The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei...The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.展开更多
[Objective] The aim was to set up a plant digital information retrieval system.[Method] Plant digital information retrieval system was designed by combining with Microsoft Visual Basic 6.0 Enterprise Edition database ...[Objective] The aim was to set up a plant digital information retrieval system.[Method] Plant digital information retrieval system was designed by combining with Microsoft Visual Basic 6.0 Enterprise Edition database management system and Structure Query Language.[Result] The system realized electronic management and retrieval of local plant information.The key words of retrieval included family,genus,formal name,Chinese name,Latin,morphological characteristics,habitat,collection people,collection places,and protect class and so on.[Conclusion] It provided reference for these problems of species identification and digital management of herbarium.展开更多
Based on the target analysis of the operation optimization for power plants, a novel system scheme called operation optimization decision support system (OODSS) is brought forward. According to the structure and desig...Based on the target analysis of the operation optimization for power plants, a novel system scheme called operation optimization decision support system (OODSS) is brought forward. According to the structure and design thinking of decision support system (DSS), the overall structure of the OODSS is studied, and the scheme of the sub systems in the OODSS such as the user interface system, the problem processing system, the database system, the model base system, the expert system (ES) and the data mining sy...展开更多
We developed the China Regional Gravity Information System(RGIS) using mixed language programming in Visual Basic,Visual C++,and FORTRAN.The software is based on the MapInfo platform with OLE technology.With this ...We developed the China Regional Gravity Information System(RGIS) using mixed language programming in Visual Basic,Visual C++,and FORTRAN.The software is based on the MapInfo platform with OLE technology.With this system,we achieve visual data management for the database with spatial geography,geology data and gravity data as well as graphical data editing and data table operations over the whole of China.We are able to perform normalized gravity reduction,gravity and magnetic field transforms,gravity anomaly inversion and interpretation,thematic mapping and so on.展开更多
In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provide...In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provides the integrated environment and more functions for many subsystems of ECAD and engine designers. So it improves the design efficiency.展开更多
It is important and difficult to control the temperature of mass concrete structure during high arch dam construction.A new method with decision support system is presented for temperature control and crack prevention...It is important and difficult to control the temperature of mass concrete structure during high arch dam construction.A new method with decision support system is presented for temperature control and crack prevention.It is a database system with functions of data storage,information inquiry,data analysis,early warning and resource sharing.Monitoring information during construction can be digitized via this system,and the intelligent analysis and dynamic control of concrete temperature can be conducted.This method has been applied in the construction of the Dagangshan Arch Dam in China and has proven to be very convenient.Based on the decision support of this system and the dynamic adjustment of construction measures,the concrete temperature of this project is well-controlled.展开更多
Objective To report a case of the implantation of thyroid hyperplastic or neoplastic tissue after endoscopic thyroidectomy and discuss this complication in aspects of prevalence, pathogenesis, protection, and therapie...Objective To report a case of the implantation of thyroid hyperplastic or neoplastic tissue after endoscopic thyroidectomy and discuss this complication in aspects of prevalence, pathogenesis, protection, and therapies. Methods A systematic search of literature from the PubMed database was conducted for identifying eligible studies on implantation of thyroid hyperplastic or neoplastic cells after endoscopic thyroid surgery. Results Overall, 5 reported cases on patients suffering from endoscopic thyroid surgery with implantation of thyroid hyperplastic or neoplastic cells were included in the systematic review. Conclusions Unskilled surgeons, rough intraoperative surgical treatment, scarification or rupture of tumor, contamination of instruments, chimney effect, aerosolization of tumor cells may be associated with the implantation after endoscopic thyroidectomy. To minimize the risk of such complication, we should be more meticulous and strict the endoscopic surgery indications.展开更多
A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inhe...A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inherited and expanded in the new system. The integrity and security of the SOTER database are enhanced. The attribute database management, the spatial database management and the model base are integrated into SOTER based on the component object model (COM), and the graphical user interface (GUI) for Windows is used to interact with clients, thus being easy to create and maintain the SOTER, and convenient to promote the quantification and automation of soil information application.展开更多
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv...Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.展开更多
This paper introduces the methods and technicalities of applicating information technology in a mining area railway transport system. The pattern Client /Server is adopted in this system. There are two types of client...This paper introduces the methods and technicalities of applicating information technology in a mining area railway transport system. The pattern Client /Server is adopted in this system. There are two types of clients, i.e. PC and terminal. This article focuses on the system demand analysis, the data flow, the system architecture and some technical details.展开更多
How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, dat...How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.展开更多
