In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provide...In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provides the integrated environment and more functions for many subsystems of ECAD and engine designers. So it improves the design efficiency.展开更多
In the context of a proliferation of DatabaseManagement Systems(DBMSs),we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain.This conceptual...In the context of a proliferation of DatabaseManagement Systems(DBMSs),we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain.This conceptualization aims to facilitate a proper execution of various software engineering processes and database-focused administration tasks.Also,it can be used to improve the decision-making process for determining/selecting the appropriate DBMS,subject to specific requirements.The proposed model describes the most important features and aspects regarding the DBMS domain,including the support for various paradigms(relational,graph-based,key-value,tree-like,etc.),query languages,platforms(servers),plus running environments(desktop,Web,cloud),specific contexts—i.e.,focusing on optimizing queries,redundancy,security,performance,schema vs.schema-less approaches,programming languages/paradigms,and others.The process of populating the ontology with significant individuals(actual DBMSs)benefits from the existing knowledge exposed by free and open machine-processable knowledge bases,by using structured data fromWikipedia and related sources.The pragmatic use of our ontology is demonstrated by two educational software solutions based on current practices in Web application development,proving support for learning and experimenting key features of the actual semantic Web technologies and tools.This approach is also an example of using multiple knowledge from database systems,semanticWeb technologies,and software engineering areas.展开更多
In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manus...In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity.展开更多
With the development of the digital city,data and data analysis have become more and more important.The database is the foundation of data analysis.In this paper,the software system of the urban land planning database...With the development of the digital city,data and data analysis have become more and more important.The database is the foundation of data analysis.In this paper,the software system of the urban land planning database of Shanghai in China is developed based on MySQL.The conceptual model of the urban land planning database is proposed,and the entities,attributes and connections of this model are discussed.Then the E-R conceptual model is transformed into a logical structure,which is supported by the relational databasemanagement system(DBMS).Based on the conceptual and logical structures,by using Spring Boot as the back-end framework and using MySQL and Java API as the development tools,a platformwith datamanagement,information sharing,map assistance and other functions is established.The functionalmodules in this platformare designed.The results of J Meter test show that the DBMS can add,store and retrieve information data stably,and it has the advantages of fast response and low error rate.The software system of the urban land planning database developed in this paper can improve the efficiency of storing and managing land data,eliminating redundant data and sharing data.展开更多
A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Que...A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.展开更多
This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student in...This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.展开更多
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma...Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments.展开更多
Modular technology can effectively support the rapid design of products, and it is one of the key technologies to realize mass customization design. With the application of product lifecycle management(PLM) system in ...Modular technology can effectively support the rapid design of products, and it is one of the key technologies to realize mass customization design. With the application of product lifecycle management(PLM) system in enterprises, the product lifecycle data have been effectively managed. However, these data have not been fully utilized in module division, especially for complex machinery products. To solve this problem, a product module mining method for the PLM database is proposed to improve the effect of module division. Firstly, product data are extracted from the PLM database by data extraction algorithm. Then, data normalization and structure logical inspection are used to preprocess the extracted defective data. The preprocessed product data are analyzed and expressed in a matrix for module mining. Finally, the fuzzy c-means clustering(FCM) algorithm is used to generate product modules, which are stored in product module library after module marking and post-processing. The feasibility and effectiveness of the proposed method are verified by a case study of high pressure valve.展开更多
Background:The conversion of adenosine(A)to inosine(I)through deamination is the prevailing form of RNA editing,impacting numerous nuclear and cytoplasmic transcripts across various eukaryotic species.Millions of high...Background:The conversion of adenosine(A)to inosine(I)through deamination is the prevailing form of RNA editing,impacting numerous nuclear and cytoplasmic transcripts across various eukaryotic species.Millions of high-confidence RNA editing sites have been identified and integrated into various RNA databases,providing a convenient platform for the rapid identification of key drivers of cancer and potential therapeutic targets.However,the available database for integration of RNA editing in hematopoietic cells and hematopoietic malignancies is still lacking.Methods:We downloaded RNA sequencing(RNA-seq)data of 29 leukemia patients and 19 healthy donors from National Center for Biotechnology Information(NCBI)Gene Expression Omnibus(GEO)database,and