In the process of promoting the national territorial spatial planning system in all provinces, cities and counties, the geospatial database of “One Map” has realized the information sharing and collaborative work of...In the process of promoting the national territorial spatial planning system in all provinces, cities and counties, the geospatial database of “One Map” has realized the information sharing and collaborative work of multiple departments. Based on this, this paper intended to provide a set of standardized mapping models for industrial heritage storage, and through the establishment of the database to protect and reuse the status quo of industrial heritage research. This paper took the third-line construction industrial heritage of Mianyang “Two-Bomb City” as the research object, developed the relevant drawing standards of third-line industrial heritage database, and studied the database construction process. GIS technology is used to establish a geospatial database of the third-line industrial heritage in cooperation with the “One Map” system, in order to provide reference for the storage of the third-line industrial heritage in various places, and to protect and reuse the third-line industrial heritage from the perspectives of spatial factors, planning coordination and dynamic assessment.展开更多
The explosive growth of the Internet and database applications has driven database to be more scalable and available, and able to support on line scaling without interrupting service. To support more client’s queries...The explosive growth of the Internet and database applications has driven database to be more scalable and available, and able to support on line scaling without interrupting service. To support more client’s queries without downtime and degrading the response time, more nodes have to be scaled up while the database is running. This paper presents the overview of scalable and available database that satisfies the above characteristics. And we propose a novel on line scaling method. Our method improves the existing on line scaling method for fast response time and higher throughputs. Our proposed method reduces unnecessary network use, i.e., we decrease the number of data copy by reusing the backup data. Also, our on line scaling operation can be processed parallel by selecting adequate nodes as new node. Our performance study shows that our method results in significant reduction in data copy time.展开更多
This paper presents a domain engineering approach to build a software product line that supports the change notification service in a Configuration Management Database (CMDB) according to the Information Technology In...This paper presents a domain engineering approach to build a software product line that supports the change notification service in a Configuration Management Database (CMDB) according to the Information Technology Infrastructure Library (ITIL) best practices. For the development of this product line, the proposed approach makes use of a construction of products methodology by analogy: this is a new notation which reports the variability of the products, obtaining metrics as important as the number of products and uses a language that enables, by means of the flexibilization of a product and the development of some generators, to build the rest of the product line. In addition the paper offers a standard for the analysis and design of the CMDB as well. Finally, the paper presents an economic model for the product line, where the profitability and productivity of the proposed solution are analyzed.展开更多
A number of problems are associated with the generation, management and security of PINs, a subset of password. The PINs may be recharge card used by GSM operators or for authentication in ATM. The problems associated...A number of problems are associated with the generation, management and security of PINs, a subset of password. The PINs may be recharge card used by GSM operators or for authentication in ATM. The problems associated with the use of these PINs range from scratching off any of the recharge PIN numbers in recharge card to loss of PIN number or entering invalid number in the case of authentication. It usually takes time for the customer service of the service provider or system administrator to provide convincing solution to these problems promptly when it occurred. PINs generation could seem like simply arranging ranges of number and feeding it into the telecommunication systems such as mobile handsets or ATM to grant access but it requires a specialized and secured way to generate, store and manage it in order to achieve prompt access. This paper focused on the development of database concept to provide solution to these problems by desiging a system by which the PINs generated can be effectively stored and managed so that userss can have immediate access to the PINs if they can provide the identification number on the card. Succintly, the paper discusses the design of a system that generates, manages and secures PINs application using Visual Basic Version 6.0 for designing the front and interface and Microsoft Access 2007 as the database. The system was implemented using real data and the result was successful.展开更多
This paper describes the develop method of an ice database and regional ice seventy maps using information from Storm Data, a national meteorological Center (NMC) Publication and ice observation station. This resource...This paper describes the develop method of an ice database and regional ice seventy maps using information from Storm Data, a national meteorological Center (NMC) Publication and ice observation station. This resource will provide convenient access to ice information for electric utility companies. Using this information, an engineer will be able to identify important characteristics of ice storms for a specific area, when evaluating or designing a power transmission line. Additionally, when developing local design ice load maps, the importance of correlating predicted icing events with historical ice storms makes this information even more valuable for utilities.展开更多
Surface quality has been one of the key factors influencing the ongoing improvement of the quality of steel. Therefore,it is urgent to provide methods for efficient supervision of surface defects. This paper first exp...Surface quality has been one of the key factors influencing the ongoing improvement of the quality of steel. Therefore,it is urgent to provide methods for efficient supervision of surface defects. This paper first expressed the main problems existing in defect management and then focused on constructing a data platform of surface defect management using a multidimensional database. Finally, some onqine applications of the platform at Baosteel were demonstrated. Results show that the constructed multidimensional database provides more structured defect data, and thus it is suitable for swift and multi-angle analysis of the defect data.展开更多
Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recent...Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recently, Liu et al. proposed an efficient and secure smart card based password authentication scheme. However, we find that Liu et al.’s scheme is vulnerable to the off-line password guessing attack and user impersonation attack. Furthermore, it also cannot provide user anonymity. In this paper, we cryptanalyze Liu et al.’s scheme and propose a security enhanced user authentication scheme to overcome the aforementioned problems. Especially, in order to preserve the user anonymity and prevent the guessing attack, we use the dynamic identity technique. The analysis shows that the proposed scheme is more secure and efficient than other related authentication schemes.展开更多
文摘In the process of promoting the national territorial spatial planning system in all provinces, cities and counties, the geospatial database of “One Map” has realized the information sharing and collaborative work of multiple departments. Based on this, this paper intended to provide a set of standardized mapping models for industrial heritage storage, and through the establishment of the database to protect and reuse the status quo of industrial heritage research. This paper took the third-line construction industrial heritage of Mianyang “Two-Bomb City” as the research object, developed the relevant drawing standards of third-line industrial heritage database, and studied the database construction process. GIS technology is used to establish a geospatial database of the third-line industrial heritage in cooperation with the “One Map” system, in order to provide reference for the storage of the third-line industrial heritage in various places, and to protect and reuse the third-line industrial heritage from the perspectives of spatial factors, planning coordination and dynamic assessment.
