957 resultados para XML HTML CSS JavaScript jQuery Cordova Android eLearning mLearning IncidentalLearning eLocal Gamification Geolocalizzazione


Relevância:

20.00% 20.00%

Publicador:

Resumo:

1.引言面对数字经济时代带来的不断增长的竞争压力,企业逐步寻求新的商业运作模式以适应这种变化。随着信息技术和Internet技术的迅猛发展,为适应这种变化提供了条件。企业不再满足于孤立、零散的办公自动化和计算机应用,而是需要综合的、集成化的解决方案。作为一种对常规性事务进行管理、集成的技术,工作流管理系统(Workflow ManagementSystem,WMS)的出现是必然的。如何建立企业业务过程模型是工作流管理系统的核心问题。

Relevância:

20.00% 20.00%

Publicador:

Resumo:

随着企业可获取的信息的大量增长,信息的种类和结构也越来越丰富。从传统的关系数据库,到XML文档以及分布于Web上的大量半结构化的信息。如何把各种不同的数据源统一在一个信息集成平台上,使用户能够高效地,透明地操作各类信息,已经成为一个重要的课题。文章提出的基于XML的企业信息集成框架CII,详细讨论了该框架的设计、实现,以及在国家“九五”重点科技攻关项目:石化应用软件典型示范工程及产品开发上的应用。同时针对工业生产企业中实时数据库的大量使用,该文还专门研究了集成实时数据库信息面临的问题,并提出了相应的解决方案。

Relevância:

20.00% 20.00%

Publicador:

Resumo:

根据WebOffice系统中浏览器-服务器端通信需求,提出了一种调用Web服务的浏览器端代理方法.比较了此方法和传统的服务器端方法的优点和缺点,分析了此方法的适用场合.最后给出了实现的要点:WSDL的加载和解析、对象类型的序列化和反序列化、SOAP协议的封包和绑定.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

WebGIS是利用互联网来扩展和完善地理信息系统的一项应用技术,是GIS发展的一个重要方向。Ajax是异步JavaScriptXML技术的组合。本文介绍了地理空间信息网络服务,探讨了Ajax与WebGIS的集成模式,并以Google Maps为例,详细分析了Ajax与WebGIS集成的具体方法。

Relevância:

20.00% 20.00%

Publicador:

Resumo:

本文介绍了一个连续-离散复合仿真程序。该程序的连续部分基本取自美国的 CSS 程序。经作者扩充后成为复合仿真程序。扩充的模块包括采样系统仿真模块、两点边值问题求解以及参量最优化等。作者提出的单纯形搜索法改进策略可以显著加快参量最优化过程的收敛速度。

Relevância:

20.00% 20.00%

Publicador:

Resumo:

随着网络技术、特别是Internet技术的发展,分布式系统的高睦能、高可靠性、高灵敏度、可扩展性和系统透明性使得基于分布式系统的应用越来越广泛。在分布式坏境下,信息系统的集成是必须认真考虑的问题。研究如何集成和统一访问分布的、异构的数据资源,实现各种数据的转换、交流与共享;以及如何建立一个开放、可扩展和异构兼容的新一代信息管理系统成为当今网络应用的重要研究方向。本文针对建立月球探测数据管理和集成系统的数据集成与操作集成两方面的内容,重点分析和研究了数据存储管理和系统集成技术,结合月球探测数据管理的应用集成需求与特点提出了基于XML技术的数据存储与管理和基于Web Service技术的系统集成方案。并利用XML/WebService技术基于Net平台开发了一个月球探测数据管理与集成系统实例。研究内容主要包括以下四个方面: (1)基于XML的数据模型与数据库存储。利用XML的自描述性、独立于平台和应用、半结构化,机器可处理、可扩展性以及便于网络传输和广泛支持的特性,实现了基于关系数据库的XML数据存储。对系统中的结构化和非结构化数据信息、都进行了XML标记定义,实现了信息存储和查询的小粒度,增强了数据的表示、查询、插入和删除等数据处理能力和效率。同时,利用XML作为月球探测数据交换和信息传输的格式,也为实现与异构系统数据的互操作提供了理想的角军决方案。(2)基于WebServices的分布式信息系统集成的体系结构。在对XML、SOAP、WSDL和UDDI关键技术和标准规范进行研究与探讨基础上,针对绕月探测数据管理的需求提出了基于XML/Web Service的三层分布式结构模型。分别是表示层、应用逻辑层、服务端数据层。实现了系统功能的可迁移性和可装配性、各层间传输过程中数据流的XML化、接口定义的动态性。与传统技术开发的耦合的分布式应用系统相比,系统在跨平台性、可配置性、可伸缩性、可维护性等方面都有了大幅度的提高。(3)基于,NET平台系统的开发与实现。深入分析和研究了Mic1’osoft.NET平台的核心技术与整体技术框架,在VisLla1Sttldio.NET开发环境中利用C#、ASP.NET、ADO.NET基于关系型数据库Oracle9i开发实现了统一身份认证系统和月球探测数据管理与集成系统。统一身份认证系统是一个通用的统一用户身份认证管理系统,包括用户管理、身份验证、实体管理、日志监控和消息、管理等功能,达到了一次登录,所有系统共用的目的。月球探测数据管理与集成系统包括数据管理、信息发布、系统管理、综合查询和应用集成五大功能模块,相对于原来的紧祸合的应用系统而言,系统的开发效率、重用性、祸合度、灵活性和自适 应性都有了很大的提高。(4)基于XML/WebServices的动态系统集成。分析了传统分布式对象模型在异构环境集成的弊端,基于XML、SOAP和WSDL等技术规范基础上,实现了统一身份认证系统、月球探测数据管理与集成系统、小空间碎片数据库系统以及其它语言开发的应用系统的信息集成、实现了资源时空的有效整合。通过这些集成应用实例,充分体现和说明了Web Services技术在应用系统集成方面的优越性。本研究的成果,也将为地球化学研究领域涉及海量数据的处理、管理和系统集成提供示范实例,推动地球化学数据的融合和综合应用。

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modelo de dados e consultas Twing. Evolução dos algoritmos para consultas Twing. Avaliação dos algoritmos apresentados. Novos desafios. Considerações finais. Conclusões.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

O projeto Agência de Informação desenvolvido pela Embrapa Informação Agropecuária utiliza a tecnologia XML na troca de dados entre alguns de seus módulos e adota a ferramenta Digester (Apache Software Foundation, 2004d) para processamento destes dados. Esta ferramenta apresentou algumas limitações quando utilizada no tratamento de dados em formato XML, estruturados de acordo com as necessidades do Projeto Agência. Este documento descreve as adaptações implementadas na ferramenta Digester permitindo contornar estas limitações.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Conversão de dados de banco de dados relacional para/de o formato XML. Arquitetura do SIGI. Bancos de dados relacional e XML. A experiência no SIGI: XML e Oracle 8i. Exemplos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Estrutura da ferramenta ServCLIPS. Representação de interfaces com o usuário em XML.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

XML e sua utilização em aplicações de bioinformática. Utilização de XML no módulo JPD do SMS. Discussão e trabalhos futuros.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.