期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
An OWL-Based Specification of Database Management Systems
1
作者 Sabin C.Buraga Daniel Amariei Octavian Dospinescu 《Computers, Materials & Continua》 SCIE EI 2022年第3期5537-5550,共14页
In the context of a proliferation of DatabaseManagement Systems(DBMSs),we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain.This conceptual... In the context of a proliferation of DatabaseManagement Systems(DBMSs),we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain.This conceptualization aims to facilitate a proper execution of various software engineering processes and database-focused administration tasks.Also,it can be used to improve the decision-making process for determining/selecting the appropriate DBMS,subject to specific requirements.The proposed model describes the most important features and aspects regarding the DBMS domain,including the support for various paradigms(relational,graph-based,key-value,tree-like,etc.),query languages,platforms(servers),plus running environments(desktop,Web,cloud),specific contexts—i.e.,focusing on optimizing queries,redundancy,security,performance,schema vs.schema-less approaches,programming languages/paradigms,and others.The process of populating the ontology with significant individuals(actual DBMSs)benefits from the existing knowledge exposed by free and open machine-processable knowledge bases,by using structured data fromWikipedia and related sources.The pragmatic use of our ontology is demonstrated by two educational software solutions based on current practices in Web application development,proving support for learning and experimenting key features of the actual semantic Web technologies and tools.This approach is also an example of using multiple knowledge from database systems,semanticWeb technologies,and software engineering areas. 展开更多
关键词 database management systems knowledge model web engineering
下载PDF
A MySQL-Based Software System of Urban Land Planning Database of Shanghai in China
2
作者 Pei Yin Jing Cheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第6期2387-2405,共19页
With the development of the digital city,data and data analysis have become more and more important.The database is the foundation of data analysis.In this paper,the software system of the urban land planning database... With the development of the digital city,data and data analysis have become more and more important.The database is the foundation of data analysis.In this paper,the software system of the urban land planning database of Shanghai in China is developed based on MySQL.The conceptual model of the urban land planning database is proposed,and the entities,attributes and connections of this model are discussed.Then the E-R conceptual model is transformed into a logical structure,which is supported by the relational databasemanagement system(DBMS).Based on the conceptual and logical structures,by using Spring Boot as the back-end framework and using MySQL and Java API as the development tools,a platformwith datamanagement,information sharing,map assistance and other functions is established.The functionalmodules in this platformare designed.The results of J Meter test show that the DBMS can add,store and retrieve information data stably,and it has the advantages of fast response and low error rate.The software system of the urban land planning database developed in this paper can improve the efficiency of storing and managing land data,eliminating redundant data and sharing data. 展开更多
关键词 SOFTWARE database database management system urban land planning MYSQL
下载PDF
A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics
3
作者 Youseef Alotaibi 《Computers, Materials & Continua》 SCIE EI 2021年第2期1879-1895,共17页
A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Que... A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates. 展开更多
关键词 Adaptive search memory clustering database management system(DBMS) intrusion detection system(IDS) quiplets structured query language(SQL) tube search
下载PDF
Security Research on Engineering Database System
4
作者 REN Jian-ping 1,2, SONG Han-tao 2, LIANG Yun-rong 2 (1. North China Institute of Technology, Taiyuan 030051, China 2. Beijing Institute of Technology, Beijing 100081, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期288-289,共2页
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma... Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments. 展开更多
关键词 engineering database management system (EDBMS) s ecurity agent security level
下载PDF
A star-based data structure to store efficiently 3D topography in a database
5
作者 Hugo LEDOUX Martijn MEIJERS 《Geo-Spatial Information Science》 SCIE EI 2013年第4期256-266,共11页
For storing and modeling three-dimensional(3D)topographic objects(e.g.buildings,roads,dykes,and the terrain),tetrahedralizations have been proposed as an alternative to boundary representations.While in theory they ha... For storing and modeling three-dimensional(3D)topographic objects(e.g.buildings,roads,dykes,and the terrain),tetrahedralizations have been proposed as an alternative to boundary representations.While in theory they have several advantages,current implementations are either not space efficient or do not store topological relationships(which makes spatial analysis and updating slow,or require the use of an expensive 3D spatial index).We discuss in this paper an alternative data structure for storing tetrahedralizations in a database management system(DBMS).It is based on the idea of storing only the vertices and stars of edges;triangles and tetrahedra are represented implicitly.It has been used previously in main memory,but not in a DBMS.We describe how to modify it to obtain an efficient implementation in a DBMS,and we describe how it can be used for modeling 3D topography.As we demonstrate with different real-world examples,the structure is compacter than known alternatives,it permits us to store attributes for any primitives,and has the added benefit of being topological,which permits us to query it efficiently.The structure can be easily implemented in most DBMS(we describe our implementation in PostgreSQL),and we present some of the engineering choices we made for the implementation. 展开更多
关键词 3D GIS tetrahedralization database management system(DBMS) data structures
原文传递
Development of a data collection and management system in West Africa:challenges and sustainability 被引量:1
6
作者 Jeffrey G.Shaffer Seydou O.Doumbia +12 位作者 Daouda Ndiaye Ayouba Diarra Jules F.Gomis Davis Nwakanma Ismaela Abubakar Abdullahi Ahmad Muna Affara Mary Lukowski Clarissa Valim James C.Welty Frances J.Mather Joseph Keating Donald J.Krogstad 《Infectious Diseases of Poverty》 SCIE 2018年第1期1300-1313,共14页
