期刊文献+
共找到132篇文章
< 1 2 7 >
每页显示 20 50 100
Analysis and Modeling of Mobile Phone Activity Data Using Interactive Cyber-Physical Social System
1
作者 Farhan Amin Gyu Sang Choi 《Computers, Materials & Continua》 SCIE EI 2024年第9期3507-3521,共15页
Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community.The call detail records(CDR)of a mobile network are used to identify the network’s efficacy and the ... Mobile networks possess significant information and thus are considered a gold mine for the researcher’s community.The call detail records(CDR)of a mobile network are used to identify the network’s efficacy and the mobile user’s behavior.It is evident from the recent literature that cyber-physical systems(CPS)were used in the analytics and modeling of telecom data.In addition,CPS is used to provide valuable services in smart cities.In general,a typical telecom company hasmillions of subscribers and thus generatesmassive amounts of data.From this aspect,data storage,analysis,and processing are the key concerns.To solve these issues,herein we propose a multilevel cyber-physical social system(CPSS)for the analysis and modeling of large internet data.Our proposed multilevel system has three levels and each level has a specific functionality.Initially,raw Call Detail Data(CDR)was collected at the first level.Herein,the data preprocessing,cleaning,and error removal operations were performed.In the second level,data processing,cleaning,reduction,integration,processing,and storage were performed.Herein,suggested internet activity record measures were applied.Our proposed system initially constructs a graph and then performs network analysis.Thus proposed CPSS system accurately identifies different areas of internet peak usage in a city(Milan city).Our research is helpful for the network operators to plan effective network configuration,management,and optimization of resources. 展开更多
关键词 Cyber-physical social systems big data cyber-physical systems pervasive computing smart city big data management techniques
下载PDF
Comparison of R and Excel in the Field of Data Analysis
2
作者 Jue Wang 《Journal of Electronic Research and Application》 2024年第3期178-184,共7页
This research paper compares Excel and R language for data analysis and concludes that R language is more suitable for complex data analysis tasks.R language’s open-source nature makes it accessible to everyone,and i... This research paper compares Excel and R language for data analysis and concludes that R language is more suitable for complex data analysis tasks.R language’s open-source nature makes it accessible to everyone,and its powerful data management and analysis tools make it suitable for handling complex data analysis tasks.It is also highly customizable,allowing users to create custom functions and packages to meet their specific needs.Additionally,R language provides high reproducibility,making it easy to replicate and verify research results,and it has excellent collaboration capabilities,enabling multiple users to work on the same project simultaneously.These advantages make R language a more suitable choice for complex data analysis tasks,particularly in scientific research and business applications.The findings of this study will help people understand that R is not just a language that can handle more data than Excel and demonstrate that r is essential to the field of data analysis.At the same time,it will also help users and organizations make informed decisions regarding their data analysis needs and software preferences. 展开更多
关键词 EXCEL R language data analysis Open source COMPARE data management Advantages Disadvantages FUNCTION
下载PDF
The Influence of Social Media on College Choice among Undergraduates Majoring in Big Data Management and Application in China:Taking Guilin University of Electronic Technology as an Example
3
作者 Junchao Dong Joan P.Lazaro 《Journal of Contemporary Educational Research》 2024年第10期128-138,共11页
This study aims to investigate the influence of social media on college choice among undergraduates majoring in Big Data Management and Application in China.The study attempts to reveal how information on social media... This study aims to investigate the influence of social media on college choice among undergraduates majoring in Big Data Management and Application in China.The study attempts to reveal how information on social media platforms such as Weibo,WeChat,and Zhihu influences the cognition and choice process of prospective students.By employing an online quantitative survey questionnaire,data were collected from the 2022 and 2023 classes of new students majoring in Big Data Management and Application at Guilin University of Electronic Technology.The aim was to evaluate the role of social media in their college choice process and understand the features and information that most attract prospective students.Social media has become a key factor influencing the college choice decision-making of undergraduates majoring in Big Data Management and Application in China.Students tend to obtain school information through social media platforms and use this information as an important reference in their decision-making process.Higher education institutions should strengthen their social media information dissemination,providing accurate,timely,and attractive information.It is also necessary to ensure effective management of social media platforms,maintain a positive reputation for the school on social media,and increase the interest and trust of prospective students.Simultaneously,educational decision-makers should consider incorporating social media analysis into their recruitment strategies to better attract new student enrollment.This study provides a new perspective for understanding higher education choice behavior in the digital age,particularly by revealing the importance of social media in the educational decision-making process.This has important practical and theoretical implications for higher education institutions,policymakers,and social media platform operators. 展开更多
