This paper presents a case study on structure design and establishment of database application system for alien species in Shan-dong Province, integrating with Geographic Information System, computer network, and data...This paper presents a case study on structure design and establishment of database application system for alien species in Shan-dong Province, integrating with Geographic Information System, computer network, and database technology to the research of alien species. The modules of alien species database, including classified data input, statistics and analysis, species pictures and distribution maps, and out date input, were approached by Visual Studio.net 2003 and Microsoft SQL server 2000. The alien species information contains the information of classification, species distinction characteristics, biological characteristics, original area, distribution area, the entering fashion and route, invasion time, invasion reason, interaction with the endemic species, growth state, danger state and spatial information, i.e. distribution map. Based on the above bases, several models including application, checking, modifying, printing, adding and returning mod- els were developed. Furthermore, through the establishment of index tables and index maps, we can also spatially query the data like picture, text and GIS map data. This research established the technological platform of sharing information about scientific resource of alien species in Shandong Province, offering the basis for the dynamic inquiry of alien species, the warning technology of prevention and the fast reaction system. The database application system possessed the principles of good practicability, friendly user interface and convenient usage. It can supply full and accurate information inquiry services of alien species for the users and provide functions of dynamically managing the database for the administrator.展开更多
Evolving From principal-subordinate structure of C /S to flexible multileveled distributed structure, i.e. B/S architecture so as to form a wide, distributed and orderly Internet/Intranet integrated management inf orm...Evolving From principal-subordinate structure of C /S to flexible multileveled distributed structure, i.e. B/S architecture so as to form a wide, distributed and orderly Internet/Intranet integrated management inf ormation system, is the trend of development of application software of the whol e world. Advantages and disadvantages of the two modes: C/S and B/S are compared . It is pointed out that at present onefold B/S mode cannot yet fully fullfil th e demands of some complicated data processing, information statistics and analys is, etc, therefore it still awaits further development of technology to achieve 100% Internet. In this paper, a mode of B/S-C/S-blended multileveled architect ure is discussed; the logical levels of B/S mode is studied; Furthermore, combin ing some up-to-date software developing technology, combinatorial design of di fferent database application technology based on B/S is discussed. The expatiati on is made with following points: (1) Organic combination of the network distrib uted object technology of CORBA and the computation technology among different n etwork operating system ─ Java; (2) Organic combination of two modes of ASP and Plug_in; (3) JDBC Server and JDBC Client; (4) An expanded B/S model, i.e. the c lient application of browser communicates directly with Web server, and the serv er application communicates directly with database server through middle ware.展开更多
Database applications are becoming increasingly popular, mainly due to the advanced data management facilities that the underlying database management system offers compared against traditional legacy software applica...Database applications are becoming increasingly popular, mainly due to the advanced data management facilities that the underlying database management system offers compared against traditional legacy software applications. The interaction, however, of such applications with the database system introduces a number of issues, among which, this paper addresses the impact analysis of the changes performed at the database schema level. Our motivation is to provide the software engineers of database applications with automated methods that facilitate major maintenance tasks, such as source code corrections and regression testing, which should be triggered by the occurrence of such changes. The presented impact analysis is thus two-folded: the impact is analysed in terms of both the affected source code statements and the affected test suites concerning the testing of these applications. To achieve the former objective, a program slicing technique is employed, which is based on an extended version of the program dependency graph. The latter objective requires the analysis of test suites generated for database applications, which is accomplished by employing testing techniques tailored for this type of applications. Utilising both the slicing and the testing techniques enhances program comprehension of database applications, while also supporting the development of a number of practical metrics regarding their maintainability against schema changes. To evaluate the feasibility and effectiveness of the presented techniques and metrics, a software tool, called DATA, has been implemented. The experimental results from its usage on the TPC-C case study are reported and analysed.展开更多
This paper discusses a pattern design system in textile industry,the establishment of an imagedatabase which is used to store various kinds of source materials for designers’ reference in order tospeed up design proc...This paper discusses a pattern design system in textile industry,the establishment of an imagedatabase which is used to store various kinds of source materials for designers’ reference in order tospeed up design process.Pattern design image database (PDIDB) runs on the double-machine hardware system com-posed of ALTOS-986 and IBM PC/XT microcomputer.The former (host) manages imagedatabase,and the latter works both as a terminal to operate PDIDB and as an image processingstation to input,output,edit and display image data.PDIDB has two mainparts,the image storage management system and the image attributemanagement system and provides some functions,such as retrieval,deleting and updating.展开更多