基金.This work is supported by University IT Research Center Project
文摘The explosive growth of the Internet and database applications has driven database to be more scalable and available, and able to support on line scaling without interrupting service. To support more client’s queries without downtime and degrading the response time, more nodes have to be scaled up while the database is running. This paper presents the overview of scalable and available database that satisfies the above characteristics. And we propose a novel on line scaling method. Our method improves the existing on line scaling method for fast response time and higher throughputs. Our proposed method reduces unnecessary network use, i.e., we decrease the number of data copy by reusing the backup data. Also, our on line scaling operation can be processed parallel by selecting adequate nodes as new node. Our performance study shows that our method results in significant reduction in data copy time.
文摘This paper presents a domain engineering approach to build a software product line that supports the change notification service in a Configuration Management Database (CMDB) according to the Information Technology Infrastructure Library (ITIL) best practices. For the development of this product line, the proposed approach makes use of a construction of products methodology by analogy: this is a new notation which reports the variability of the products, obtaining metrics as important as the number of products and uses a language that enables, by means of the flexibilization of a product and the development of some generators, to build the rest of the product line. In addition the paper offers a standard for the analysis and design of the CMDB as well. Finally, the paper presents an economic model for the product line, where the profitability and productivity of the proposed solution are analyzed.
文摘A number of problems are associated with the generation, management and security of PINs, a subset of password. The PINs may be recharge card used by GSM operators or for authentication in ATM. The problems associated with the use of these PINs range from scratching off any of the recharge PIN numbers in recharge card to loss of PIN number or entering invalid number in the case of authentication. It usually takes time for the customer service of the service provider or system administrator to provide convincing solution to these problems promptly when it occurred. PINs generation could seem like simply arranging ranges of number and feeding it into the telecommunication systems such as mobile handsets or ATM to grant access but it requires a specialized and secured way to generate, store and manage it in order to achieve prompt access. This paper focused on the development of database concept to provide solution to these problems by desiging a system by which the PINs generated can be effectively stored and managed so that userss can have immediate access to the PINs if they can provide the identification number on the card. Succintly, the paper discusses the design of a system that generates, manages and secures PINs application using Visual Basic Version 6.0 for designing the front and interface and Microsoft Access 2007 as the database. The system was implemented using real data and the result was successful.
文摘This paper describes the develop method of an ice database and regional ice seventy maps using information from Storm Data, a national meteorological Center (NMC) Publication and ice observation station. This resource will provide convenient access to ice information for electric utility companies. Using this information, an engineer will be able to identify important characteristics of ice storms for a specific area, when evaluating or designing a power transmission line. Additionally, when developing local design ice load maps, the importance of correlating predicted icing events with historical ice storms makes this information even more valuable for utilities.
文摘Surface quality has been one of the key factors influencing the ongoing improvement of the quality of steel. Therefore,it is urgent to provide methods for efficient supervision of surface defects. This paper first expressed the main problems existing in defect management and then focused on constructing a data platform of surface defect management using a multidimensional database. Finally, some onqine applications of the platform at Baosteel were demonstrated. Results show that the constructed multidimensional database provides more structured defect data, and thus it is suitable for swift and multi-angle analysis of the defect data.
基金supported by the Basic Science ResearchProgram through the National Research Foundation of Korea funded by the Ministry of Education under Grant No.NRF-2010-0020210
文摘Nowadays, the password-based remote user authentication mechanism using smart card is one of the simplest and convenient authentication ways to ensure secure communications over the public network environments. Recently, Liu et al. proposed an efficient and secure smart card based password authentication scheme. However, we find that Liu et al.’s scheme is vulnerable to the off-line password guessing attack and user impersonation attack. Furthermore, it also cannot provide user anonymity. In this paper, we cryptanalyze Liu et al.’s scheme and propose a security enhanced user authentication scheme to overcome the aforementioned problems. Especially, in order to preserve the user anonymity and prevent the guessing attack, we use the dynamic identity technique. The analysis shows that the proposed scheme is more secure and efficient than other related authentication schemes.