关键词 Social media Big data Management and Application Undergraduate college choice Student decision-making behavior Chinese higher education
下载PDF
Exploration and Practice of Big Data Introductory Courses for Big Data Management and Application Majors
4
作者 Tinghui Huang Junchao Dong Liang Min 《Journal of Contemporary Educational Research》 2024年第2期131-137,共7页
As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by ... As an introductory course for the emerging major of big data management and application,“Introduction to Big Data”has not yet formed a curriculum standard and implementation plan that is widely accepted and used by everyone.To this end,we discuss some of our explorations and attempts in the construction and teaching process of big data courses for the major of big data management and application from the perspective of course planning,course implementation,and course summary.After interviews with students and feedback from questionnaires,students are highly satisfied with some of the teaching measures and programs currently adopted. 展开更多
关键词 Big data management and application “Introduction to Big data Teaching reform Curriculum exploration
下载PDF
Using Python to Analyze Financial Big Data
5
作者 Xuanrui Zhu 《Journal of Electronic Research and Application》 2024年第5期12-20,共9页
As technology and the internet develop,more data are generated every day.These data are in large sizes,high dimensions,and complex structures.The combination of these three features is the“Big Data”[1].Big data is r... As technology and the internet develop,more data are generated every day.These data are in large sizes,high dimensions,and complex structures.The combination of these three features is the“Big Data”[1].Big data is revolutionizing all industries,bringing colossal impacts to them[2].Many researchers have pointed out the huge impact that big data can have on our daily lives[3].We can utilize the information we obtain and help us make decisions.Also,the conclusions we drew from the big data we analyzed can be used as a prediction for the future,helping us to make more accurate and benign decisions earlier than others.If we apply these technics in finance,for example,in stock,we can get detailed information for stocks.Moreover,we can use the analyzed data to predict certain stocks.This can help people decide whether to buy a stock or not by providing predicted data for people at a certain convincing level,helping to protect them from potential losses. 展开更多
关键词 Big data finance Big data in financial services Big data in risk management AI Machine learning
下载PDF
Importance of the reputation of data manager in the acceptance of connected vehicles
6
作者 Sailesh Acharya Michelle Mekker 《Communications in Transportation Research》 2022年第1期24-32,共9页
With the known evidence that potential connected vehicle(CV)users are worried about sharing data because of the associated data privacy and security issues,this study investigates the importance of the reputation of t... With the known evidence that potential connected vehicle(CV)users are worried about sharing data because of the associated data privacy and security issues,this study investigates the importance of the reputation of the data manager(who collects,stores,and owns the data)of CV technology(CVT).Based on a questionnaire survey of 2400 US adults,this study asserts that the data manager's reputation has a significant impact on the public perception of data privacy and security issues in CVT along with overall CV acceptance.The results show that data privacy issues have a more negative impact on CV acceptance than data security issues.In addition,the reputation of a data manager has a bigger role in the eyes of the public in shaping their perception of data privacy in comparison to data security.Based on the results,the public considers data privacy as the responsibility of the data manager to protect their data from unauthorized/illegal third-party access,whereas data security is the technological strength of CVT to protect the data from hacking.Finally,it is recommended that CV stakeholders take actions to improve potential CV users'confidence in the privacy of data shared by disclosing the data management process,data privacy protection efforts,building public trust in the data manager,and introducing/enforcing laws regarding data privacy protection. 展开更多
关键词 Connected vehicle data privacy data security REPUTATION data manager ACCEPTANCE
原文传递
