首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
本文从数据库应用系统的实际需求出发,针对异构数据库的特点,描述了利用CORBA(CommonObjectRequestBrokerArchitecture,公共对象请求代理体系结构)技术进行异构数据库分布式调用的解决方案。  相似文献   

2.
管博 《中国科技信息》2006,(10):173-174
分布式空间数据集成是当前解决异构空间数据库的共享的主要手段;通过对分布式空间数据库集成的深入探讨和研究,结合国土资源系统的异构空间数据库的特点和现状,提出了相对简单的分布式空间数据库集成模式来实现系统内异构空间数据的整合,并在国土资源系统内得到了应用。  相似文献   

3.
分布式数据挖掘作为适用于异质异构数据的一种数据挖掘方式,它能有效处理数字图书馆分布式数据库的数据挖掘,解决好元数据集中管理与对象数据分散存取之间的矛盾。数字图书馆分布式数据系统在目前技术水平下,可根据PADMA系统理论,基于智能化的软件代理进行构建。  相似文献   

4.
吴隆基 《情报科学》2005,23(1):106-110
本文给出了用Oracle数据仓库解决方案来构建图书馆数据仓库的实现技术,解决了异构分布式图书馆数据库资源的共享问题,使异构分布式图书馆自动化信息系统进一步具备了当今世界上最先进的异构数据仓库特性。  相似文献   

5.
首先对已有的移动事务处理模型做了分析比较,然后提出了新的事务处理模型MOWAHS,并对其中的主要概念做了简要阐述。接着探讨了移动代理在解决移动数据库方面的应用以及基于代理进行事务恢复的思想。  相似文献   

6.
JAVA JDBC技术在图书情报系统的应用研究   总被引:3,自引:0,他引:3  
周西京  孙琪 《情报杂志》2003,22(12):37-38
讨论了分布式异构网上数字图书馆中数据库连接接口技术JDBC,分析了数字图书馆中数据库的特点及JD-BC对它的实用性。给出了用Java语言编程。用JDBC接口技术访问异构数据库的途经。  相似文献   

7.
随着数据库技术、分布式对象组件技术的迅速发展,在GIS中构建高性能的空间数据库引擎成了计算机软件中的研究热点。对基于异构数据库的空间数据库引擎(SDE)的关键技术进行了研究。  相似文献   

8.
对分布式存储的异构数据源来说,通过LDAP与各数据库的集成能够更好地提高系统的效率。从系统设计、系统模型、LDAP与异构数据库的集成3个方面,对异构分布式数据查询系统的设计进行了分析。  相似文献   

9.
移动计算技术的飞速发展,使得用户通过移动客户机随时随地访问分布式数据库上的信息成为可能。本文根据移动数据库的特点和目标,将智能Agent技术应用其中,提出一种动态配置的移动数据库系统(DCMDB)模型,提供一个可以动态接入各种异构的、自制的和分布式的移动数据库系统体系结构。  相似文献   

10.
云计算的特点是具有强大的计算能力和存储能力。入侵检测技术在网络安全技术中占有重要地位,但目前的入侵检测技术仍存在许多尚未解决的问题,如无法应对分布式大规模数据流攻击等。移动代理技术可给入侵检测系统带来更好的灵活性和可扩展性,结合移动代理的优势,构造了云环境下基于移动代理的入侵检测系统框架。采用NS2软件分别模拟一般网络条件与云环境下基于移动代理框架的DDoS节点攻击的两种场景,实验结果表明,云环境下基于移动代理框架的检测效果更佳。  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

13.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

14.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

15.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

16.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

17.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号