期刊文献+
共找到76篇文章
< 1 2 4 >
每页显示 20 50 100
“数据库系统”理论与实践课程中的思政元素研究
1
作者 颜新云 朱霞 马守明 《科教导刊》 2022年第18期99-101,共3页
文章针对“数据库系统”在某应用型高校网络工程专业中的实际教学情况,研究课程思政元素,从思政意义、研究现状、教学目标、教学方法及教学案例等方面阐述对该课程中思政元素的研究与思考。
关键词 课程思政元素 “数据库系统” 网络工程专业
下载PDF
“智改数转”背景下“数据库系统原理”课程远程教学的分析
2
作者 张迁 朱海霞 《计算机应用文摘》 2024年第17期63-66,共4页
制造型企业进行“智改数转”是实现我国经济高质量发展的必然选择,这一过程可以促进数字经济和实体经济的融合,放大数字技术对经济发展的倍增作用。近年来,各类“智改数转”产业学院频繁落地,以产教融合为中心,坚持产学研用,为地方经济... 制造型企业进行“智改数转”是实现我国经济高质量发展的必然选择,这一过程可以促进数字经济和实体经济的融合,放大数字技术对经济发展的倍增作用。近年来,各类“智改数转”产业学院频繁落地,以产教融合为中心,坚持产学研用,为地方经济发展提供人才支撑和技术支持。在此背景下,各类开放大学的远程课程教学模式亟须改革,以满足在数字化、智能化转型浪潮中企业对新型人才的培养要求。作为高校计算机相关专业的核心课程,“数据库系统原理”课程教学模式的改革尤为重要。文章针对当前“智改数转”背景下“数据库系统原理”课程在远程教学中存在的问题进行分析,并探讨相应的解决方法。 展开更多
关键词 智改数转 产业学院 “数据库系统原理”课程 远程教育
下载PDF
“数据库系统概论”课教学探讨
3
作者 李月强 《煤炭高等教育》 2002年第4期107-107,共1页
如何把“数据库系统概论”这一以理论为主课程 ,在教学中使学生产生兴趣 ,提高教学质量 ,是广大同行一直在研究探讨的问题。在教学实践中进行了一些探索 ,认为 :提高学生对该课程重要性的认识 ,使教学内容立体化 ,教学方法形象化 ,并与... 如何把“数据库系统概论”这一以理论为主课程 ,在教学中使学生产生兴趣 ,提高教学质量 ,是广大同行一直在研究探讨的问题。在教学实践中进行了一些探索 ,认为 :提高学生对该课程重要性的认识 ,使教学内容立体化 ,教学方法形象化 ,并与实践环节、毕业设计等紧密结合 。 展开更多
关键词 “数据库系统概论”课 多媒体课件 教学内容 学习兴趣 教学内容 教学形式 课程设计 职业技术教育
下载PDF
思政元素融入“数据库系统原理与应用”课程教学的实践探索
4
作者 赵晓华 《计算机应用文摘》 2022年第7期4-6,共3页
“数据库系统原理与应用”课程是计算机专业学生的专业核心课程,是理论与实践并重的课程。课程思政建设是推动学生实现全面发展的必要路径。为此,若要培育全面发展的学生,必须将思政元素融入“数据库系统原理与应用”课程教学。文章通... “数据库系统原理与应用”课程是计算机专业学生的专业核心课程,是理论与实践并重的课程。课程思政建设是推动学生实现全面发展的必要路径。为此,若要培育全面发展的学生,必须将思政元素融入“数据库系统原理与应用”课程教学。文章通过对课程思政建设产生的问题以及原因进行分析,旨在提升课程思政的质量。 展开更多
关键词 “数据库系统原理与应用”课程 课程思政 思政元素 课程建设
下载PDF
数据安全与数据库加密——“数据库加密应用群件系统”课题介绍
5
作者 彭修泉 刘志勇 宋映明 《华南金融电脑》 2002年第3期29-31,共3页
数据库加密应用群件系统是广东省委机要局等单位在广东省科技厅立项的研究课题。本文为课题负责人所撰写,简要阐述了数据加密的作用及其课题成果的特性。本刊现予以刊登,以飨读者。
关键词 数字安全 数据库 加密 “数据库加密应用群件系统”课题
下载PDF
数据库课程教学改革:面向21世纪课程教材与国家精品课程 被引量:39
6
作者 王珊 《中国大学教学》 CSSCI 2006年第4期14-17,共4页
数据库技术是计算机科学的重要分支,数据库系统已经成为信息系统的核心和基础。“数据库系统概论”是学习数据库技术的第一门课程,肩负着培养学生数据库理论和实践知识的重任。
关键词 国家精品课程 教学改革 高校 “数据库系统概论” 团队意识 教学参考书 学习指导
下载PDF
WEIGHTED ALGORITHM FOR FINGERPRINTING RELATIONAL DATABASES 被引量:1
7
作者 崔新春 秦小麟 +1 位作者 管致锦 束瑜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第2期148-154,共7页
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei... The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm. 展开更多
关键词 digital fingerprinting relational database systems copyright protection attribute weight traitor tracing
下载PDF
The Preliminary Design and Implement of Plant Digital Information Retrieval System 被引量:3
8
作者 樊永军 闫伟 +2 位作者 王黎元 杨秀丽 刘学威 《Agricultural Science & Technology》 CAS 2011年第5期751-755,共5页
[Objective] The aim was to set up a plant digital information retrieval system.[Method] Plant digital information retrieval system was designed by combining with Microsoft Visual Basic 6.0 Enterprise Edition database ... [Objective] The aim was to set up a plant digital information retrieval system.[Method] Plant digital information retrieval system was designed by combining with Microsoft Visual Basic 6.0 Enterprise Edition database management system and Structure Query Language.[Result] The system realized electronic management and retrieval of local plant information.The key words of retrieval included family,genus,formal name,Chinese name,Latin,morphological characteristics,habitat,collection people,collection places,and protect class and so on.[Conclusion] It provided reference for these problems of species identification and digital management of herbarium. 展开更多
关键词 Plant digital information retrieval system DATABASE Design and implement
下载PDF
DSS Scheme for Operation Optimization Problem on Power Plants 被引量:1
9
作者 江浩 徐治皋 《Journal of Southeast University(English Edition)》 EI CAS 2002年第3期212-215,共4页
