994 resultados para Langage de balisage XML


Relevância:

10.00% 10.00%

Publicador:

Resumo:

无线射频识别(Radio Frequency Identification,RFID)技术是通过无线射频方式进行非接触双向通信的自动化识别与数据获取技术,在多目标识别、移动目标识别和单品识别等应用领域具有极大的优势,广泛应用于国防、制造、医疗、零售、物流等诸多领域,被誉为21世纪最热门的技术之一。近年来RFID技术受到工业界和学术界高度关注,理论研究和实践应用得到了突飞猛进的发展,同时,在面向RFID海量数据的智能信息处理方面也带来了巨大的挑战。因此,本文以面向应用的RFID数据处理为背景,对RFID智能信息处理及其关键问题进行了深入研究,主要研究内容包括以下几个方面: 首先,回顾并总结了流数据处理、复杂事件处理和信息融合等理论方法在RFID信息处理上的主要研究成果和典型方法,为RFID智能信息处理体系的建立奠定了理论依据,针对当前RFID信息处理方法的不足,从融合多领域相关技术,进行综合性、大规模的RFID信息处理的角度,提出了综合方法集成框架,并给出了框架相关模块的构成说明,为进一步提出RFID智能信息处理方面新的理论和方法提供了研究思路。 其次,以构件技术和中间件技术为背景,详细分析了现存的RFID中间件系统的优势与不足,在此基础上,主要针对RFID海量数据处理、RFID多协议数据转换、复杂事件处理以及面向RFID的企业信息集成等问题,提出了RFID智能信息处理软件体系结构,设计并实现了流数据处理引擎、多协议处理器、监控管理器、事件管理器和复杂事件处理引擎,并给出了相关模块的处理算法,从软件体系结构上保证了RFID信息处理软件系统的智能性和可扩展性,软件实现验证了所提软件体系的有效性。 再次,在总结和分析流数据管理系统和流数据查询语言方面主要研究成果的基础上,从重用和集成现有流数据处理方法,分离流数据源和处理逻辑,简化软件开发与部署,实时监控与优化RFID流数据处理的研究角度,提出了面向服务体系的RFID流数据处理服务体系,给出了RFID流数据处理服务模型和服务逻辑模型,并给出了基于XML的服务单元描述,数据流描述和服务单元激活描述。最后给出了软件实现,验证了所提出的流数据处理服务的有效性。 最后,以事件驱动系统和主动数据库系统为背景,介绍了复杂事件处理所涉及的关键技术,并在分析目前研究的优势与不足基础上,针对面向RFID海量事件的语义信息处理需求,提出了RFID复杂事件模型和复杂事件处理网络模型,并提出了基于时空关系的操作算子和复杂事件模式定义。在分析和总结已有复杂事件探测体系不足的基础上,进一步设计了RFID复杂事件探测中心结构,并给出相关构件的功能描述。对于复杂事件探测问题,主要提出了基于分发策略和消耗策略的探测优化,并给出了策略选择算法,在以上算法结果的基础上提出了基于策略选择的复杂事件探测算法,同传统复杂事件探测算法比较分析显示所提算法的有效性。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

移动机器人是当前机器人领域的研究重点之一,吸引了许多学者的注意。移动机器人有着巨大的应用潜力。各式各样的机器人开始逐步进入社会各个领域,并在其中发挥着越来越重要的作用,特别是在科技探险、军事侦察、扫雷排险、防核化污染等危险领域,其具有的优势越来越受到各国的重视。 移动机器人的研究涉有到人工知能、控制理论、传感器技术和计算机科学等多门学科。随着移动机器人功能越来越强、复杂度越来越高,对其控制系统的软件体系结构的研究也日益受到重视,并提出了许多不同的体系结构。 论文综述了移动机器人研究和应用的现状,以及移动机器人的几个关键技术。在第二章中给出了单兵可携带移动机器人的硬件平台。第三章,在对已有三种移动机器人软件体系结构分析比较的基础上,设计了针对于特定移动机器人的控制系统结构。该设计主要基于已有三层体系结构,在设计过程中引入了面向对象技术和软件设计模式的思想;在设计其序列层时,采用XML作为序列的描述语言,简化序列层的实现,并提高序列层的可扩展性。在命令(行为)的设计上采用多线程技术,一个命令对应一个线程。序列层通过序列脚本激活或禁止控制层中命令。第四章,说明了系统的实现以及在实现中所使用的软件设计模式。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