Based on the relationship among the geographic events, spatial changes and the database operations, a new automatic (semi-automatic) incremental updating approach of spatio-temporal database (STDB) named as (event-bas...Based on the relationship among the geographic events, spatial changes and the database operations, a new automatic (semi-automatic) incremental updating approach of spatio-temporal database (STDB) named as (event-based) incremental updating (E-BIU) is proposed in this paper. At first, the relationship among the events, spatial changes and the database operations is analyzed, then a total architecture of E-BIU implementation is designed, which includes an event queue, three managers and two sets of rules, each component is presented in detail. The process of the E-BIU of master STDB is described successively. An example of building’s incremental updating is given to illustrate this approach at the end. The result shows that E-BIU is an efficient automatic updating approach for master STDB.展开更多
A DMVOCC-MVDA (distributed multiversion optimistic concurrency control with multiversion dynamic adjustment) protocol was presented to process mobile distributed real-time transaction in mobile broadcast environment...A DMVOCC-MVDA (distributed multiversion optimistic concurrency control with multiversion dynamic adjustment) protocol was presented to process mobile distributed real-time transaction in mobile broadcast environments. At the mobile hosts, all transactions perform local pre-validation. The local pre-validation process is carried out against the committed transactions at the server in the last broadcast cycle. Transactions that survive in local pre-validation must be submitted to the server for local final validation. The new protocol eliminates conflicts between mobile read-only and mobile update transactions, and resolves data conflicts flexibly by using multiversion dynamic adjustment of serialization order to avoid unnecessary restarts of transactions. Mobile read-only transactions can be committed with no-blocking, and respond time of mobile read-only transactions is greatly shortened. The tolerance of mobile transactions of disconnections from the broadcast channel is increased. In global validation mobile distributed transactions have to do check to ensure distributed serializability in all participants. The simulation results show that the new concurrency control protocol proposed offers better performance than other protocols in terms of miss rate, restart rate, commit rate. Under high work load (think time is ls) the miss rate of DMVOCC-MVDA is only 14.6%, is significantly lower than that of other protocols. The restart rate of DMVOCC-MVDA is only 32.3%, showing that DMVOCC-MVDA can effectively reduce the restart rate of mobile transactions. And the commit rate of DMVOCC-MVDA is up to 61.2%, which is obviously higher than that of other protocols.展开更多
In the application development of database,sharing information a- mong different DBMSs is an important and meaningful technical subject. This paper analyzes the schema definition and physical organization of popu- lar...In the application development of database,sharing information a- mong different DBMSs is an important and meaningful technical subject. This paper analyzes the schema definition and physical organization of popu- lar relational DBMSs and suggests the use of an intermediary schema.This technology provides many advantages such as powerful extensibility and ease in the integration of data conversions among different DBMSs etc.This pa- per introduces the data conversion system under DOS and XENIX operating systems.展开更多
文摘The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.
基金Supported by Inner Mongolia Natural Science Fund(20080404MS0507)National Natural Science Fund(30660150)+1 种基金Education Ministry Higher Education School Science Innovation Project Major Program Cultivation Fund Program(707014)Inner Mongolia Natural Scientific Fund Major Program(200607010501)~~
文摘[Objective] The aim was to set up a plant digital information retrieval system.[Method] Plant digital information retrieval system was designed by combining with Microsoft Visual Basic 6.0 Enterprise Edition database management system and Structure Query Language.[Result] The system realized electronic management and retrieval of local plant information.The key words of retrieval included family,genus,formal name,Chinese name,Latin,morphological characteristics,habitat,collection people,collection places,and protect class and so on.[Conclusion] It provided reference for these problems of species identification and digital management of herbarium.
文摘Based on the target analysis of the operation optimization for power plants, a novel system scheme called operation optimization decision support system (OODSS) is brought forward. According to the structure and design thinking of decision support system (DSS), the overall structure of the OODSS is studied, and the scheme of the sub systems in the OODSS such as the user interface system, the problem processing system, the database system, the model base system, the expert system (ES) and the data mining sy...
基金supported by National Geological Survey Projects (No. 1212010510903 and 200214100027)
文摘We developed the China Regional Gravity Information System(RGIS) using mixed language programming in Visual Basic,Visual C++,and FORTRAN.The software is based on the MapInfo platform with OLE technology.With this system,we achieve visual data management for the database with spatial geography,geology data and gravity data as well as graphical data editing and data table operations over the whole of China.We are able to perform normalized gravity reduction,gravity and magnetic field transforms,gravity anomaly inversion and interpretation,thematic mapping and so on.
文摘In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provides the integrated environment and more functions for many subsystems of ECAD and engine designers. So it improves the design efficiency.
基金Supported by the National Natural Science Foundation of China(No.50909078)the National Basic Research Program of China("973"Program,No.2013CB035900)
文摘It is important and difficult to control the temperature of mass concrete structure during high arch dam construction.A new method with decision support system is presented for temperature control and crack prevention.It is a database system with functions of data storage,information inquiry,data analysis,early warning and resource sharing.Monitoring information during construction can be digitized via this system,and the intelligent analysis and dynamic control of concrete temperature can be conducted.This method has been applied in the construction of the Dagangshan Arch Dam in China and has proven to be very convenient.Based on the decision support of this system and the dynamic adjustment of construction measures,the concrete temperature of this project is well-controlled.
