期刊文献+

E-Business Agent系统结构分析及关键技术

Structural Analysis of E-Business Agent System and Its Key Technologies
下载PDF
导出
摘要 本研究基于Agent搭建的虚拟商务平台主要分为三个功能模块 ,即通用网上购物模块、网上商场模块和Agent系统模块。其中核心部分Agent系统模块作为常驻触发模块。Agent系统运行如下 :(1)接收HTML的线性超链结构信息以及XML信息 ;(2 )经过信息过滤 ,提取XML扩展字典标准信息 ;(3)将有效信息通过决策支持系统的推理机制进行运算处理 ,并与决策知识库中的模式进行匹配和比较 ,计算出初步结果 ;(4)经过结果处理将相应信息传回用户界面。主要涉及的关键技术有开放网络技术 (TCP IP) ,跨平台编程 (JAVA) ,数据仓库分析和数据挖掘技术。 The virtual business platform based on Agent is divided into three functional modules,i.e. the module of general network purchase,the module of network market and the module of Agent system.Its core part is the module of Agent system,which acts as the resident trigger module.The Agent system operates as follows:(1)to receive the linear superlink structure information of HTML and information of XML;(2) through information filter,to extract the standard information of XML extended lexicon;(3)through the rational mechanism of decision making support system,to operate and process the effective information,and to match and compare the model in decision making knowledge database,to calculate the preliminary result;(4)through the result processing,to transmit the relevant information back to the user interface.The key technologies concerned are the open network technology(TCP/IP),transplatform programming(JAVA),data warehouse analysis and data mining technology.The model building and testing are completed in cooperation with Washington Mason University of USA.
出处 《情报学报》 CSSCI 北大核心 2001年第6期648-654,共7页 Journal of the China Society for Scientific and Technical Information
关键词 电子商务 数据挖掘 虚拟现实 E-BusinessAgent系统 结构分析 关键技术 E Business,Agent,structure,data mining,virtual reality.
  • 相关文献

参考文献2

二级参考文献8

  • 11,Bishop M. A model of security monitoring. In: Proceedings of the 5th Annual Computer Security Applications Conference. 1989. 46~52. http://seclab.cs. ucdavis.edu/papers.html
  • 22,Staniford-Chen S, Cheung S, Crawford R et al. GrIDS: a graph based intru sion detection system for large networks. In: Proceedings of the 19th National Information Systems Security Conference, Vol 1. National Institute of Standards a nd Technology, 1996. 361~370
  • 33,Hochberg J, Jackson K, Stallings C et al. NADIR: an automated system for detecting network intrusion and misuse. Computers and Security, 1993,12(3):235~2 48
  • 44,White G B, Fisch E A, Pooch U W. Cooperating security managers: a peer-based intrusion detection system. IEEE Network, 1996,10(1):20~23
  • 55,Forrest S, Hofmeyr S A, Somayaji A. Computer immunology. Communications of th e ACM, 1997,40(10):88~96
  • 66,Hunteman W. Automated information system alarm system. In: Proceedings of the 20th National Information Systems Security Conference. National Institute of Standards and Technology, 1997
  • 77,Porras P A, Neumann P G. EMERALD: event monitoring enabling responses to anom alous live disturbances. In: Proceedings of the 20th National Information System s Security Conference. National Institute of Standards and Technology, 1997
  • 8刘锦德.对于开放系统内涵的澄清[J].计算机应用,1997,17(6):1-3. 被引量:23

共引文献125

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部