Proof of Activity Protocol for IoMT Data Security
7
作者 R.Rajadevi K.Venkatachalam +2 位作者 Mehedi Masud Mohammed A.AlZain Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期339-350,共12页
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide heal... The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare services without physical appearance.With the use of sensors,IoMT applications are used in healthcare management.In such applications,one of the most important factors is data security,given that its transmission over the network may cause obtrusion.For data security in IoMT systems,blockchain is used due to its numerous blocks for secure data storage.In this study,Blockchain-assisted secure data management framework(BSDMF)and Proof of Activity(PoA)protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system.The main aim is to enhance the data security over the networks.The PoA protocol enhances high security of data from the literature review.By replacing the malicious node from the block,the PoA can provide high security for medical data in the blockchain.Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio,precision ratio,security,and efficiency and less response time for Blockchain-enabled healthcare systems. 展开更多
关键词 Blockchain IoMT malicious code detection SECURITY secure data management framework data management POA
下载PDF
Privacy Data Management Mechanism Based on Blockchain and Federated Learning
8
作者 Mingsen Mo Shan Ji +2 位作者 Xiaowan Wang Ghulam Mohiuddin Yongjun Ren 《Computers, Materials & Continua》 SCIE EI 2023年第1期37-53,共17页
Due to the extensive use of various intelligent terminals and the popularity of network social tools,a large amount of data in the field of medical emerged.How to manage these massive data safely and reliably has beco... Due to the extensive use of various intelligent terminals and the popularity of network social tools,a large amount of data in the field of medical emerged.How to manage these massive data safely and reliably has become an important challenge for the medical network community.This paper proposes a data management framework of medical network community based on Consortium Blockchain(CB)and Federated learning(FL),which realizes the data security sharing between medical institutions and research institutions.Under this framework,the data security sharing mechanism of medical network community based on smart contract and the data privacy protection mechanism based on FL and alliance chain are designed to ensure the security of data and the privacy of important data in medical network community,respectively.An intelligent contract system based on Keyed-Homomorphic Public Key(KH-PKE)Encryption scheme is designed,so that medical data can be saved in the CB in the form of ciphertext,and the automatic sharing of data is realized.Zero knowledge mechanism is used to ensure the correctness of shared data.Moreover,the zero-knowledge mechanism introduces the dynamic group signature mechanism of chosen ciphertext attack(CCA)anonymity,which makes the scheme more efficient in computing and communication cost.In the end of this paper,the performance of the scheme is analyzed fromboth asymptotic and practical aspects.Through experimental comparative analysis,the scheme proposed in this paper is more effective and feasible. 展开更多
关键词 data management blockchain federated learning
下载PDF
A Trailblazing Framework of Security Assessment for Traffic Data Management
9
作者 Abdulaziz Attaallah Khalil al-Sulbi +5 位作者 Areej Alasiry Mehrez Marzougui Neha Yadav Syed Anas Ansar Pawan Kumar Chaurasia Alka Agrawal 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1853-1875,共23页
Connected and autonomous vehicles are seeing their dawn at this moment.They provide numerous benefits to vehicle owners,manufacturers,vehicle service providers,insurance companies,etc.These vehicles generate a large a... Connected and autonomous vehicles are seeing their dawn at this moment.They provide numerous benefits to vehicle owners,manufacturers,vehicle service providers,insurance companies,etc.These vehicles generate a large amount of data,which makes privacy and security a major challenge to their success.The complicated machine-led mechanics of connected and autonomous vehicles increase the risks of privacy invasion and cyber security violations for their users by making them more susceptible to data exploitation and vulnerable to cyber-attacks than any of their predecessors.This could have a negative impact on how well-liked CAVs are with the general public,give them a poor name at this early stage of their development,put obstacles in the way of their adoption and expanded use,and complicate the economic models for their future operations.On the other hand,congestion is still a bottleneck for traffic management and planning.This research paper presents a blockchain-based framework that protects the privacy of vehicle owners and provides data security by storing vehicular data on the blockchain,which will be used further for congestion detection and mitigation.Numerous devices placed along the road are used to communicate with passing cars and collect their data.The collected data will be compiled periodically to find the average travel time of vehicles and traffic density on a particular road segment.Furthermore,this data will be stored in the memory pool,where other devices will also store their data.After a predetermined amount of time,the memory pool will be mined,and data will be uploaded to the blockchain in the form of blocks that will be used to store traffic statistics.The information is then used in two different ways.First,the blockchain’s final block will provide real-time traffic data,triggering an intelligent traffic signal system to reduce congestion.Secondly,the data stored on the blockchain will provide historical,statistical data that can facilitate the analysis of traffic conditions according to past behavior. 展开更多
