系统的
- 与 系统的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
And lucubrate the integration method of ES and GIS.
围绕建立智能型GIS应用系统的需要,对专家系统与地理信息系统的集成方法进行了深入地研究。
-
Then, the dynamic behaviors of Lur'e system have been analyzed through the simulation method, and the paper presents that the final dynamic behaviors of the system are sequentially changed according to the following states: the unstable dispersing state, chaotic state, steady cycle state and balanced state respectively with the filtering wave function from weak to strong and under the condition of meeting parameters.
以一维逻辑斯蒂方程为工具,论证了一类非线性Lur'e系统通过周期倍化达到混沌的机制,深入研究了该系统由混沌转化为有规律的周期性问题,并通过仿真分析了Lur'e系统的动力学行为,得出了这类系统在满足参数条件下,随着滤波作用的由弱到强,系统的最终动力学行为依次按着不稳定的发散状态、混沌状态、稳定的周期态、平衡态的顺序变化。
-
The absolute solution of Jiaojia ERP is put forward, the system models are established, and the solution are explained in detail. The business program of Jiaojia gold mine is reengineered based on the theory of "business centers", and the program-oriented compressed organization is framed. The index group and the solution of mine total quality management are setup. Then the optimize program of SCM and its components are designed on the guidance of "Horizontal Integration". The data of Jiaojia gold mine are reengineered based on the data warehouse technology. The information integration can be available after the establish of the business oriented databases, the subject integration oriented data marts, the application oriented data warehouses, the code databases and metadata, as weil as the OLAP system. The mathematics models and data mining modes are set up to function for the decision support of ERP system. The model of programming Master Production Schedule driven by geological resources and marked is figured out, so as to the models for material requirements planning and other decision supports are set up. The models provide service in forms of model storehouse, method storehouse, and algorithm tools center. The agent center is introduced to process the models' organizing, service, as well as self-study. The function system of Jiaojia gold mine ERP is figured out. By combining the development characteristics of Clients/Server and Browse/Server, the general framework and every sub systems are described in detail, including the function, structure, arrangement, modality, and so on.
主要内容如下:(1)深入论述了黄金矿山实施ERP的可行性,并结合应用需求将ERP理论在深度和广度上进行了拓延,建立了黄金矿山ERP系统的理论基础:以资源与市场共同驱动的供应链管理;黄金矿山的双重物流体系;以地质资源有效利用为目标的生产控制体系;黄金矿山财务管理的成本控制核心理论等;(2)提出焦家金矿ERP系统的整体解决方案,构建ERP系统模型,并进行了细节方案的设计:基于"作业过程核心"理论重新规划焦家金矿的业务流程,在此基础上设计面向流程的"扁平化"组织机构;建立了矿石全面质量管理的指标体系和实施方案;以"横向一体化"为指导思想,提出供应链管理各组成部分的全面优化方案;(3)以数据仓库技术为核心完成焦家金矿的数据规划,分别建立面向业务的数据库、面向主题集成的数据集市和面向主题应用的数据仓库,设计代码数据库和元数据库,定义OLAP方式,实现焦家金矿的全面信息集成;(4)针对ERP系统中的决策支持功能,建立了相应的数学模型和数据挖掘模型,提出了地质资源和市场共同驱动的主生产计划模型制定过程,进一步建立了物料需求计划的线性规划模型,以及其它决策支持模型;提出以模型库、方法库和算法工具为核心的模型服务方式,并设计了代理机制完成模型的组织、服务和自学习过程;(5)构建焦家金矿ERP系统的功能体系,针对C/S和B/S模式系统的开发特点,分别对功能体系架构以及各子系统的功能、结构、层次和形式进行详细设计。
-
Urban system is a classic complex system. Based on Maximum Flux Principle, new ontology, epistemology and methodology are proposed in this paper.
城市系统是一个典型的复杂系统,基于最大流原理本文提出了城市系统的新本体论、认识论和方法论。
-
The Snort is a typical Net Intrusion Detection System, and some of design principle and characteristics of which is the base of most popular mercantile Intrusion Detection System.
Snort系统是一个典型的网络入侵检测系统,其若干设计原理和实现特点,是目前多数商用入侵检测系统的研发基石。
-
The article is an instance for designing a database system, it introduces the development of a mercantile information system based on the operations of database.
本文讨论了一个数据库系统的设计实例,并利用对数据库的操作,开发一个商业信息系统,本系统使用Visual Basic6.0做前台应用程序,Microsoft Access2000做后台数据库,使用ADO技术来连接数据库。
-
Still the merit to the system can the module have done the introduction of system to this text, so that letting user can more easily understand and this system of use
本文还对系统的功能模块作了系统的介绍,以便让用户能够较轻松地了解并使用本系统
-
An integrity-protecting method based on Merkle hash tree is presented. This method can check the integrity of security rules stored in database. Its space cost and time cost is modest. A prototype of DIPS is implemented.
本文研究了数据库入侵防护系统的实现技术,测试了原型系统对数据库系统性能的影响以及原型系统在入侵防护方面的表现,并详细的分析和比较了测试结果。
-
The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.
在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。
-
The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.
在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。