RNA-seq data of 12 mouse hematopoietic cell populations obtained from our previous research were also used.We performed sequence alignment,identified RNA editing sites,and obtained characteristic editing sites related to normal hematopoietic development and abnormal editing sites associated with hematologic diseases.Results:We established a new database,"REDH",represents RNA editome in hematopoietic differentiation and malignancy.REDH is a curated database of associations between RNA editome and hematopoiesis.REDH integrates 30,796 editing sites from 12 murine adult hematopoietic cell populations and systematically characterizes more than 400,000 edited events in malignant hematopoietic samples from 48 cohorts(human).Through the Differentiation,Disease,Enrichment,and knowledge modules,each A-to-I editing site is systematically integrated,including its distribution throughout the genome,its clinical information(human sample),and functional editing sites under physiological and pathological conditions.Furthermore,REDH compares the similarities and differences of editing sites between different hematologic malignancies and healthy control.Conclusions:REDH is accessible at http://www.redhdatabase.com/.This user-friendly database would aid in understanding the mechanisms of RNA editing in hematopoietic differentiation and malignancies.It provides a set of data related to the maintenance of hematopoietic homeostasis and identifying potential therapeutic targets in malignancies.展开更多
In the application development of database,sharing information a- mong different DBMSs is an important and meaningful technical subject. This paper analyzes the schema definition and physical organization of popu- lar...In the application development of database,sharing information a- mong different DBMSs is an important and meaningful technical subject. This paper analyzes the schema definition and physical organization of popu- lar relational DBMSs and suggests the use of an intermediary schema.This technology provides many advantages such as powerful extensibility and ease in the integration of data conversions among different DBMSs etc.This pa- per introduces the data conversion system under DOS and XENIX operating systems.展开更多
Objective :To design a software to do the complicated and multiple calculations automatically in routine internal radionuelide irradiation therapy to avoid mistakes and shorten patients waiting times. Methods:The so...Objective :To design a software to do the complicated and multiple calculations automatically in routine internal radionuelide irradiation therapy to avoid mistakes and shorten patients waiting times. Methods:The software is designed on the Microsoft Windows XP operating system. Visual Basic 5.0 and Microsoft Access 2000 are used respectively as the programming language and database system here. The data and DBGrid controls and VB data window guide of Visual Basic were used to control access to and Access database. Results : Not only can the radioactivity of any radionuelide be calculated, but also the administered total iodine dose of therapy for hyperthyroidism or thyroid cancer and the total administered 153Sm-EDTMP solutions for remedy of bone metastasis of malignant tumor can be ciphered out. Conclusion :The work becomes easier, faster, more correct and interesting when the software can make the complicated and multiple calculations automatically. Patients' information, diagnosis and treatment can be recorded for further study.展开更多
With the challenges brought by the expansion of network scale,as well as the diversity of the equipments and the complexity of network protocols,many self-configurable systems have been proposed combining formal speci...With the challenges brought by the expansion of network scale,as well as the diversity of the equipments and the complexity of network protocols,many self-configurable systems have been proposed combining formal specification and model finding techniques.In this paper,we pay more attention to formal specifications of network information,i.e.,exploring principles and algorithm to map network information(topology,devices and status,etc.) to Alloy specifications.We first model network information in relational form,which is easy to realize because of the structured feature of network information in nature.Then we map the relational data to Alloy specifications according to our novel data mapping principles and algorithm.Based on the transition of relational data,it is possible to automatically map network information to Alloy specifications.We evaluate our data mapping principles and algorithm by applying them to a practical application scenario.The results illustrate that we can find a model for the task within a tolerant time interval,which implies that our novel approach can convert relational data to Alloy specifications correctly and efficiently.展开更多
Database system is the infrastructure of the modern information system. The R&D in the database system and its technologies is one of the important research topics in the field. The database R&D in China took off la...Database system is the infrastructure of the modern information system. The R&D in the database system and its technologies is one of the important research topics in the field. The database R&D in China took off later but it moves along by giant steps. This report presents the achievements Renmin University of China (RUC) has made in the past 25 years and at the same time addresses some of the research projects we, RUC, are currently working on. The National Natural Science Foundation of China supports and initiates most of our research projects and these successfully conducted projects have produced fruitful results.展开更多
