期刊文献+

应用MES系统对工厂进行整体优化的研究 被引量:2

The Application of MES System for the Overall Optimization of the Plant
下载PDF
导出
摘要 计算机技术的不断发展使得企业信息化管理的水平得到稳步提升。MES(制造执行系统)在企业中的运用能够有效地提高企业的核心竞争力,向发达国家的信息管理技术靠拢。本文将以太阳能电池制造企业为例,讲述MES系统的运用对企业生产的整体优化过程。 The development of computer technology makes the steady improvement of the enterprise informationization management level. MES( Manufacturing Execution System) used in the enterprise can effectively improve the core competitiveness of enterprises,and close to the information management technology in developed countries. This article takes the solar cell manufacturing enterprise as an example,describes the overall optimization process of the enterprise production with the application of MES system.
作者 贾娟芳
出处 《山西电子技术》 2016年第3期87-89,共3页 Shanxi Electronic Technology
关键词 MES系统 计算机技术 太阳能电池 整体优化 MES system computer technology solar cell global optimization
  • 相关文献

参考文献5

二级参考文献102

  • 1Hacigümüs H,Mehrotra S,Iyer B.Providing database as a service.In:Proc.of the Int'l Conf.on Data Engineering.Washington:IEEE Computer Society Press,2002.29-38.
  • 2Mykletun E,Narasimha M,Tsudik G.Authentication and integrity in outsourced databases.ACM Trans.on Storage,2006,2(2):107-138.
  • 3Schneier B,Wrote; Wu SZ,Zhu SX,Zhang WZ,Trans.Applied Cryptography-Protocols,Algorithms,and Source Code in C (Second Edition).Beijing:China Machine Press,2006 (in Chinese).
  • 4Shmueli E,Waisenberg R,Elovici Y,Gudes E.Designing secure indexes for encrypted databases.In:Proc.of the IFIP Conf.on Database and Applications Security.LNCS 3654,Heidelberg,Berlin:Springer-Verlag,2005.54-68.
  • 5Yang ZQ,Zhong S,Wright RN.Privacy-Preserving queries on encrypted data.In:Proc.of the 11th European Symp.on Research in Computer Security.LNCS 4189,Heidelberg,Berlin:Springer-Verlag,2006.479-495.
  • 6Davida GI,Wells DL,Kam JB.A database encryption system with subkeys.ACM Trans.on Database Systems,1981,6(2):312-328.[doi:10.1145/319566.319580].
  • 7Song DX,Wagner D,Perrig A.Practical techniques for searches on encrypted data.In:Proc.of 2000 IEEE Symp.on Research in Security and Privacy.Washington:IEEE Computer Society Press,2000.44-55.
  • 8Hacigümüs H,Iyer B,Mehrotra S,Li C.Executing SQL over encrypted data in the database service provider model.In:Proc.of the ACM SIGMOD Conf.New York:ACM Press,2002.216-227.
  • 9Ozsoyoglu G,Singer DA,Chung SS.Anti-Tamper databases:Querying encrypted databases.In:Proc.of the 17th Annual IFIP WG 11.3 Working Conf.on Database Applications and Security.Cleveland:Case Western Reserve University,2003.133-146.
  • 10Hore B,Mehrotra S,Tsudik G.A privacy-preserving index for range queries.In:Nascimento MA,-zsu MT,Kossmann D,Miller,Blakeley RJJA,Schiefer KB,eds.Proc.of the 13th Int'l Conf.on Very Large Data Bases.New York:ACM Press,2004.720-731.

共引文献236

同被引文献8

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部