关键词 Connected and autonomous vehicles(CAVs) traffic data management ethereum blockchain road side units smart cities
下载PDF
Automating the Competence Matrix of a Quality Control Laboratory with the Relational Database Management Framework—A Case Study with the Analytical Chemistry Unit of a National Regulatory Agency
10
作者 Marcel Okezue Eric Dietz 《E-Health Telecommunication Systems and Networks》 2023年第2期15-33,共19页
This study analyzed the concept of time efficiency in the data management process associated with the personnel training and competence assessments in one of the quality control (QC) laboratories of Nigeria’s Foods a... This study analyzed the concept of time efficiency in the data management process associated with the personnel training and competence assessments in one of the quality control (QC) laboratories of Nigeria’s Foods and Drugs Authority (NAFDAC). The laboratory administrators were burdened with a lot of mental and paper-based record keeping because the personnel training’s data were managed manually, hence not efficiently processed. The Excel spreadsheet provided by a Purdue doctoral dissertation as a remedial to this challenge was found to be deficient in handling operations in database tables, and therefore did not appropriately address the inefficiencies. Purpose: This study aimed to reduce the time it essentially takes to generate, obtain, manipulate, exchange, and securely store data that are associated with personnel competence training and assessments. Method: The study developed a software system that was integrated with a relational database management system (RDBMS) to improve manual/Excel-based data management procedures. To validate the efficiency of the software the mean operational times in using the Excel-based format were compared with that of the “New” software system. The data were obtained by performing four predefined core tasks for five hypothetical subjects using Excel and the “New” system (the model system) respectively. Results: It was verified that the average time to accomplish the specified tasks using the “New” system (37.08 seconds) was significantly (p = 0.00191, α = 0.05) lower than the time measurements for the Excel system (77.39 seconds) in the ANACHEM laboratory. The RDBMS-based “New” system provided operational (time) efficiency in the personnel training and competence assessment process in the QC laboratory and reduced human errors. 展开更多
关键词 data Management RDBMS NAFDAC Personnel Assessment SOP PROFICIENCY
下载PDF
Data Integrity and Risk
11
作者 Sasidhar Duggineni 《Open Journal of Optimization》 2023年第2期25-33,共9页
Data Integrity is a critical component of Data lifecycle management. Its importance increases even more in a complex and dynamic landscape. Actions like unauthorized access, unauthorized modifications, data manipulati... Data Integrity is a critical component of Data lifecycle management. Its importance increases even more in a complex and dynamic landscape. Actions like unauthorized access, unauthorized modifications, data manipulations, audit tampering, data backdating, data falsification, phishing and spoofing are no longer restricted to rogue individuals but in fact also prevalent in systematic organizations and states as well. Therefore, data security requires strong data integrity measures and associated technical controls in place. Without proper customized framework in place, organizations are prone to high risk of financial, reputational, revenue losses, bankruptcies, and legal penalties which we shall discuss further throughout this paper. We will also explore some of the improvised and innovative techniques in product development to better tackle the challenges and requirements of data security and integrity. 展开更多
关键词 data Governance data Integrity data Management data Security Technical Controls REGULATIONS
下载PDF
Product Data Management Implementation
12
作者 卢继平 唐水源 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期193-197,共5页
On the basis of PDM(product data management) definition and its connotation, the factors to ensure implementation success are analyzed. The definition phase, analysis phase, design phase, build and test phase, and pos... On the basis of PDM(product data management) definition and its connotation, the factors to ensure implementation success are analyzed. The definition phase, analysis phase, design phase, build and test phase, and post production phase during PDM implementation are described. The implementation is divided into ten processes, which consist of the above different phases. The relationships between phases and processes are illustrated. Finally, a workflow is proposed to guide the implementing at a fixed price. 展开更多