A regional groundwater management system has been elaborated, integrating Relational Database Management System (RDBMS) and various web services. It consists of web geospatial application so-called HydrlS ( Hydroge...A regional groundwater management system has been elaborated, integrating Relational Database Management System (RDBMS) and various web services. It consists of web geospatial application so-called HydrlS ( Hydrogeological Information System) based on Open Source components and technologies, leading to a feasible and low-cost solution. Therefore, HydrlS permits delivery of data from a number of heterogeneous sources to standards supported by the Open Geospatial Consortium (OGC). The protocols used for exchanging data are also derived from OGC standards, i.e., WMS (Web Mapping Service), WFS (Web Feature Service), and WCS (Web Coverage Service). Finally, a geoportal was developed, which consists of client-applications that communicate with different Web Services (WMS, WCS, and WFS) through HTTP-requests. A prototype for web-based GIS application was designed using the deegree Framework to provide systematic interfaces and functions. This system was developed to demonstrate the value of making hydrogeological data more widely accessible through client/server architecture. This experience and knowledge already gained in this project will be a source for technology transfer and policy decisions. Otherwise, this will enable user groups to improve the management of their groundwater resources and contribute to enhanced decision support capabilities.展开更多
In this paper the catalog management strategy of the successfully integrating andrunning DDBMS C-POREL is summarized. The new catalog management strategyand its implementation scheme are based on the analysis of the c...In this paper the catalog management strategy of the successfully integrating andrunning DDBMS C-POREL is summarized. The new catalog management strategyand its implementation scheme are based on the analysis of the catalog managementmethods of the pioneer DDBMS. The goal of the new strategy is to improve the systemefficiency. Analysis and practice show that this strategy is successful.展开更多
For storing and modeling three-dimensional(3D)topographic objects(e.g.buildings,roads,dykes,and the terrain),tetrahedralizations have been proposed as an alternative to boundary representations.While in theory they ha...For storing and modeling three-dimensional(3D)topographic objects(e.g.buildings,roads,dykes,and the terrain),tetrahedralizations have been proposed as an alternative to boundary representations.While in theory they have several advantages,current implementations are either not space efficient or do not store topological relationships(which makes spatial analysis and updating slow,or require the use of an expensive 3D spatial index).We discuss in this paper an alternative data structure for storing tetrahedralizations in a database management system(DBMS).It is based on the idea of storing only the vertices and stars of edges;triangles and tetrahedra are represented implicitly.It has been used previously in main memory,but not in a DBMS.We describe how to modify it to obtain an efficient implementation in a DBMS,and we describe how it can be used for modeling 3D topography.As we demonstrate with different real-world examples,the structure is compacter than known alternatives,it permits us to store attributes for any primitives,and has the added benefit of being topological,which permits us to query it efficiently.The structure can be easily implemented in most DBMS(we describe our implementation in PostgreSQL),and we present some of the engineering choices we made for the implementation.展开更多
Background:Developing and sustaining a data collection and management system(DCMS)is difficult in malariaendemic countries because of limitations in internet bandwidth,computer resources and numbers of trained personn...Background:Developing and sustaining a data collection and management system(DCMS)is difficult in malariaendemic countries because of limitations in internet bandwidth,computer resources and numbers of trained personnel.The premise of this paper is that development of a DCMS in West Africa was a critically important outcome of the West African International Centers of Excellence for Malaria Research.The purposes of this paper are to make that information available to other investigators and to encourage the linkage of DCMSs to international research and Ministry of Health data systems and repositories.Methods:We designed and implemented a DCMS to link study sites in Mali,Senegal and The Gambia.This system was based on case report forms for epidemiologic,entomologic,clinical and laboratory aspects of plasmodial infection and malarial disease for a longitudinal cohort study and included on-site training for Principal Investigators and Data Managers.Based on this experience,we propose guidelines for the design and sustainability of DCMSs in environments with limited resources and personnel.Results:From 2012 to 2017,we performed biannual thick smear surveys for plasmodial infection,mosquito collections for anopheline biting rates and sporozoite rates and year-round passive case detection for malarial disease in four longitudinal cohorts with 7708 individuals and 918 households in Senegal,The Gambia and Mali.Major challenges included the development of uniform definitions and reporting,assessment of data entry error rates,unstable and limited internet access and software and technology maintenance.Strengths included entomologic collections linked to longitudinal cohort studies,on-site data centres and a cloud-based data repository.Conclusions:At a time when research on diseases of poverty in low and middle-income countries is a global priority,the resources available to ensure accurate data collection and the electronic availability of those data remain severely limited.Based on our experience,we suggest the development of a regional DCMS.This approach is more economical than separate data centres and has the potential to improve data quality by encouraging shared case definitions,data validation strategies and analytic approaches including the molecular analysis of treatment successes and failures.展开更多