Based on the target analysis of the operation optimization for power plants, a novel system scheme called operation optimization decision support system (OODSS) is brought forward. According to the structure and desig... Based on the target analysis of the operation optimization for power plants, a novel system scheme called operation optimization decision support system (OODSS) is brought forward. According to the structure and design thinking of decision support system (DSS), the overall structure of the OODSS is studied, and the scheme of the sub systems in the OODSS such as the user interface system, the problem processing system, the database system, the model base system, the expert system (ES) and the data mining sy... 展开更多
关键词 power plant operation optimization DSS database system model base system data mining expert system
下载PDF
The launch of a large regional gravity information system in China 被引量:1
10
作者 张明华 贺颢 王成锡 《Applied Geophysics》 SCIE CSCD 2011年第2期170-175,179,共7页
We developed the China Regional Gravity Information System(RGIS) using mixed language programming in Visual Basic,Visual C++,and FORTRAN.The software is based on the MapInfo platform with OLE technology.With this ... We developed the China Regional Gravity Information System(RGIS) using mixed language programming in Visual Basic,Visual C++,and FORTRAN.The software is based on the MapInfo platform with OLE technology.With this system,we achieve visual data management for the database with spatial geography,geology data and gravity data as well as graphical data editing and data table operations over the whole of China.We are able to perform normalized gravity reduction,gravity and magnetic field transforms,gravity anomaly inversion and interpretation,thematic mapping and so on. 展开更多
关键词 RGIS gravity database GIS application potential data processing
下载PDF
Multimedia Engineering Database Management Systems
11
作者 梁允荣 郭贵锁 +3 位作者 宋瀚涛 冯希 高春雷 郭胜 《Journal of Beijing Institute of Technology》 EI CAS 1996年第1期68-73,共6页
In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provide... In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provides the integrated environment and more functions for many subsystems of ECAD and engine designers. So it improves the design efficiency. 展开更多
关键词 database management systems multimedia technology engineering CAD
下载PDF
Real-Time Temperature Control for High Arch Dam Based on Decision Support System 被引量:4
12
作者 井向阳 刘杏红 +1 位作者 周伟 常晓林 《Transactions of Tianjin University》 EI CAS 2014年第2期118-125,共8页
It is important and difficult to control the temperature of mass concrete structure during high arch dam construction.A new method with decision support system is presented for temperature control and crack prevention... It is important and difficult to control the temperature of mass concrete structure during high arch dam construction.A new method with decision support system is presented for temperature control and crack prevention.It is a database system with functions of data storage,information inquiry,data analysis,early warning and resource sharing.Monitoring information during construction can be digitized via this system,and the intelligent analysis and dynamic control of concrete temperature can be conducted.This method has been applied in the construction of the Dagangshan Arch Dam in China and has proven to be very convenient.Based on the decision support of this system and the dynamic adjustment of construction measures,the concrete temperature of this project is well-controlled. 展开更多
关键词 concrete arch dam temperature control decision support system pipe cooling MONITORING
下载PDF
Extrathyroidal Implantation of Thyroid Hyperplastic/neoplastic Cells after Endoscopic Thyroid Surgery 被引量:2
13
作者 Cao Xi Xie-qun Xu +2 位作者 Tao Hong Bing-lu Li Wei Liu 《Chinese Medical Sciences Journal》 CAS CSCD 2014年第3期180-184,共5页
