the perceived value of such performance. The data is analyzed across participants to create network models of features, performance, and values. We conduct an ideation workshop with Digia engineers and executives to generate ideas for new systems based on the CSC models. Workshop participants created back-of-the-envelope level ideas for three new applications and business models to show graphically the flow of information, value, and revenue among parties involved in producing and using the applications. We conclude by comparing the extended CSC and other IS planning methods in terms of information theory and the information processing needs for IS planning.  相似文献   

12.
The concern of this paper is the creation of an information system for primary health care. The problem environment is characterised by its location – health centres and agrarian surgeries serving small to medium size communities, which make up insular societies on the Aegean islands in Greece. The approach adopted was based on soft systems methodology (SSM) with the aim of obtaining operational models of the problem situation requiring the information system (IS). The SSM approach has proved most efficient in identifying important subsystems within the primary health care system. It also aided in this way the debate about the solutions to the problem of creating an IS in a health centre on the island of Samos.  相似文献   

13.
The objective of this contribution is to analyze statistical properties of estimated models of cascade systems. Models of such systems are important in for example cascade control applications. The aim is to present and analyze some fundamental limitations in the quality of an identified model of a cascade system under the condition that the true subsystems have certain common dynamics. The model quality is analyzed by studying the asymptotic (large data) covariance matrix of the Prediction Error Method parameter estimate. The analysis will focus on cascade systems with three subsystems. The main result is that if the true transfer functions of the first and second subsystem are identical, the output signal information from the second and third subsystems will not affect the asymptotic variance of the estimated model of the first subsystem. This result implies that for a cascade system with two subsystems, where the dynamics of the first subsystem is a factor of the dynamics of the second one, the output signal information from the second subsystem will not improve the asymptotic quality of the estimate of the first subsystem. The results are illustrated by some simple FIR examples.  相似文献   

14.
The signals that originate from the human cardiovascular system were analysed using methods of both linear and nonlinear system theory. The analyses in the time domain and in the phase space revealed the deterministic and almost conservative nature of the cardiovascular control system on the time scale of minutes. Five characteristic frequencies were found in the signal of peripheral blood flow. Some of them had already been found in other cardiovascular functions, the breathing, blood pressure, ECG and HRV. Each characteristic peak reflects the periodic action of one of the subsystems, involved in the regulation of the blood flow. These systems are mutually dependent, via the couplings among them. Their strength plays an essential role in the performance of the system. In some cases their importance is indicated, thus pointing to practical applications in the diagnosis and prediction of cardiovascular functions.  相似文献   

15.
Micro-electromechanical systems (MEMS) as an enabling technology is seen to play a more and more important role for the main stream of industry of the future by broadening its applications to information, communications and bio technologies. Development of MEMS devices, however, still relies on knowledge and experience of MEMS experts due to the design and fabrication process complexity. It is difficult to understand the trade-offs inherent in the system and achieve an optimal structure without any MEMS-related insight. An attempt is made to develop an integrated systems model for the complete structure of the MEMS product system in terms of its constituents and interactions between the constituents. The hierarchical tree structures of the MEMS system and its subsystems are presented up to component level. For characterization, analysis and identification of MEMS product system, three different mathematical models say graph theoretic model, matrix model and permanent model are presented. These models are associated with graph theory, matrix method and variable permanent function by considering the various subsystems, subsubsystems up to component level, their connectivity and interdependency of the MEMS product system. The developed methodology is explained with an example. The proposed modeling and analysis is extendable to the subsystems and the component level. An overall structural analysis can be carried out by following a ‘top-down’ approach or ‘bottom-up’ approach. Understanding of MEMS product structure will help in the improvement of performance, cost, design time, and so on.  相似文献   

16.
Database management systems (DBMS's) today are usually built as subsystems on top of an operating system (OS). This design approach can lead to problems of unreliability and inefficient performance as well as forcing a duplication of functions between the DBMS and OS. A new design approach is proposed which eliminates much of this duplication by integrating the duplicated functions into independent subsystems used by both the DBMS and OS. Specifically, an I/O and file support subsystem and a security subsystem are defined. Both subsystems make use of a logical information model which models the stored information in secondary storage. The new database operating system organization and the logical information model are presented in detail. Design of the security subsystem is based on the access control model, and is extended with Boolean predicates to produce an access control model capable of enforcing content-dependent security policies. The access matrix is implemented using a combination of access lists and capabilities. Authorization models and multiple user processes are discussed in relation to the new system organization. The outline of a formal specification and proof of correctness of the security subsystem is also discussed.  相似文献   

17.
This paper presents a performance model of a two-dimensional disk array (TIDA) system, which is composed of several major subsystems including disk cache, intelligent disk array controller, SCSI-like I/O bus, and two-dimensional array of disk devices. Accessing conflict in these subsystems and fork/join synchronization of physical disk requests are considered in the model. The representation for the complex behavior, including the interactions among subsystems, of a whole disk array system distinguishes the model from others that model only individual subsystems. To assist evaluating the architectural alternatives of TIDA, we employ a subsystem access time modeling methodology, in which we model for each subsystem the mean subsystem access time per request (SATPR). Fed with a given set of representative workload parameters, the performance model is used to conduct performance evaluation and the SATPRs of the subsystems are utilized to identify the bottleneck subsystem for performance improvement. The results show that (1) the values of some key design parameters, such as data block size and I/O bus bandwidth that yield the best system throughput are dependent not only on the subsystem performance but also on the interaction among subsystems; (2) an I/O bus bandwidth of 5 Mbytes/s per disk device is large enough for data transfers from/to disk devices equipped with a cache of 1 Mbytes; and (3) the activity of fork/join synchronization of physical disk requests may cause performance degradation, which can be improved by using large I/O bus bandwidth and/or placing a cache in each disk device.  相似文献   

18.
《Information Systems》2005,30(6):423-443
Business rules are evidently important for organisations as they describe how they are doing business. Their value has also been recognised within the information system (IS) domain, mostly because of their ability to make applications flexible and amenable to change. In this paper, we propose a methodology that helps business people and developers to keep business rules at the business level inline with the rules that are implemented at the system level. In contrast to several existing approaches that primarily focus on business rules in the scope of an application, our methodology addresses the entire IS of an organisation. The paper also describes requirements for a tool support that would be appropriate to support the methodology.  相似文献   

19.
针对开展机载高光谱测量项目中,地面同步数据管理新需求,建立了地面同步数据管理系统.引入系统动力学原理,通过分析机载高光谱测量的七大子系统状态变量、辅助变量、物质流、信息流以及反馈效果,明确了地面同步数据的应用范围.采用Visual Studio 2010和SQL Server 2008完成了开发,具有入库、维护、查询、处理和应用等功能.研究认为系统为多场地、多时相的业务化光谱信息提取提供了一种可行的技术途径.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号