The way we interact with spatial data has been changed from 2D map to 3D Virtual Geographic Environment (VGE). Three-dimensional representations of geographic information on a computer are known as VGE, and in parti...The way we interact with spatial data has been changed from 2D map to 3D Virtual Geographic Environment (VGE). Three-dimensional representations of geographic information on a computer are known as VGE, and in particular 3D city models provide an efficient way to integrate massive, heterogenous geospatial information and georeferenced information in urban areas. 3D city modeling (3DCM) is an active research and practice topic in distinct application areas. This paper intro- duces different modeling paradigms employed in 3D GIS, virtual environment, and AEC/FM. Up-to-date 3DCM technologies are evolving into a data integration and collaborative approach to represent the full spatial coverage of a city, to model both aboveground and underground, outdoor and indoor environments including man-made objects and natural features with 3D geometry, appearance, topology and semantics.展开更多
To enhance training in software development,we argue that students of software engineering should be exposed to software development activities early in the curriculum.This entails meeting the challenge of engaging st...To enhance training in software development,we argue that students of software engineering should be exposed to software development activities early in the curriculum.This entails meeting the challenge of engaging students in software development before they take the software engineering course.In this paper,we propose a method to connect courses in the software engineering curriculum by setting comprehensive development projects to students in prerequisite courses for software development.Using the Discrete Mathematics(DM)course as an example,we describe the implementation of the proposed method and teaching practices using several practical and comprehensive projects derived from topics in discrete mathematics.Detailed descriptions of the sample projects,their application,and training results are given.Results and lessons learned from applying these practices show that it is a promising way to connect courses in the software engineering curriculum.展开更多
文摘In the Engine CAD application system engineering database management system (ECAD-EDBMS) is the kernel. ECAD-EDBMS can manage and process the multimedia such as graphics, data, text, sound, image and video. It provides the integrated environment and more functions for many subsystems of ECAD and engine designers. So it improves the design efficiency.
文摘In the context of a proliferation of DatabaseManagement Systems(DBMSs),we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain.This conceptualization aims to facilitate a proper execution of various software engineering processes and database-focused administration tasks.Also,it can be used to improve the decision-making process for determining/selecting the appropriate DBMS,subject to specific requirements.The proposed model describes the most important features and aspects regarding the DBMS domain,including the support for various paradigms(relational,graph-based,key-value,tree-like,etc.),query languages,platforms(servers),plus running environments(desktop,Web,cloud),specific contexts—i.e.,focusing on optimizing queries,redundancy,security,performance,schema vs.schema-less approaches,programming languages/paradigms,and others.The process of populating the ontology with significant individuals(actual DBMSs)benefits from the existing knowledge exposed by free and open machine-processable knowledge bases,by using structured data fromWikipedia and related sources.The pragmatic use of our ontology is demonstrated by two educational software solutions based on current practices in Web application development,proving support for learning and experimenting key features of the actual semantic Web technologies and tools.This approach is also an example of using multiple knowledge from database systems,semanticWeb technologies,and software engineering areas.
文摘In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity.
基金funded by Start-Up Funds for Scientific Research of Shenzhen University,Grant No.000002112313.
文摘With the development of the digital city,data and data analysis have become more and more important.The database is the foundation of data analysis.In this paper,the software system of the urban land planning database of Shanghai in China is developed based on MySQL.The conceptual model of the urban land planning database is proposed,and the entities,attributes and connections of this model are discussed.Then the E-R conceptual model is transformed into a logical structure,which is supported by the relational databasemanagement system(DBMS).Based on the conceptual and logical structures,by using Spring Boot as the back-end framework and using MySQL and Java API as the development tools,a platformwith datamanagement,information sharing,map assistance and other functions is established.The functionalmodules in this platformare designed.The results of J Meter test show that the DBMS can add,store and retrieve information data stably,and it has the advantages of fast response and low error rate.The software system of the urban land planning database developed in this paper can improve the efficiency of storing and managing land data,eliminating redundant data and sharing data.
文摘A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.
文摘This paper mainly design B/S system structure and small information management system that often appear some problems of college student information management, combines the actual situation of students and student instructor management work. In the process of the development of the whole system, the main use of Microsoft.NET technology as a whole system of compiler environment, SQL Server 2000 is used in the design of backstage supporter' s database, were developed and designed by Visual Studi02005 tool, in exchange for page dynamically selected by the ASP.NET database and system interface between Webpage generation. This system has high reliability, high security, low input, so that the efficiency of information management students to improve.