Objective To report a case of the implantation of thyroid hyperplastic or neoplastic tissue after endoscopic thyroidectomy and discuss this complication in aspects of prevalence, pathogenesis, protection, and therapie... Objective To report a case of the implantation of thyroid hyperplastic or neoplastic tissue after endoscopic thyroidectomy and discuss this complication in aspects of prevalence, pathogenesis, protection, and therapies. Methods A systematic search of literature from the PubMed database was conducted for identifying eligible studies on implantation of thyroid hyperplastic or neoplastic cells after endoscopic thyroid surgery. Results Overall, 5 reported cases on patients suffering from endoscopic thyroid surgery with implantation of thyroid hyperplastic or neoplastic cells were included in the systematic review. Conclusions Unskilled surgeons, rough intraoperative surgical treatment, scarification or rupture of tumor, contamination of instruments, chimney effect, aerosolization of tumor cells may be associated with the implantation after endoscopic thyroidectomy. To minimize the risk of such complication, we should be more meticulous and strict the endoscopic surgery indications. 展开更多
关键词 endoscopic thyroid surgery benign thyroid tumor malignant thyroid tumor subcutaneous tissue IMPLANTATION
下载PDF
Analysis and Design of Soils and Terrain Digital Database (SOTER) Management System Based on Object-Oriented Method 被引量:4
14
作者 ZHANGHAITAO ZHOUYONG +2 位作者 R.V.BIRNIE A.SIBBALD RENYI 《Pedosphere》 SCIE CAS CSCD 2003年第2期111-120,共10页
A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inhe... A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inherited and expanded in the new system. The integrity and security of the SOTER database are enhanced. The attribute database management, the spatial database management and the model base are integrated into SOTER based on the component object model (COM), and the graphical user interface (GUI) for Windows is used to interact with clients, thus being easy to create and maintain the SOTER, and convenient to promote the quantification and automation of soil information application. 展开更多
关键词 component object model database model OBJECT-ORIENTED SOTER
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
15
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(Database Security and Protection System)
下载PDF
Research and Application of Information Technology in Mining Area Railway 被引量:2
16
作者 余静 董泰 才庆祥 《Journal of China University of Mining and Technology》 2001年第1期44-46,共3页
This paper introduces the methods and technicalities of applicating information technology in a mining area railway transport system. The pattern Client /Server is adopted in this system. There are two types of client... This paper introduces the methods and technicalities of applicating information technology in a mining area railway transport system. The pattern Client /Server is adopted in this system. There are two types of clients, i.e. PC and terminal. This article focuses on the system demand analysis, the data flow, the system architecture and some technical details. 展开更多
关键词 railway transport information technology SYBASE POWERBUILDER
下载PDF
A reference model for database security proxy 被引量:1
17
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 CSCD 2002年第1期30-36,共7页
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat... How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer. 展开更多
关键词 information warfare database security FIREWALL reference model security proxy
下载PDF
Event-based incremental updating of spatio-temporal database 被引量:10
18
作者 周晓光 陈军 +2 位作者 蒋捷 朱建军 李志林 《Journal of Central South University of Technology》 2004年第2期192-198,共7页