关键词 product data management IMPLEMENTATION WORKFLOW
下载PDF
CifNet Network Multi-Well Data Management System 被引量:11
13
作者 LiNing Mingchao CuiJian WangJianqiang WangCaizhi 《Applied Geophysics》 SCIE CSCD 2004年第2期129-131,共3页
The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing ... The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3,ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented. 展开更多
关键词 MULTI-WELL NETWORK data management CifNet
下载PDF
Big data management in the mining industry 被引量:10
14
作者 Chong-chong Qi 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2020年第2期131-139,共9页
The mining industry faces a number of challenges that promote the adoption of new technologies.Big data,which is driven by the accelerating progress of information and communication technology,is one of the promising ... The mining industry faces a number of challenges that promote the adoption of new technologies.Big data,which is driven by the accelerating progress of information and communication technology,is one of the promising technologies that can reshape the entire mining landscape.Despite numerous attempts to apply big data in the mining industry,fundamental problems of big data,especially big data management(BDM),in the mining industry persist.This paper aims to fill the gap by presenting the basics of BDM.This work provides a brief introduction to big data and BDM,and it discusses the challenges encountered by the mining industry to indicate the necessity of implementing big data.It also summarizes data sources in the mining industry and presents the potential benefits of big data to the mining industry.This work also envisions a future in which a global database project is established and big data is used together with other technologies(i.e.,automation),supported by government policies and following international standards.This paper also outlines the precautions for the utilization of BDM in the mining industry. 展开更多
关键词 big data big data management mining industry
下载PDF
Blockchain for Transparent Data Management Toward 6G 被引量:3
15
作者 Xuemin(Sherman)Shen Dongxiao Liu +5 位作者 Cheng Huang Liang Xue Han Yin Weihua Zhuang Rob Sun Bidi Ying 《Engineering》 SCIE EI 2022年第1期74-85,共12页
The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks(6G).Due to data heterogeneity and dynamics,decentralized data management(DM)is desirable for achieving tran... The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks(6G).Due to data heterogeneity and dynamics,decentralized data management(DM)is desirable for achieving transparent data operations across network domains,and blockchain can be a promising solution.However,the increasing data volume and stringent data privacy-preservation requirements in 6G bring significantly technical challenge to balance transparency,efficiency,and privacy requirements in decentralized blockchain-based DM.In this paper,we investigate blockchain solutions to address the challenge.First,we explore the consensus protocols and scalability mechanisms in blockchains and discuss the roles of DM stakeholders in blockchain architectures.Second,we investigate the authentication and authorization requirements for DM stakeholders.Third,we categorize DM privacy requirements and study blockchain-based mechanisms for collaborative data processing.Subsequently,we present research issues and potential solutions for blockchain-based DM toward 6G from these three perspectives.Finally,we conclude this paper and discuss future research directions. 展开更多
关键词 Blockchain data management DECENTRALIZATION TRANSPARENCY PRIVACY
下载PDF
CAD-VR geometry and meta data synchronization for design review applications 被引量:3
16
作者 SCHILLING Arne KIM Seokryul +2 位作者 WEISSMANN Daniel TANG Ziying CHOI Sangsu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第9期1482-1491,共10页
In this paper we present the MEMPHIS middleware framework for the integration of CAD geometries and assemblies with derived Virtual Reality (VR) models and its specific meta data and attributes. The goal of this work ... In this paper we present the MEMPHIS middleware framework for the integration of CAD geometries and assemblies with derived Virtual Reality (VR) models and its specific meta data and attributes. The goal of this work is to connect real time VR applications, especially for the Design Review, with enterprise software storing and managing CAD models (Product Data Man- agement—PDM). The preparation of VR models requires expert knowledge, is time consuming, and includes selection of required CAD data, tessellation, healing of unwanted gaps, applying materials and textures, and special surface and light effects. During the Design Review process, decisions are made concerning the choice of materials and surface forms. While materials can be switched directly on the VR model, the modification of part geometries must be made on the CAD model. Our system synchronizes modi- fications of the original CAD geometries and of attributes that are relevant for the realistic rendering using the PLM Services standard. Thus, repeated work for the VR preparation can be avoided. 展开更多
关键词 Virtual Reality (VR) CAD Product data Management (PDM) Geometry conversion