文摘Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments.
基金Project(51275362)supported by the National Natural Science Foundation of ChinaProject(2013M542055)supported by China Postdoctoral Science Foundation Funded
文摘Modular technology can effectively support the rapid design of products, and it is one of the key technologies to realize mass customization design. With the application of product lifecycle management(PLM) system in enterprises, the product lifecycle data have been effectively managed. However, these data have not been fully utilized in module division, especially for complex machinery products. To solve this problem, a product module mining method for the PLM database is proposed to improve the effect of module division. Firstly, product data are extracted from the PLM database by data extraction algorithm. Then, data normalization and structure logical inspection are used to preprocess the extracted defective data. The preprocessed product data are analyzed and expressed in a matrix for module mining. Finally, the fuzzy c-means clustering(FCM) algorithm is used to generate product modules, which are stored in product module library after module marking and post-processing. The feasibility and effectiveness of the proposed method are verified by a case study of high pressure valve.
基金supported by grants from the National Key Research and Development Program of China(Nos.2022YFA1106300,2019YFA0802603,2019YFA0801800,2019YFA0111700,and 2021YFA0805703)the National Natural Science Foundation of China(Nos.92268205,82122005,81970154,81970101,82270192)+1 种基金CAMS Innovation Fund for Medical Sciences(No.2021-I2M-1-019)Haihe Laboratory of Cell Ecosystem Innovation Fund(No.22HHXBSS00027)
文摘Background:The conversion of adenosine(A)to inosine(I)through deamination is the prevailing form of RNA editing,impacting numerous nuclear and cytoplasmic transcripts across various eukaryotic species.Millions of high-confidence RNA editing sites have been identified and integrated into various RNA databases,providing a convenient platform for the rapid identification of key drivers of cancer and potential therapeutic targets.However,the available database for integration of RNA editing in hematopoietic cells and hematopoietic malignancies is still lacking.Methods:We downloaded RNA sequencing(RNA-seq)data of 29 leukemia patients and 19 healthy donors from National Center for Biotechnology Information(NCBI)Gene Expression Omnibus(GEO)database,and RNA-seq data of 12 mouse hematopoietic cell populations obtained from our previous research were also used.We performed sequence alignment,identified RNA editing sites,and obtained characteristic editing sites related to normal hematopoietic development and abnormal editing sites associated with hematologic diseases.Results:We established a new database,"REDH",represents RNA editome in hematopoietic differentiation and malignancy.REDH is a curated database of associations between RNA editome and hematopoiesis.REDH integrates 30,796 editing sites from 12 murine adult hematopoietic cell populations and systematically characterizes more than 400,000 edited events in malignant hematopoietic samples from 48 cohorts(human).Through the Differentiation,Disease,Enrichment,and knowledge modules,each A-to-I editing site is systematically integrated,including its distribution throughout the genome,its clinical information(human sample),and functional editing sites under physiological and pathological conditions.Furthermore,REDH compares the similarities and differences of editing sites between different hematologic malignancies and healthy control.Conclusions:REDH is accessible at http://www.redhdatabase.com/.This user-friendly database would aid in understanding the mechanisms of RNA editing in hematopoietic differentiation and malignancies.It provides a set of data related to the maintenance of hematopoietic homeostasis and identifying potential therapeutic targets in malignancies.
文摘In the application development of database,sharing information a- mong different DBMSs is an important and meaningful technical subject. This paper analyzes the schema definition and physical organization of popu- lar relational DBMSs and suggests the use of an intermediary schema.This technology provides many advantages such as powerful extensibility and ease in the integration of data conversions among different DBMSs etc.This pa- per introduces the data conversion system under DOS and XENIX operating systems.
文摘Objective :To design a software to do the complicated and multiple calculations automatically in routine internal radionuelide irradiation therapy to avoid mistakes and shorten patients waiting times. Methods:The software is designed on the Microsoft Windows XP operating system. Visual Basic 5.0 and Microsoft Access 2000 are used respectively as the programming language and database system here. The data and DBGrid controls and VB data window guide of Visual Basic were used to control access to and Access database. Results : Not only can the radioactivity of any radionuelide be calculated, but also the administered total iodine dose of therapy for hyperthyroidism or thyroid cancer and the total administered 153Sm-EDTMP solutions for remedy of bone metastasis of malignant tumor can be ciphered out. Conclusion :The work becomes easier, faster, more correct and interesting when the software can make the complicated and multiple calculations automatically. Patients' information, diagnosis and treatment can be recorded for further study.