Background:Developing and sustaining a data collection and management system(DCMS)is difficult in malariaendemic countries because of limitations in internet bandwidth,computer resources and numbers of trained personn... Background:Developing and sustaining a data collection and management system(DCMS)is difficult in malariaendemic countries because of limitations in internet bandwidth,computer resources and numbers of trained personnel.The premise of this paper is that development of a DCMS in West Africa was a critically important outcome of the West African International Centers of Excellence for Malaria Research.The purposes of this paper are to make that information available to other investigators and to encourage the linkage of DCMSs to international research and Ministry of Health data systems and repositories.Methods:We designed and implemented a DCMS to link study sites in Mali,Senegal and The Gambia.This system was based on case report forms for epidemiologic,entomologic,clinical and laboratory aspects of plasmodial infection and malarial disease for a longitudinal cohort study and included on-site training for Principal Investigators and Data Managers.Based on this experience,we propose guidelines for the design and sustainability of DCMSs in environments with limited resources and personnel.Results:From 2012 to 2017,we performed biannual thick smear surveys for plasmodial infection,mosquito collections for anopheline biting rates and sporozoite rates and year-round passive case detection for malarial disease in four longitudinal cohorts with 7708 individuals and 918 households in Senegal,The Gambia and Mali.Major challenges included the development of uniform definitions and reporting,assessment of data entry error rates,unstable and limited internet access and software and technology maintenance.Strengths included entomologic collections linked to longitudinal cohort studies,on-site data centres and a cloud-based data repository.Conclusions:At a time when research on diseases of poverty in low and middle-income countries is a global priority,the resources available to ensure accurate data collection and the electronic availability of those data remain severely limited.Based on our experience,we suggest the development of a regional DCMS.This approach is more economical than separate data centres and has the potential to improve data quality by encouraging shared case definitions,data validation strategies and analytic approaches including the molecular analysis of treatment successes and failures. 展开更多
关键词 Data collection Data(database)management system Diseases of poverty MALARIA Plasmodium falciparum
原文传递
REDH:A database of RNA editome in hematopoietic differentiation and malignancy
7
作者 Jiayue Xu Jiahuan He +11 位作者 Jiabin Yang Fengjiao Wang Yue Huo Yuehong Guo Yanmin Si Yufeng Gao Fang Wang Hui Cheng Tao Cheng Jia Yu Xiaoshuang Wang Yanni Ma 《Chinese Medical Journal》 SCIE CAS 2024年第3期283-293,共11页
Background:The conversion of adenosine(A)to inosine(I)through deamination is the prevailing form of RNA editing,impacting numerous nuclear and cytoplasmic transcripts across various eukaryotic species.Millions of high... Background:The conversion of adenosine(A)to inosine(I)through deamination is the prevailing form of RNA editing,impacting numerous nuclear and cytoplasmic transcripts across various eukaryotic species.Millions of high-confidence RNA editing sites have been identified and integrated into various RNA databases,providing a convenient platform for the rapid identification of key drivers of cancer and potential therapeutic targets.However,the available database for integration of RNA editing in hematopoietic cells and hematopoietic malignancies is still lacking.Methods:We downloaded RNA sequencing(RNA-seq)data of 29 leukemia patients and 19 healthy donors from National Center for Biotechnology Information(NCBI)Gene Expression Omnibus(GEO)database,and RNA-seq data of 12 mouse hematopoietic cell populations obtained from our previous research were also used.We performed sequence alignment,identified RNA editing sites,and obtained characteristic editing sites related to normal hematopoietic development and abnormal editing sites associated with hematologic diseases.Results:We established a new database,"REDH",represents RNA editome in hematopoietic differentiation and malignancy.REDH is a curated database of associations between RNA editome and hematopoiesis.REDH integrates 30,796 editing sites from 12 murine adult hematopoietic cell populations and systematically characterizes more than 400,000 edited events in malignant hematopoietic samples from 48 cohorts(human).Through the Differentiation,Disease,Enrichment,and knowledge modules,each A-to-I editing site is systematically integrated,including its distribution throughout the genome,its clinical information(human sample),and functional editing sites under physiological and pathological conditions.Furthermore,REDH compares the similarities and differences of editing sites between different hematologic malignancies and healthy control.Conclusions:REDH is accessible at http://www.redhdatabase.com/.This user-friendly database would aid in understanding the mechanisms of RNA editing in hematopoietic differentiation and malignancies.It provides a set of data related to the maintenance of hematopoietic homeostasis and identifying potential therapeutic targets in malignancies. 展开更多
关键词 RNA editing Hematopoietic differentiation Hematopoietic malignancy database management systems
原文传递
Towards Connecting Discrete Mathematics and Software Engineering 被引量:1
8
作者 Tun Li Wanwei Liu +2 位作者 Juan Chen Xiaoguang Mao Xinjun Mao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第3期325-335,共11页
To enhance training in software development,we argue that students of software engineering should be exposed to software development activities early in the curriculum.This entails meeting the challenge of engaging st... To enhance training in software development,we argue that students of software engineering should be exposed to software development activities early in the curriculum.This entails meeting the challenge of engaging students in software development before they take the software engineering course.In this paper,we propose a method to connect courses in the software engineering curriculum by setting comprehensive development projects to students in prerequisite courses for software development.Using the Discrete Mathematics(DM)course as an example,we describe the implementation of the proposed method and teaching practices using several practical and comprehensive projects derived from topics in discrete mathematics.Detailed descriptions of the sample projects,their application,and training results are given.Results and lessons learned from applying these practices show that it is a promising way to connect courses in the software engineering curriculum. 展开更多
关键词 Discrete Mathematics(DM) software engineering proof checker database management system symbolic execution engine
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部