下载PDF
Research on the J2EE-based product database management system 被引量:3
17
作者 林琳 姚郁 钟诗胜 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第1期106-113,共8页
The basic frame and the design idea of J2EE-based Product Data Management (PDM) system are presented. This paper adopts the technology of Object-Oriented to realize the database design and builds the information model... The basic frame and the design idea of J2EE-based Product Data Management (PDM) system are presented. This paper adopts the technology of Object-Oriented to realize the database design and builds the information model of this PDM system. The integration key technology of PDM and CAD systems are discussed, the isomerous interface characteristics between CAD and PDM systems are analyzed, and finally, the integration mode of the PDM and CAD systems is given. Using these technologies, the integration of PDM and CAD systems is realized and the consistence of data in PDM and CAD systems is kept. Finally, the Product Data Management system is developed, which has been tested on development process of the hydraulic generator. The running process is stable and safety. 展开更多
关键词 product data management (PDM) system J2EE OBJECT-ORIENTED
下载PDF
ROLE OF META-MODEL IN ENGINEERING DATA WAREHOUSE
18
作者 SHENGuo-hua HUANGZhi-qiu WANGChuan-dong 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2004年第4期317-321,共5页
Engineering data are separately organized and their schemas are increasingly complex and variable. Engineering data management systems are needed to be able to manage the unified data and to be both customizable and e... Engineering data are separately organized and their schemas are increasingly complex and variable. Engineering data management systems are needed to be able to manage the unified data and to be both customizable and extensible. The design of the systems is heavily dependent on the flexibility and self-description of the data model. The characteristics of engineering data and their management facts are analyzed. Then engineering data warehouse (EDW) architecture and multi-layer metamodels are presented. Also an approach to manage anduse engineering data by a meta object is proposed. Finally, an application flight test EDW system (FTEDWS) is described and meta-objects to manage engineering data in the data warehouse are used. It shows that adopting a meta-modeling approach provides a support for interchangeability and a sufficiently flexible environment in which the system evolution and the reusability can be handled. 展开更多
关键词 data warehouse meta model engineering data management SELF-DESCRIPTION
下载PDF
A web product data management system based on Simple Object Access Protocol
19
作者 陆静平 《Journal of Chongqing University》 CAS 2003年第1期57-61,共5页
A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which incl... A new web product data management architecture is presented. The three-tier web architecture and Simple Object Access Protocol (SOAP) are combined to build the web-based product data management (PDM) system which includes three tiers: the user services tier, the business services tier, and the data services tier. The client service component uses the server-side technology, and Extensible Markup Language (XML) web service which uses SOAP as the communication protocol is chosen as the business service component. To illustrate how to build a web-based PDM system using the proposed architecture, a case PDM system which included three logical tires was built. To use the security and central management features of the database, a stored procedure was recommended in the data services tier. The business object was implemented as an XML web service so that client could use standard internet protocols to communicate with the business object from any platform. In order to satisfy users using all sorts of browser, the server-side technology and Microsoft ASP.NET was used to create the dynamic user interface. 展开更多
关键词 web-based product data management Extensible Markup Language (XML) Simple Object Access Protocol (SOAP) XML web service
下载PDF
Research on Product Data Management Based on Multi-agent System
20
作者 ZHUSai-juan YUTao 《Journal of Shanghai University(English Edition)》 CAS 2001年第4期322-325,共4页
PDM (product data management) is one kind of techniques based on software and database, which integrates information and process related to products. But it is not enough to perform the complication of PDM in enterpri... PDM (product data management) is one kind of techniques based on software and database, which integrates information and process related to products. But it is not enough to perform the complication of PDM in enterprises. Then the mechanism to harmonize all kinds of information and process is needed. The paper introduces a novel approach to implement the intelligent monitor of PDM based on MAS (multi agent system). It carries out the management of information and process by MC (monitor center). The paper first puts forward the architecture of the whole system, then defines the structure of MC and its interoperation mode. 展开更多
关键词 PDM(product data management) MAS (multi agent system) MC(monitor center)
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部