基金supported by the National Science Foundation for Distinguished Young Scholars of China under Grant No.61225012 and No.71325002the Specialized Research Fund of the Doctoral Program of Higher Education for the Priority Development Areas under Grant No.20120042130003the Liaoning BaiQianWan Talents Program under Grant No.2013921068
文摘With the challenges brought by the expansion of network scale,as well as the diversity of the equipments and the complexity of network protocols,many self-configurable systems have been proposed combining formal specification and model finding techniques.In this paper,we pay more attention to formal specifications of network information,i.e.,exploring principles and algorithm to map network information(topology,devices and status,etc.) to Alloy specifications.We first model network information in relational form,which is easy to realize because of the structured feature of network information in nature.Then we map the relational data to Alloy specifications according to our novel data mapping principles and algorithm.Based on the transition of relational data,it is possible to automatically map network information to Alloy specifications.We evaluate our data mapping principles and algorithm by applying them to a practical application scenario.The results illustrate that we can find a model for the task within a tolerant time interval,which implies that our novel approach can convert relational data to Alloy specifications correctly and efficiently.
基金Supported by the National Natural Science Foundation of China. Acknowledgements The National Science Foundation of China supported these works. Thanks to NSFC and all the members of the research groups in Renmin University of China.
文摘Database system is the infrastructure of the modern information system. The R&D in the database system and its technologies is one of the important research topics in the field. The database R&D in China took off later but it moves along by giant steps. This report presents the achievements Renmin University of China (RUC) has made in the past 25 years and at the same time addresses some of the research projects we, RUC, are currently working on. The National Natural Science Foundation of China supports and initiates most of our research projects and these successfully conducted projects have produced fruitful results.
文摘A regional groundwater management system has been elaborated, integrating Relational Database Management System (RDBMS) and various web services. It consists of web geospatial application so-called HydrlS ( Hydrogeological Information System) based on Open Source components and technologies, leading to a feasible and low-cost solution. Therefore, HydrlS permits delivery of data from a number of heterogeneous sources to standards supported by the Open Geospatial Consortium (OGC). The protocols used for exchanging data are also derived from OGC standards, i.e., WMS (Web Mapping Service), WFS (Web Feature Service), and WCS (Web Coverage Service). Finally, a geoportal was developed, which consists of client-applications that communicate with different Web Services (WMS, WCS, and WFS) through HTTP-requests. A prototype for web-based GIS application was designed using the deegree Framework to provide systematic interfaces and functions. This system was developed to demonstrate the value of making hydrogeological data more widely accessible through client/server architecture. This experience and knowledge already gained in this project will be a source for technology transfer and policy decisions. Otherwise, this will enable user groups to improve the management of their groundwater resources and contribute to enhanced decision support capabilities.
文摘In this paper the catalog management strategy of the successfully integrating andrunning DDBMS C-POREL is summarized. The new catalog management strategyand its implementation scheme are based on the analysis of the catalog managementmethods of the pioneer DDBMS. The goal of the new strategy is to improve the systemefficiency. Analysis and practice show that this strategy is successful.
基金This research is supported by the Dutch Technology Foundation STW,which is part of the Netherlands Organization for Scientific Research(NWO),and which is partly funded by the Ministry of Economic Affairs(project codes:11300 and 11185).
文摘For storing and modeling three-dimensional(3D)topographic objects(e.g.buildings,roads,dykes,and the terrain),tetrahedralizations have been proposed as an alternative to boundary representations.While in theory they have several advantages,current implementations are either not space efficient or do not store topological relationships(which makes spatial analysis and updating slow,or require the use of an expensive 3D spatial index).We discuss in this paper an alternative data structure for storing tetrahedralizations in a database management system(DBMS).It is based on the idea of storing only the vertices and stars of edges;triangles and tetrahedra are represented implicitly.It has been used previously in main memory,but not in a DBMS.We describe how to modify it to obtain an efficient implementation in a DBMS,and we describe how it can be used for modeling 3D topography.As we demonstrate with different real-world examples,the structure is compacter than known alternatives,it permits us to store attributes for any primitives,and has the added benefit of being topological,which permits us to query it efficiently.The structure can be easily implemented in most DBMS(we describe our implementation in PostgreSQL),and we present some of the engineering choices we made for the implementation.