Based on the relationship among the geographic events, spatial changes and the database operations, a new automatic (semi-automatic) incremental updating approach of spatio-temporal database (STDB) named as (event-bas... Based on the relationship among the geographic events, spatial changes and the database operations, a new automatic (semi-automatic) incremental updating approach of spatio-temporal database (STDB) named as (event-based) incremental updating (E-BIU) is proposed in this paper. At first, the relationship among the events, spatial changes and the database operations is analyzed, then a total architecture of E-BIU implementation is designed, which includes an event queue, three managers and two sets of rules, each component is presented in detail. The process of the E-BIU of master STDB is described successively. An example of building’s incremental updating is given to illustrate this approach at the end. The result shows that E-BIU is an efficient automatic updating approach for master STDB. 展开更多
关键词 incremental updating geographic event spatial change database operation MANAGER
下载PDF
Scheduling transactions in mobile distributed real-time database systems 被引量:1
19
作者 雷向东 赵跃龙 +1 位作者 陈松乔 袁晓莉 《Journal of Central South University of Technology》 EI 2008年第4期545-551,共7页
A DMVOCC-MVDA (distributed multiversion optimistic concurrency control with multiversion dynamic adjustment) protocol was presented to process mobile distributed real-time transaction in mobile broadcast environment... A DMVOCC-MVDA (distributed multiversion optimistic concurrency control with multiversion dynamic adjustment) protocol was presented to process mobile distributed real-time transaction in mobile broadcast environments. At the mobile hosts, all transactions perform local pre-validation. The local pre-validation process is carried out against the committed transactions at the server in the last broadcast cycle. Transactions that survive in local pre-validation must be submitted to the server for local final validation. The new protocol eliminates conflicts between mobile read-only and mobile update transactions, and resolves data conflicts flexibly by using multiversion dynamic adjustment of serialization order to avoid unnecessary restarts of transactions. Mobile read-only transactions can be committed with no-blocking, and respond time of mobile read-only transactions is greatly shortened. The tolerance of mobile transactions of disconnections from the broadcast channel is increased. In global validation mobile distributed transactions have to do check to ensure distributed serializability in all participants. The simulation results show that the new concurrency control protocol proposed offers better performance than other protocols in terms of miss rate, restart rate, commit rate. Under high work load (think time is ls) the miss rate of DMVOCC-MVDA is only 14.6%, is significantly lower than that of other protocols. The restart rate of DMVOCC-MVDA is only 32.3%, showing that DMVOCC-MVDA can effectively reduce the restart rate of mobile transactions. And the commit rate of DMVOCC-MVDA is up to 61.2%, which is obviously higher than that of other protocols. 展开更多
关键词 mobile distributed real-time database systems muliversion optimistic concurrency control multiversion dynamic adjustment pre-validation multiversion data broadcast
下载PDF
The Technology of Data Conversion Among Different DBMSs
20
作者 孙适雨 宋瀚涛 梁允荣 《Journal of Beijing Institute of Technology》 EI CAS 1993年第1期83-89,共7页
In the application development of database,sharing information a- mong different DBMSs is an important and meaningful technical subject. This paper analyzes the schema definition and physical organization of popu- lar... In the application development of database,sharing information a- mong different DBMSs is an important and meaningful technical subject. This paper analyzes the schema definition and physical organization of popu- lar relational DBMSs and suggests the use of an intermediary schema.This technology provides many advantages such as powerful extensibility and ease in the integration of data conversions among different DBMSs etc.This pa- per introduces the data conversion system under DOS and XENIX operating systems. 展开更多
关键词 DATABASE database management system data models data structure
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部