期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
面向生产单元的数控程序管理系统 被引量:1
1
作者 穆立茂 岳彦芳 《江苏机械制造与自动化》 2001年第4期146-147,共2页
介绍了数控程序管理系统在企业信息管理中的地位 ;着重说明了数控程序管理系统的功能构成、系统软件的功能模型和系统软件的开发方案 ;
关键词 数控程序管理系统 通讯 企业管理 MZS 生产单元
下载PDF
基于Web的数控程序管理系统开发
2
作者 穆立茂 岳彦芳 郭朝勇 《现代制造工程》 CSCD 北大核心 2003年第7期20-23,共4页
采用浏览器 /服务器结构及ASP技术的服务器应用程序开发方案 ,开发了一套基于Web的数控程序管理系统 。
关键词 数控程序管理系统 WEB 分类管理 浏览器/服务器 ASP 动态服务器页面 制造执行系统 数控机床
下载PDF
基于Web数控程序管理系统及关键技术 被引量:1
3
作者 郑书花 岳彦芳 《现代制造工程》 CSCD 北大核心 2003年第7期23-25,共3页
介绍数控程序管理系统 (NCMS)开发的必要性 ,阐述该系统的结构模块。
关键词 数控程序管理系统 网络制造 数据库 NCMS 开发 WEB
下载PDF
基于LBS的“急速药递”小程序管理系统的设计与实现 被引量:1
4
作者 杨欧阳 杨朝贵 +2 位作者 梁恩 张智恒 余远波 《电脑知识与技术》 2021年第8期95-98,共4页
为给紧急需要某种药物且意识清醒的用户快速提供药品,研究基于地理位置的药品求助和响应救助具有重要意义。在分析了用户急需某种药品但是无法获得时的需求,设计了基于用户地理位置(LBS)的“急速药递”小程序管理系统,对系统的紧急求助... 为给紧急需要某种药物且意识清醒的用户快速提供药品,研究基于地理位置的药品求助和响应救助具有重要意义。在分析了用户急需某种药品但是无法获得时的需求,设计了基于用户地理位置(LBS)的“急速药递”小程序管理系统,对系统的紧急求助、消息推送、地图显示和基本信息填报等功能模块进行分析与设计,主要运用位置标记的方式展示求助信息、以消息推送的形式通知附近的志愿者或医药机构、地图显示药品求助信息、附近多位商家或志愿者响应求助并快速将药品送达,实现基于LBS的药品需求信息服务。系统采用云开发模式开发,描述了系统实现的关键技术,具有一定的实用价值。 展开更多
关键词 “急速药递”小程序管理系统 基于地理位置 位置标记 消息推送
下载PDF
一个新型数控程序管理系统的介绍
5
作者 关涛 王秀菊 《黑龙江科技信息》 2002年第4期108-108,共1页
1.前言我们阿城继电器股份有限公司的主导产品是电站自动化成套装置,以各种控制和保护用的屏、台、箱、柜类产品为主。我分厂担负着全公司的各类产品的结构加工任务。在97年以前,我公司产品结构类型较少,我们对各种需在数控加工中心上... 1.前言我们阿城继电器股份有限公司的主导产品是电站自动化成套装置,以各种控制和保护用的屏、台、箱、柜类产品为主。我分厂担负着全公司的各类产品的结构加工任务。在97年以前,我公司产品结构类型较少,我们对各种需在数控加工中心上加工的零部件保存了标准加工程序,以卡片方式管理。在结构类型不多的情况下,这种管理方式尚可勉强维持。但随着时间的发展,原有的产品结构已不能满足市场的需求。于是我公司又相继开发并投产了一些新的结构类型。另外,还有我厂为其它厂家生产的配套产品。需要管理的零件加工程序猛增到几千个,卡片式管理的弊端越来越明显,主要问题有: 展开更多
关键词 数控加工 数据库管理系统 模糊查询 程序管理系统
下载PDF
基于J2EE平台的数控程序管理系统介绍
6
作者 余宏 王继水 《电工电气》 2010年第11期63-64,共2页
1总体结构 DNC(分布式数控)系统以数控程序的生成、修改、校核、批准、发布和归档作为整体的工作流程。使数控程序的管理和普通工艺卡片的管理流程完全一致,保证了在DNC和PDM中数据的一致性,完善了对数控程序的管理。
关键词 数控程序管理系统 J2EE平台 分布式数控 工作流程 管理流程 工艺卡片 DNC 体结构
下载PDF
发射操作系统(LPS)航天飞机连接器分析网络(SCAN)
7
作者 D.Gerken M.Anderson 黄祥明 《国外导弹与航天运载器》 1991年第7期64-72,共9页
对于Kennedy空间中心(KSC)的一次典型着陆发射,有多至2000或者更多的轨道飞行器的电动/电子连接器要经受影响线路功能的分离、重新配接和重新测试。每一连接器分离大概要断开多至128条线路。SCAN是一种高度复杂的联机交互式软件系统,它... 对于Kennedy空间中心(KSC)的一次典型着陆发射,有多至2000或者更多的轨道飞行器的电动/电子连接器要经受影响线路功能的分离、重新配接和重新测试。每一连接器分离大概要断开多至128条线路。SCAN是一种高度复杂的联机交互式软件系统,它能跟踪和及时报告全部机上连接器的当前线路状况与所设计的线路配置对比情况。经过线路连续性跟踪,就能对连接器的分离、所规划的调整工作以及LRU的调动/替换作出预先的估计。SCAN对于运载工具测试时所遇到的问题具有联机分析能力。因此,通过线路屏幕图象和联机线路扫描就能更有效地查出故障。 展开更多
关键词 程序管理系统 程序系统 航天运载器
下载PDF
机床联网项目概述与实施难点
8
作者 赵灏然 《计算机光盘软件与应用》 2012年第1期96-96,94,共2页
本文通过对机床联网项目的概述、其核心功能(分布式控制网络、生产数据采集、NC程序管理、可视化数据展示)及其与其它应用系统(PDM/CAPP、MES、刀具管理系统)的集成。
关键词 信息化 MES DNC MDC NC程序管理系统 可视化数据展示 系统集成
下载PDF
Management Procedures for Data Collected via Intelligent Transportation Systems
9
作者 Qiang Hong Richard Wallace +3 位作者 Eric Dennis Brian Reed William Tansil Matt Smith 《Journal of Civil Engineering and Architecture》 2015年第9期1069-1078,共10页
Addressing transportation planning, operation and investment challenges requires increasingly sophisticated data and information management strategies. ITS (intelligent transportation systems) and CV (connected veh... Addressing transportation planning, operation and investment challenges requires increasingly sophisticated data and information management strategies. ITS (intelligent transportation systems) and CV (connected vehicle) technologies represent a new approach to capturing and using needed transportation data in real time or near real time. In the case of Michigan, several ITS programs have been launched successfully, but independently of each other. The objective of this research is to evaluate and assess all important factors that will influence the collection, management and use of ITS data, and recommend strategies to develop integrated, dynamic and adaptive data management systems for state transportation agencies. 展开更多
关键词 ITS connected vehicle technology transportation data management state transportation agency.
下载PDF
A Concurrent Security Monitoring Method for Virtualization Environments
10