基金These studies were supported by Cooperative Agreements from the National Institutes of Allergy and Infectious Diseases(NIAID)for the West African International Center of Excellence for Malaria Research(ICEMR):NIAID U19 AI 089696 and U19 AI 129387(from 2010 to 2017 and 2017 to 2024,respectively)Development of Case Report Forms,Standard Operating Procedures and other bilingual documentation in English and French was performed in collaboration with Aliou Sissako,Lansana Sangare,Ayouba Diarra and Ousmane Koita at the University of Bamako,Jules Gomis and Daouda Ndiaye at the University Cheikh Anta Diop in Dakar,Abdullahi Ahmad and Davis Nwakanma at the MRC in The Gambia,Clarissa Valim at the T.H.Chan Harvard School of Public Health,Mary Lukowski at Study TRAX and was supported by a Fulbright Scholar Award to DJK from 2009 to 2011.
文摘Background:Developing and sustaining a data collection and management system(DCMS)is difficult in malariaendemic countries because of limitations in internet bandwidth,computer resources and numbers of trained personnel.The premise of this paper is that development of a DCMS in West Africa was a critically important outcome of the West African International Centers of Excellence for Malaria Research.The purposes of this paper are to make that information available to other investigators and to encourage the linkage of DCMSs to international research and Ministry of Health data systems and repositories.Methods:We designed and implemented a DCMS to link study sites in Mali,Senegal and The Gambia.This system was based on case report forms for epidemiologic,entomologic,clinical and laboratory aspects of plasmodial infection and malarial disease for a longitudinal cohort study and included on-site training for Principal Investigators and Data Managers.Based on this experience,we propose guidelines for the design and sustainability of DCMSs in environments with limited resources and personnel.Results:From 2012 to 2017,we performed biannual thick smear surveys for plasmodial infection,mosquito collections for anopheline biting rates and sporozoite rates and year-round passive case detection for malarial disease in four longitudinal cohorts with 7708 individuals and 918 households in Senegal,The Gambia and Mali.Major challenges included the development of uniform definitions and reporting,assessment of data entry error rates,unstable and limited internet access and software and technology maintenance.Strengths included entomologic collections linked to longitudinal cohort studies,on-site data centres and a cloud-based data repository.Conclusions:At a time when research on diseases of poverty in low and middle-income countries is a global priority,the resources available to ensure accurate data collection and the electronic availability of those data remain severely limited.Based on our experience,we suggest the development of a regional DCMS.This approach is more economical than separate data centres and has the potential to improve data quality by encouraging shared case definitions,data validation strategies and analytic approaches including the molecular analysis of treatment successes and failures.
基金Supported by the National Natural Science Foundation of China ( No. 40871212, No. 40671158), the Leading Academic Discipline Project of Shang- hai Educational Committee(No.J50104).
文摘The way we interact with spatial data has been changed from 2D map to 3D Virtual Geographic Environment (VGE). Three-dimensional representations of geographic information on a computer are known as VGE, and in particular 3D city models provide an efficient way to integrate massive, heterogenous geospatial information and georeferenced information in urban areas. 3D city modeling (3DCM) is an active research and practice topic in distinct application areas. This paper intro- duces different modeling paradigms employed in 3D GIS, virtual environment, and AEC/FM. Up-to-date 3DCM technologies are evolving into a data integration and collaborative approach to represent the full spatial coverage of a city, to model both aboveground and underground, outdoor and indoor environments including man-made objects and natural features with 3D geometry, appearance, topology and semantics.
基金supported in part by the National Key R&D Program of China (No. 2018YFB1004202)
文摘To enhance training in software development,we argue that students of software engineering should be exposed to software development activities early in the curriculum.This entails meeting the challenge of engaging students in software development before they take the software engineering course.In this paper,we propose a method to connect courses in the software engineering curriculum by setting comprehensive development projects to students in prerequisite courses for software development.Using the Discrete Mathematics(DM)course as an example,we describe the implementation of the proposed method and teaching practices using several practical and comprehensive projects derived from topics in discrete mathematics.Detailed descriptions of the sample projects,their application,and training results are given.Results and lessons learned from applying these practices show that it is a promising way to connect courses in the software engineering curriculum.