文摘Objective To report a case of the implantation of thyroid hyperplastic or neoplastic tissue after endoscopic thyroidectomy and discuss this complication in aspects of prevalence, pathogenesis, protection, and therapies. Methods A systematic search of literature from the PubMed database was conducted for identifying eligible studies on implantation of thyroid hyperplastic or neoplastic cells after endoscopic thyroid surgery. Results Overall, 5 reported cases on patients suffering from endoscopic thyroid surgery with implantation of thyroid hyperplastic or neoplastic cells were included in the systematic review. Conclusions Unskilled surgeons, rough intraoperative surgical treatment, scarification or rupture of tumor, contamination of instruments, chimney effect, aerosolization of tumor cells may be associated with the implantation after endoscopic thyroidectomy. To minimize the risk of such complication, we should be more meticulous and strict the endoscopic surgery indications.
基金Project supported by the National Natural Science Foundation of China (No. 40271056) Hubei Provin- cial Natural Science Foundation of China (No. 99J123).
文摘A SOTER management system was developed by analyzing, designing, programming, testing, repeated proceeding and progressing based on the object-oriented method. The function of the attribute database management is inherited and expanded in the new system. The integrity and security of the SOTER database are enhanced. The attribute database management, the spatial database management and the model base are integrated into SOTER based on the component object model (COM), and the graphical user interface (GUI) for Windows is used to interact with clients, thus being easy to create and maintain the SOTER, and convenient to promote the quantification and automation of soil information application.
文摘Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
文摘This paper introduces the methods and technicalities of applicating information technology in a mining area railway transport system. The pattern Client /Server is adopted in this system. There are two types of clients, i.e. PC and terminal. This article focuses on the system demand analysis, the data flow, the system architecture and some technical details.
文摘How to protect the database, the kernel resources of information warfare, is becoming more and more important since the rapid development of computer and communication technology. As an application-level firewall, database security proxy can successfully repulse attacks originated from outside the network, reduce to zerolevel damage from foreign DBMS products. We enhanced the capability of the COAST' s firewall reference model by adding a transmission unit modification function and an attribute value mapping function,describes the schematic and semantic layer reference model, and finally forms a reference model for DBMS security proxy which greatly helps in the design and implementation of database security proxies. This modeling process can clearly separate the system functionality into three layers, define the possible security functions for each layer, and estimate the computational cost for each layer.
文摘Based on the relationship among the geographic events, spatial changes and the database operations, a new automatic (semi-automatic) incremental updating approach of spatio-temporal database (STDB) named as (event-based) incremental updating (E-BIU) is proposed in this paper. At first, the relationship among the events, spatial changes and the database operations is analyzed, then a total architecture of E-BIU implementation is designed, which includes an event queue, three managers and two sets of rules, each component is presented in detail. The process of the E-BIU of master STDB is described successively. An example of building’s incremental updating is given to illustrate this approach at the end. The result shows that E-BIU is an efficient automatic updating approach for master STDB.
基金Project(20030533011)supported by the National Research Foundation for the Doctoral Program of Higher Education of China
文摘A DMVOCC-MVDA (distributed multiversion optimistic concurrency control with multiversion dynamic adjustment) protocol was presented to process mobile distributed real-time transaction in mobile broadcast environments. At the mobile hosts, all transactions perform local pre-validation. The local pre-validation process is carried out against the committed transactions at the server in the last broadcast cycle. Transactions that survive in local pre-validation must be submitted to the server for local final validation. The new protocol eliminates conflicts between mobile read-only and mobile update transactions, and resolves data conflicts flexibly by using multiversion dynamic adjustment of serialization order to avoid unnecessary restarts of transactions. Mobile read-only transactions can be committed with no-blocking, and respond time of mobile read-only transactions is greatly shortened. The tolerance of mobile transactions of disconnections from the broadcast channel is increased. In global validation mobile distributed transactions have to do check to ensure distributed serializability in all participants. The simulation results show that the new concurrency control protocol proposed offers better performance than other protocols in terms of miss rate, restart rate, commit rate. Under high work load (think time is ls) the miss rate of DMVOCC-MVDA is only 14.6%, is significantly lower than that of other protocols. The restart rate of DMVOCC-MVDA is only 32.3%, showing that DMVOCC-MVDA can effectively reduce the restart rate of mobile transactions. And the commit rate of DMVOCC-MVDA is up to 61.2%, which is obviously higher than that of other protocols.
文摘In the application development of database,sharing information a- mong different DBMSs is an important and meaningful technical subject. This paper analyzes the schema definition and physical organization of popu- lar relational DBMSs and suggests the use of an intermediary schema.This technology provides many advantages such as powerful extensibility and ease in the integration of data conversions among different DBMSs etc.This pa- per introduces the data conversion system under DOS and XENIX operating systems.