作者 TIAN Donghai JIA Xiaoqi +1 位作者 CHEN Junhua HU Changzhen 《China Communications》 SCIE CSCD 2016年第1期113-123,共11页
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani... Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead. 展开更多
关键词 security virtualization technology concurrent monitoring
下载PDF
The Design and Application System of Educational Administration Management Based on Web2.0 Technologies
11
作者 Huaiyong Deng 《International Journal of Technology Management》 2013年第3期20-22,共3页
In the era of Web2.0, AJAX as one of the core technology to provide asynchronous communication with the server's ability to solve most of the Web site to force the user to enter the "submit, wait for redisplay proce... In the era of Web2.0, AJAX as one of the core technology to provide asynchronous communication with the server's ability to solve most of the Web site to force the user to enter the "submit, wait for redisplay process, so that user from requestfreed response cycle, ultimately allows developers and designers to use standard HTML / CSS / JavaScript to create a "desktop style Web applications. According AJAX principles and characteristics, and the combination of educational administration and educational management system based on AJAX technology solutions. 展开更多
关键词 educational management system Web 2.0 Asynchronous JavaScript and XML technology
下载PDF
Design and Realization of Control System for Warehouse based on MSCOMM Component
12
作者 Jiahong Zhong Yin Lei 《International Journal of Technology Management》 2013年第7期109-111,共3页
This paper describes control system network design and implementation of communication methods for automate warehouse management based on MFC, and the main features of VC6. 0 network communications programming and the... This paper describes control system network design and implementation of communication methods for automate warehouse management based on MFC, and the main features of VC6. 0 network communications programming and the method of implementation are discussed. Article described in detail the specific steps to achieve network communication for monitoring system, and gives the network communication process that combined with tile actual situation. Test results show that the system is stable and reliable. 展开更多
关键词 warehouse management system MSCOMM component vc6++
下载PDF
A Protective Mechanism for the Access Control System in the Virtual Domain 被引量:1
13
作者 Jinan Shen Deqing Zou +3 位作者 Hai Jin Kai Yang Bin Yuan Weiming Li 《China Communications》 SCIE CSCD 2016年第11期129-142,共14页
In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved ... In traditional framework,mandatory access control(MAC) system and malicious software are run in kernel mode. Malicious software can stop MAC systems to be started and make it do invalid. This problem cannot be solved under the traditional framework if the operating system(OS) is comprised since malwares are running in ring 0 level. In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems. We separate the access control system into three parts: policy management(PM),security server(SS) and policy enforcement(PE). Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks. We add an access vector cache(AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain. The policy enforcement module is retained in the guest OS for performance. The security of AVC and PE can be ensured by using a memory protection mechanism. The goal of protecting the OS kernel is to ensure the security of the execution path. We implementthe system by a modified Xen hypervisor. The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter. Our system offers a centralized security policy for virtual domains in virtual machine environments.Keywords: hypervisor; virtualization; memo- 展开更多
关键词 HYPERVISOR VIRTUALIZATION memory protection guest OS access control system
全文增补中
上一页 1 下一页 到第
使用帮助 返回顶部