The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
After researching deeply on mine electromechanical equipment maintenance management, this paper has developed mine electromechanical equipment maintenance management system based on ASP.NET 2.0 technology and database technology. This system includes the information related to maintenance such as device information, repair project information, fitting information, course review information, report...
Presently, there are still many problems on acquiring patent information from the Website ,we can't acquire a large number of information efficiently and accurately. In this paper, use the two-tiered scheduling Multi-Agent to design the patent information acquisition system. The process of acquisition patent information from United States Patent and Trademark Office (USPTO) web database which includes...
Taking the development of an oil depot training system for instance, the key technologies and development process of the system are described in this paper. Firstly, we begin with the background and significance in the research subject, and then we expound the overall structure and functions of the system and design processes. Secondly, we lay special stress on analyzing the database design, including...
In order to overcome this shortage of general rough set theory, the elementary concept of tolerance rough set theory is proposed, and the theory is employed to build objects' tolerance relations that can correctly classify objects in system. First, we use genetic algorithms to search for the optimal thresholds, then construct special matrix for attributes and objects. Thus we can get the relations...
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
As the visits to databases in the network application become more and more, the DBMS, which is the core of network calculation, attracts increasing attention. The research on the self-calculating, which mainly includes self-configuring, self-restoring, self-optimizing and self-protecting, handles the internal resources management of the DBMS. But it can't handle the management of external workload...
Student Information Management System realization including establishment and maintenance of the database and front-end application development. This paper describes the system functional and architecture design, and emphasizes the system's functionality, database design and functional modules, etc. Fully functional, flexible and convenient application and friendly interface provide a good guarantee...
This paper proposes a new method to cluster law texts based on referential relation of laws. We extract law entities (an entity represents a law) and their referential relation from law texts. Then SimRank algorithm is applied to calculate law entity's similarity through referential relation and law clustering is carried out based on the SimRank similarity. This is the first time to apply SimRank...
Virtual screening is a newly emerging method used in new drug research and development (R&D). The introduction of virtual screening immensely reduces R&D cycle and decreases R&D cost directly. Mass of chemical data used for virtual screening needs to be managed effectively in certain ways. We have developed the first release of ChemDataBase, but it only has the basic functions of chemical...
The mobile database may encounter a series of safety problems from the mobile client, the wireless network, the loophole of itself, the attacks from hacker, viruses and so on, in the actual application process, while the data security of backend database is under threat. To ensure the safety of mobile database, the identity authentication must be consummated, the access-control mechanism should be...
In recent years a new type of database (NOSQL) has emerged in the field of persistence. June 2009, a global gathering of NOSQL Movement triggered the fuse of “database revolution”, Non-relational database has now become an extremely popular new areas, NOSQL aims to solve the needs of high concurrent read-write, efficient mass data storage and access, database scalability and high availability. In...
The information in medical imaging is structured on multiple layers: semantic and numerical. Several algorithms for shape and color detection which can be used for numerical analysis are presented in this paper. Semantic information can be extracted from numerical information using fuzzyfication. For a correct image interpretation and a diagnosis formulation several of the objects features (shape,...
Combining with the data mining application in database intrusion detection, for the most representative association rule Apriori algorithm in the data mining technology, this paper presents an improved association rule algorithm, based on which constructs a database intrusion detection system on the basis of association rules, and carries out a small range test. Experimental results show that the...
Database is a part of the information systems (IS) which contains all of the data that the IS should have. In this paper, a database for a football league has been designed by classifying and representing those data in categories and using the Thai football league for a case study. Each category consists of the data which is significantly important and needs some tools to analyze and store as beneficial...
This paper has discussed the data to accommodate the disaster backup the concept as well as the DataGuard outline. From DataGuard key technologies, principle of work and so on, it analyzed the Oracle DataGuard disaster recovery technology with high reliability and high security.
In order to solve cutting data evolution in cutting database, cultural algorithm is used in this paper. By building the manufacturing environment that influences the selection of cutting parameters, the definition of cutting data individual can solve the expression of cutting data in population space. The belief space made up by priori experience space and a posterior knowledge space is built, and...
We introduce the concept of database proxies capable of mitigating the gap between two disjoint productivity-enhancing techniques: Component Based Software Engineering (CBSE) and Real-Time Database Management Systems (RTDBMS). The coexistence of the two techniques is neither obvious nor intuitive since CBSE and RTDBMS promotes opposing design goals, CBSE promotes encapsulation and decoupling of component...
Data mining techniques are able to derive highly sensitive knowledge from unclassified data that is not even known to database holders. Usually, data mining contains the secured information such as financial and healthcare records. To handle such large private database with, data mining algorithms with privacy is required. The privacy preserving becomes important concern when we dealing security related...
One of the major concepts in business analytics is to identify the anomalies over time, also called as trend analysis. This can be easily done in pivot tables by using time as one of the dimensions, usually across columns. However, the trending information itself is insufficient to make any quick and insightful observations. Ranking the time series to identify the similar units of information can...
A collaborative emergency call taking information system in the Czech Republic processes calls from the European 112 emergency number. Large amounts of various incident records are stored in its databases. The data can be used for mining spatial and temporal anomalies. When such an anomalous situation is detected so that the system could suffer from local or temporal performance decrease, either a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.