Almost all the cellular processes in a living system are controlled by proteins:They regulate gene expression,catalyze chemical reactions,transport small molecules across membranes,and transmit signal across membranes...Almost all the cellular processes in a living system are controlled by proteins:They regulate gene expression,catalyze chemical reactions,transport small molecules across membranes,and transmit signal across membranes.Even,a viral infection is often initiated through virus-host protein interactions.Protein-protein interactions(PPIs)are the physical contacts between two or more proteins and they represent complex biological functions.Nowadays,PPIs have been used to construct PPI networks to study complex pathways for revealing the functions of unknown proteins.Scientists have used PPIs to find the molecular basis of certain diseases and also some potential drug targets.In this review,we will discuss how PPI networks are essential to understand the molecular basis of virus-host relationships and several databases which are dedicated to virus-host interaction studies.Here,we present a short but comprehensive review on PPIs,including the experimental and computational methods of finding PPIs,the databases dedicated to virus-host PPIs,and the associated various applications in protein interaction networks of some lethal viruses with their hosts.展开更多
Wireless technology is a new emerging delivery networks and development scheme of wireless internet is given widely attention currently. In order to make international visitors to surge education website at any time, ...Wireless technology is a new emerging delivery networks and development scheme of wireless internet is given widely attention currently. In order to make international visitors to surge education website at any time, anywhere by mobile handsets. The communication method of web database, such as CGI, ISAPI, JDBC and so on have been aralyzed and a new Active Server Page &Wireless Makeup Language (ASP-WML) based approach is presented. The dynamical refreshment of the homepage of wireless website and the automatic query of main information have been realized. At last, the wireless website of Dong Hua University is taken as an example to testify the possibility of wireless website design which is mentioned above.展开更多
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm...Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.展开更多
Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identifi...Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing with the basic steps of forensic analysis the paper elaborates the extraction of suspicious locations in oracle. As a forensic examiner, collecting digital evidence in a database is a key factor. Planned and a modelled way of examination will lead to a valid detection. Based on the literature survey conducted on different aspects of collecting digital evidence for database tamper detection, the paper proposes a block diagram which may guide a database forensic examiner to obtain the evidences.展开更多
常规的医院Oracle数据库容灾备份方法数据恢复时间过长,因此设计一种全新的医院Oracle数据库容灾备份方法。先以成本和时间有效的容灾系统模型体系(Cost and Time Effective Disaster Recovery System,ETDRS)为基础,结合遗传算法选取了...常规的医院Oracle数据库容灾备份方法数据恢复时间过长,因此设计一种全新的医院Oracle数据库容灾备份方法。先以成本和时间有效的容灾系统模型体系(Cost and Time Effective Disaster Recovery System,ETDRS)为基础,结合遗传算法选取了有效的Oracle容灾备份编码例子,再根据智能合约构建了有效的数据库容灾备份平台,从而实现了Oracle数据库容灾备份。实验结果表明,设计方法在不同数量数据块下的数据恢复时间均较短,备份效果较好,有一定的应用价值。展开更多
目的探讨Oracle数据库系统跨版本跨平台升级实现的可行性方案。方法从制订方案、方案实施、数据验证方面,详细介绍了Oracle数据库升级的具体实施方法与技术要点。结果实现Oracle数据库从10g for Windows到19c RAC for Linux的跨多版本...目的探讨Oracle数据库系统跨版本跨平台升级实现的可行性方案。方法从制订方案、方案实施、数据验证方面,详细介绍了Oracle数据库升级的具体实施方法与技术要点。结果实现Oracle数据库从10g for Windows到19c RAC for Linux的跨多版本系统升级,系统稳定运行。结论采用数据泵(expdp/im‐pdp)工具,通过建立中间库的方式升级,安全可靠,可操作性强,对相同功能需求具有参考借鉴价值。展开更多
基金this study was supported by the Key Project of Natu-ral Science Foundation of Shandong Province(No. Z2003D05)Key Project of Environmental Protection Science of Shandong Province(No. 2004057)Outstanding Young Scientists Grants of Shandong Province(No.2005BS08010),China
文摘This paper presents a case study on structure design and establishment of database application system for alien species in Shan-dong Province, integrating with Geographic Information System, computer network, and database technology to the research of alien species. The modules of alien species database, including classified data input, statistics and analysis, species pictures and distribution maps, and out date input, were approached by Visual Studio.net 2003 and Microsoft SQL server 2000. The alien species information contains the information of classification, species distinction characteristics, biological characteristics, original area, distribution area, the entering fashion and route, invasion time, invasion reason, interaction with the endemic species, growth state, danger state and spatial information, i.e. distribution map. Based on the above bases, several models including application, checking, modifying, printing, adding and returning mod- els were developed. Furthermore, through the establishment of index tables and index maps, we can also spatially query the data like picture, text and GIS map data. This research established the technological platform of sharing information about scientific resource of alien species in Shandong Province, offering the basis for the dynamic inquiry of alien species, the warning technology of prevention and the fast reaction system. The database application system possessed the principles of good practicability, friendly user interface and convenient usage. It can supply full and accurate information inquiry services of alien species for the users and provide functions of dynamically managing the database for the administrator.
文摘Evolving From principal-subordinate structure of C /S to flexible multileveled distributed structure, i.e. B/S architecture so as to form a wide, distributed and orderly Internet/Intranet integrated management inf ormation system, is the trend of development of application software of the whol e world. Advantages and disadvantages of the two modes: C/S and B/S are compared . It is pointed out that at present onefold B/S mode cannot yet fully fullfil th e demands of some complicated data processing, information statistics and analys is, etc, therefore it still awaits further development of technology to achieve 100% Internet. In this paper, a mode of B/S-C/S-blended multileveled architect ure is discussed; the logical levels of B/S mode is studied; Furthermore, combin ing some up-to-date software developing technology, combinatorial design of di fferent database application technology based on B/S is discussed. The expatiati on is made with following points: (1) Organic combination of the network distrib uted object technology of CORBA and the computation technology among different n etwork operating system ─ Java; (2) Organic combination of two modes of ASP and Plug_in; (3) JDBC Server and JDBC Client; (4) An expanded B/S model, i.e. the c lient application of browser communicates directly with Web server, and the serv er application communicates directly with database server through middle ware.