现在企业系统与控制系统的主流的集成技术为基于中间件的系统集成,即通过中间件的桥梁作用把各种ERP和MES系统连接起来,实现信息在两者之间的交互与共享。因此本文提出“信息集成内容遵循S95标准,消息封装格式应用XML技术,企业应用集成平台采用BizTalkserver来实现”的中间件集成方法,最后应用此中间件引擎给出了一个在MES与ERP系统之间实现信息集成的示例。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

介绍了一个基于组件的可重构车间管理系统,分别从建模方法、体系结构和组件设计等角度描述了系统的设计思想,并阐述了系统涉及的组件分类、组件粒度划分及XML的应用等关键设计技术。开发的可重构车间管理系统已经用于沈阳第一机床厂两个不同类型生产车间的管理,应用效果良好。

Relevância:

10.00% 10.00%

Publicador:

Resumo:

目前ERP系统和MES系统在企业中的应用越来越广泛,如何实现两系统的信息集成﹑消除“信息孤岛”﹑达到资源的有效共享对于企业而言具有重要的意义。 本文首先介绍了ERP系统、MES系统、中间件与信息集成的相关技术背景,为后文的深入研究奠定了基础;然后阐述了ISA SP95标准、XML技术和Microsoft集成中间件产品BizTalk Server的工作原理和开发方法。接下来讨论了MES与 ERP 集成的必要性,并对MES与 ERP 集成的现状进行了分析,比较了现有的几种MES和ERP系统集成的模式。在讨论了国内外对MES和ERP系统信息集成解决方案的缺陷与不足的基础上,以ISA SP95为标准分析抽取并建立了MES和ERP系统信息集成模型,提出了基于消息队列通信中间件技术来集成MES和ERP系统的方法,并结合陕西西安法士特齿轮有限公司的MES项目,在消息队列通信中间件BizTalk Server的基础上设计开发了ERP/MES信息集成系统。 本课题涉及到以下主要技术及工具:XML, Biztalk Server, SQL Server。本文提出的ERP/MES信息集成系统采用基于.NET平台的组件化程序设计方法,结合ISA SP95标准分析抽取并建立了ERP/MES系统信息集成模型, 以XML-XSD标准作为消息定义的规范,Biztalk Server作为消息模板定义、转换及消息传递的集成中间件,SQL Server 2000作为数据库服务器。主要介绍了ERP/MES信息集成系统的体系结构,给出了系统的功能结构框图,介绍了系统各个功能模块说明和安全性设计,并阐述了ERP/MES集成系统中关键技术的具体实现,最后对系统进行了初步测试,实现了ERP向MES下达生产计划、MES接收计划并指导生产、计划完成后向ERP回馈生产绩效信息的闭环全过程。本系统的研究开发,实现了MES系统和ERP系统间异步、实时、可靠的集成,又由于BizTalk Server具有平台无关性特点,本系统可以应用到许多大规模应用系统的集成,具有一定的实用和推广价值。 关键词 ERP;MES;中间件;信息集成

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A agencia de informação Embrapa disponibiliza na internet informação qualificada e organizada e, muitas vezes, também aquelas geradas pela própria Embrapa. As soluções de software esposta neste trabalho são dirigidas ao gerenciamento dessas informações, que são armazenadas em base de dados centralizada e atualizada via internet por aplicativos deste sistema. O objetivo de apresentar essas soluções é contribuir para o desenvolvimento de sistemas com orientação metodológica similar. Este sistema teve como principal identificação de requisitos as falhas existentes na primeira versão do mesmo, que foi orientada exclusivamente para manipulação de dados formatados em XML. A nova versão traz uma arquitetura baseada nas orientações Java 2 Enterprise Editon (J2EE): modelo em camadas (orientação Model View Controler-MVC), uso de containers e sistema gerenciador de banco de dados. O resultado é um sistema mais robusto em seu todo, além das melhorias de manutenabilidade. Termos para indexação:J2EE, XML, PDOM, Model view controller- MVC, Oracle.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