文摘Database applications are becoming increasingly popular, mainly due to the advanced data management facilities that the underlying database management system offers compared against traditional legacy software applications. The interaction, however, of such applications with the database system introduces a number of issues, among which, this paper addresses the impact analysis of the changes performed at the database schema level. Our motivation is to provide the software engineers of database applications with automated methods that facilitate major maintenance tasks, such as source code corrections and regression testing, which should be triggered by the occurrence of such changes. The presented impact analysis is thus two-folded: the impact is analysed in terms of both the affected source code statements and the affected test suites concerning the testing of these applications. To achieve the former objective, a program slicing technique is employed, which is based on an extended version of the program dependency graph. The latter objective requires the analysis of test suites generated for database applications, which is accomplished by employing testing techniques tailored for this type of applications. Utilising both the slicing and the testing techniques enhances program comprehension of database applications, while also supporting the development of a number of practical metrics regarding their maintainability against schema changes. To evaluate the feasibility and effectiveness of the presented techniques and metrics, a software tool, called DATA, has been implemented. The experimental results from its usage on the TPC-C case study are reported and analysed.
文摘This paper discusses a pattern design system in textile industry,the establishment of an imagedatabase which is used to store various kinds of source materials for designers’ reference in order tospeed up design process.Pattern design image database (PDIDB) runs on the double-machine hardware system com-posed of ALTOS-986 and IBM PC/XT microcomputer.The former (host) manages imagedatabase,and the latter works both as a terminal to operate PDIDB and as an image processingstation to input,output,edit and display image data.PDIDB has two mainparts,the image storage management system and the image attributemanagement system and provides some functions,such as retrieval,deleting and updating.
基金National Natural Science Foundation of China,No.31971180 and No.11474013.
文摘Almost all the cellular processes in a living system are controlled by proteins:They regulate gene expression,catalyze chemical reactions,transport small molecules across membranes,and transmit signal across membranes.Even,a viral infection is often initiated through virus-host protein interactions.Protein-protein interactions(PPIs)are the physical contacts between two or more proteins and they represent complex biological functions.Nowadays,PPIs have been used to construct PPI networks to study complex pathways for revealing the functions of unknown proteins.Scientists have used PPIs to find the molecular basis of certain diseases and also some potential drug targets.In this review,we will discuss how PPI networks are essential to understand the molecular basis of virus-host relationships and several databases which are dedicated to virus-host interaction studies.Here,we present a short but comprehensive review on PPIs,including the experimental and computational methods of finding PPIs,the databases dedicated to virus-host PPIs,and the associated various applications in protein interaction networks of some lethal viruses with their hosts.
文摘Wireless technology is a new emerging delivery networks and development scheme of wireless internet is given widely attention currently. In order to make international visitors to surge education website at any time, anywhere by mobile handsets. The communication method of web database, such as CGI, ISAPI, JDBC and so on have been aralyzed and a new Active Server Page &Wireless Makeup Language (ASP-WML) based approach is presented. The dynamical refreshment of the homepage of wireless website and the automatic query of main information have been realized. At last, the wireless website of Dong Hua University is taken as an example to testify the possibility of wireless website design which is mentioned above.
文摘Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.
文摘Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing with the basic steps of forensic analysis the paper elaborates the extraction of suspicious locations in oracle. As a forensic examiner, collecting digital evidence in a database is a key factor. Planned and a modelled way of examination will lead to a valid detection. Based on the literature survey conducted on different aspects of collecting digital evidence for database tamper detection, the paper proposes a block diagram which may guide a database forensic examiner to obtain the evidences.
文摘常规的医院Oracle数据库容灾备份方法数据恢复时间过长,因此设计一种全新的医院Oracle数据库容灾备份方法。先以成本和时间有效的容灾系统模型体系(Cost and Time Effective Disaster Recovery System,ETDRS)为基础,结合遗传算法选取了有效的Oracle容灾备份编码例子,再根据智能合约构建了有效的数据库容灾备份平台,从而实现了Oracle数据库容灾备份。实验结果表明,设计方法在不同数量数据块下的数据恢复时间均较短,备份效果较好,有一定的应用价值。
文摘目的探讨Oracle数据库系统跨版本跨平台升级实现的可行性方案。方法从制订方案、方案实施、数据验证方面,详细介绍了Oracle数据库升级的具体实施方法与技术要点。结果实现Oracle数据库从10g for Windows到19c RAC for Linux的跨多版本系统升级,系统稳定运行。结论采用数据泵(expdp/im‐pdp)工具,通过建立中间库的方式升级,安全可靠,可操作性强,对相同功能需求具有参考借鉴价值。