O software Eutils-search tem por objetivo trazer do banco de dados PubMed informações sobre artigos relacionados a genes de um organismo específico, de acordo com as regras referentes à taxa de acesso impostas pelo site. As informações trazidas são, então, armazenadas localmente em um banco de dados para acesso rápido. Além disso, o software também gera documentos XML correspondentes às informações do organismo requisitado. O eutils-search é uma ferramenta de apoio ao desenvolvimento de aplicações de mineração de textos voltadas para os domínios de biotecnologia e biologia molecular, baseada em informações textuais obtidas do banco de dados PubMed. Este documento apresenta os pré-requisitos e a descrição dos parâmetros necessários para utilização do software, bem como uma descrição de alguns aspectos internos do software, para melhor entendimento do processo que ele automatiza, além de alguns exemplos e uso.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enforcement policies is a difficult and error prone task. This thesis describes the development and evaluation of an off-line firewall policy parser and validation tool. This provides the system administrator with a textual interface and the vendor specific low level languages they trust and are familiar with, but the support of an off-line compiler tool. The tool was created using the Microsoft C#.NET language, and the Microsoft Visual Studio Integrated Development Environment (IDE). This provided an object environment to create a flexible and extensible system, as well as simple Web and Windows prototyping facilities to create GUI front-end applications for testing and evaluation. A CLI was provided with the tool, for more experienced users, but it was also designed to be easily integrated into GUI based applications for non-expert users. The evaluation of the system was performed from a custom built GUI application, which can create test firewall rule sets containing synthetic rules, to supply a variety of experimental conditions, as well as record various performance metrics. The validation tool was created, based around a pragmatic outlook, with regard to the needs of the network administrator. The modularity of the design was important, due to the fast changing nature of the network device languages being processed. An object oriented approach was taken, for maximum changeability and extensibility, and a flexible tool was developed, due to the possible needs of different types users. System administrators desire, low level, CLI-based tools that they can trust, and use easily from scripting languages. Inexperienced users may prefer a more abstract, high level, GUI or Wizard that has an easier to learn process. Built around these ideas, the tool was implemented, and proved to be a usable, and complimentary addition to the many network policy-based systems currently available. The tool has a flexible design and contains comprehensive functionality. As opposed to some of the other tools which perform across multiple vendor languages, but do not implement a deep range of options for any of the languages. It compliments existing systems, such as policy compliance tools, and abstract policy analysis systems. Its validation algorithms were evaluated for both completeness, and performance. The tool was found to correctly process large firewall policies in just a few seconds. A framework for a policy-based management system, with which the tool would integrate, is also proposed. This is based around a vendor independent XML-based repository of device configurations, which could be used to bring together existing policy management and analysis systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This document describes a large set of Benchmark Problem Instances for the Rich Vehicle Routing Problem. All files are supplied as a single compressed (zipped) archive containing the instances, in XML format, an Object-Oriented Model supplied in XSD format, documentation and an XML parser written in Java to ease use.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Soldatova, L., Clare, A., Sparkes, A. and King, R. D. (2006) An ontology for a robot scientist. Bioinformatics 2006 22: 464-471

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Boston University Theology Library

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Boston University Theology Library

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Boston University Theology Library

Relevância:

10.00% 10.00%

Publicador:

Resumo:

On January 11, 2008, the National Institutes of Health ('NIH') adopted a revised Public Access Policy for peer-reviewed journal articles reporting research supported in whole or in part by NIH funds. Under the revised policy, the grantee shall ensure that a copy of the author's final manuscript, including any revisions made during the peer review process, be electronically submitted to the National Library of Medicine's PubMed Central ('PMC') archive and that the person submitting the manuscript will designate a time not later than 12 months after publication at which NIH may make the full text of the manuscript publicly accessible in PMC. NIH adopted this policy to implement a new statutory requirement under which: The Director of the National Institutes of Health shall require that all investigators funded by the NIH submit or have submitted for them to the National Library of Medicine's PubMed Central an electronic version of their final, peer-reviewed manuscripts upon acceptance for publication to be made publicly available no later than 12 months after the official date of publication: Provided, That the NIH shall implement the public access policy in a manner consistent with copyright law. This White Paper is written primarily for policymaking staff in universities and other institutional recipients of NIH support responsible for ensuring compliance with the Public Access Policy. The January 11, 2008, Public Access Policy imposes two new compliance mandates. First, the grantee must ensure proper manuscript submission. The version of the article to be submitted is the final version over which the author has control, which must include all revisions made after peer review. The statutory command directs that the manuscript be submitted to PMC 'upon acceptance for publication.' That is, the author's final manuscript should be submitted to PMC at the same time that it is sent to the publisher for final formatting and copy editing. Proper submission is a two-stage process. The electronic manuscript must first be submitted through a process that requires input of additional information concerning the article, the author(s), and the nature of NIH support for the research reported. NIH then formats the manuscript into a uniform, XML-based format used for PMC versions of articles. In the second stage of the submission process, NIH sends a notice to the Principal Investigator requesting that the PMC-formatted version be reviewed and approved. Only after such approval has grantee's manuscript submission obligation been satisfied. Second, the grantee also has a distinct obligation to grant NIH copyright permission to make the manuscript publicly accessible through PMC not later than 12 months after the date of publication. This obligation is connected to manuscript submission because the author, or the person submitting the manuscript on the author's behalf, must have the necessary rights under copyright at the time of submission to give NIH the copyright permission it requires. This White Paper explains and analyzes only the scope of the grantee's copyright-related obligations under the revised Public Access Policy and suggests six options for compliance with that aspect of the grantee's obligation. Time is of the essence for NIH grantees. As a practical matter, the grantee should have a compliance process in place no later than April 7, 2008. More specifically, the new Public Access Policy applies to any article accepted for publication on or after April 7, 2008 if the article arose under (1) an NIH Grant or Cooperative Agreement active in Fiscal Year 2008, (2) direct funding from an NIH Contract signed after April 7, 2008, (3) direct funding from the NIH Intramural Program, or (4) from an NIH employee. In addition, effective May 25, 2008, anyone submitting an application, proposal or progress report to the NIH must include the PMC reference number when citing articles arising from their NIH funded research. (This includes applications submitted to the NIH for the May 25, 2008 and subsequent due dates.) Conceptually, the compliance challenge that the Public Access Policy poses for grantees is easily described. The grantee must depend to some extent upon the author(s) to take the necessary actions to ensure that the grantee is in compliance with the Public Access Policy because the electronic manuscripts and the copyrights in those manuscripts are initially under the control of the author(s). As a result, any compliance option will require an explicit understanding between the author(s) and the grantee about how the manuscript and the copyright in the manuscript are managed. It is useful to conceptually keep separate the grantee's manuscript submission obligation from its copyright permission obligation because the compliance personnel concerned with manuscript management may differ from those responsible for overseeing the author's copyright management. With respect to copyright management, the grantee has the following six options: (1) rely on authors to manage copyright but also to request or to require that these authors take responsibility for amending publication agreements that call for transfer of too many rights to enable the author to grant NIH permission to make the manuscript publicly accessible ('the Public Access License'); (2) take a more active role in assisting authors in negotiating the scope of any copyright transfer to a publisher by (a) providing advice to authors concerning their negotiations or (b) by acting as the author's agent in such negotiations; (3) enter into a side agreement with NIH-funded authors that grants a non-exclusive copyright license to the grantee sufficient to grant NIH the Public Access License; (4) enter into a side agreement with NIH-funded authors that grants a non-exclusive copyright license to the grantee sufficient to grant NIH the Public Access License and also grants a license to the grantee to make certain uses of the article, including posting a copy in the grantee's publicly accessible digital archive or repository and authorizing the article to be used in connection with teaching by university faculty; (5) negotiate a more systematic and comprehensive agreement with the biomedical publishers to ensure either that the publisher has a binding obligation to submit the manuscript and to grant NIH permission to make the manuscript publicly accessible or that the author retains sufficient rights to do so; or (6) instruct NIH-funded authors to submit manuscripts only to journals with binding deposit agreements with NIH or to journals whose copyright agreements permit authors to retain sufficient rights to authorize NIH to make manuscripts publicly accessible.