Subsurface geological cross sections of 0 - 200 m depth were constructed using a dense drilling database of the Osaka Plain in the intra-arc Osaka Basin of the Japan island arc, an active plate margin. The cross secti...Subsurface geological cross sections of 0 - 200 m depth were constructed using a dense drilling database of the Osaka Plain in the intra-arc Osaka Basin of the Japan island arc, an active plate margin. The cross sections revealed the subsurface geological structures and the geometry of folding and faulting in the basin. The comparison between the constructed subsurface cross sections and the seismic sections of the basement and basin fills at a depth of 1500 - 2000 m showed that the basement and shallow subsurface structures are similar;however, the shallow cross sections were of higher resolution than the deep seismic profiles.展开更多
With the massive growth of the seismic data, it is required a new method to manage them. In this paper, the design method will be reported about relational database based on tree structure. Comparing with other design...With the massive growth of the seismic data, it is required a new method to manage them. In this paper, the design method will be reported about relational database based on tree structure. Comparing with other designs, it is not only simpler and easier to organize data, but also can simplify the design process of the database. This method has been used to design database of the earthquake monitor center station of the earthquake monitoring system for the Yangtze River Three Gorges Project and has shown good results.展开更多
The integration of remote sensing (RS) with geographical information system (GIS) is a hotspot in geographical information science.A good database structure is important to the integration of RS with GIS,which should ...The integration of remote sensing (RS) with geographical information system (GIS) is a hotspot in geographical information science.A good database structure is important to the integration of RS with GIS,which should be beneficial to the complete integration of RS with GIS,able to deal with the disagreement between the resolution of remote sensing images and the precision of GIS data,and also helpful to the knowledge discovery and exploitation.In this paper,the database structure storing the spatial data based on semantic network is presented.This database structure has several advantages.Firstly,the spatial data is stored as raster data with space index,so the image processing can be done directly on the GIS data that is stored hierarchically according to the distinguishing precision.Secondly,the simple objects are aggregated into complex ones.Thirdly,because we use the indexing tree to depict the relationship of aggregation and the indexing pictures expressed by 2_D strings to describe the topology structure of the objects,the concepts of surrounding and region are expressed clearly and the semantic content of the landscape can be illustrated well.All the factors that affect the recognition of the objects are depicted in the factor space,which provides a uniform mathematical frame for the fusion of the semantic and non_semantic information.Lastly,the object node,knowledge node and the indexing node are integrated into one node.This feature enhances the ability of system in knowledge expressing,intelligent inference and association.The application shows that this database structure can benefit the interpretation of remote sensing image with the information of GIS.展开更多
In this paper, we research on the research on the mass structured data storage and sorting algorithm and methodology for SQL database under the big data environment. With the data storage market development and center...In this paper, we research on the research on the mass structured data storage and sorting algorithm and methodology for SQL database under the big data environment. With the data storage market development and centering on the server, the data will store model to data- centric data storage model. Storage is considered from the start, just keep a series of data, for the management system and storage device rarely consider the intrinsic value of the stored data. The prosperity of the Internet has changed the world data storage, and with the emergence of many new applications. Theoretically, the proposed algorithm has the ability of dealing with massive data and numerically, the algorithm could enhance the processing accuracy and speed which will be meaningful.展开更多
Data protection in databases is critical for any organization,as unauthorized access or manipulation can have severe negative consequences.Intrusion detection systems are essential for keeping databases secure.Advance...Data protection in databases is critical for any organization,as unauthorized access or manipulation can have severe negative consequences.Intrusion detection systems are essential for keeping databases secure.Advancements in technology will lead to significant changes in the medical field,improving healthcare services through real-time information sharing.However,reliability and consistency still need to be solved.Safeguards against cyber-attacks are necessary due to the risk of unauthorized access to sensitive information and potential data corruption.Dis-ruptions to data items can propagate throughout the database,making it crucial to reverse fraudulent transactions without delay,especially in the healthcare industry,where real-time data access is vital.This research presents a role-based access control architecture for an anomaly detection technique.Additionally,the Structured Query Language(SQL)queries are stored in a new data structure called Pentaplet.These pentaplets allow us to maintain the correlation between SQL statements within the same transaction by employing the transaction-log entry information,thereby increasing detection accuracy,particularly for individuals within the company exhibiting unusual behavior.To identify anomalous queries,this system employs a supervised machine learning technique called Support Vector Machine(SVM).According to experimental findings,the proposed model performed well in terms of detection accuracy,achieving 99.92%through SVM with One Hot Encoding and Principal Component Analysis(PCA).展开更多
Considerable interest in hydrogen bonding involving chalcogen has been growing since the IUPAC committee has redefined hydrogen bonding. Not only the focus is on unconventional acceptors, but also on donors not discus...Considerable interest in hydrogen bonding involving chalcogen has been growing since the IUPAC committee has redefined hydrogen bonding. Not only the focus is on unconventional acceptors, but also on donors not discussed before. It has been mentioned in previous studies that the proton of the H-C group could be involved in hydrogen bonding, but with conventional acceptors. In this study, we explored the ability of hydrogen bond formation of Se, S and Te acceptors with the H-C donor using Cambridge Structural Database in conjunction with Ab Initio calculations. In the CSD, there are respectively 256, 6249 and 11 R1,R2,-C=Se, R1,R2,-C=S and R1,R2,-C=Te structures that form hydrogen bonds, in which the N,N groups are majority. Except for C=S acceptor which can form a hydrogen bond with its C, C group, both C=Se and C=Te acceptors could form a hydrogen bond only with N,C and N,N groups. CSD analysis shows very similar d (norm) around -0.04 Å, while DFT-calculated interaction for N,C and N,N groups are also similar. Both interaction distances derived from CSD analysis and DFT-calculated interaction energies demonstrate that the acceptors form stable complexes with H-CF3. Besides hydrogen bonds, dispersion interactions are forces stabilizing the complexes since their contribution can reach 50%. Analysis of intra-molecular geometries and Ab Initio partial charges show that this bonding stems from resonance induced C<sup>δ+</sup>=X<sup>δ-</sup> dipoles. In many respects, both C=Se, C=S and C=Te are similar to C=S, with similar d (norm) and calculated interaction strengths.展开更多
Computer-assisted chemical structure searching plays a critical role for efficient structure screening in cheminformatics. We designed a high-performance chemical structure & data search engine called DCAIKU, buil...Computer-assisted chemical structure searching plays a critical role for efficient structure screening in cheminformatics. We designed a high-performance chemical structure & data search engine called DCAIKU, built on CouchDB and ElasticSearch engines. DCAIKU converts the chemical structure similarity search problem into a general text search problem to utilize off-the-shelf full-text search engines. DCAIKU also supports flexible document structures and heterogeneous datasets with the help of schema-less document database. Our evaluations show that DCAIKU can handle both keyword search and structural search against millions of records with both high accuracy and low latency. We expect that DCAIKU will lay the foundation towards large-scale and cost-effective structural search in materials science and chemistry research.展开更多
Recent studies have addressed that the cache be havior is important in the design of main memory index structures. Cache-conscious indices such as the CSB^+-tree are shown to outperform conventional main memory indic...Recent studies have addressed that the cache be havior is important in the design of main memory index structures. Cache-conscious indices such as the CSB^+-tree are shown to outperform conventional main memory indices such as the AVL-tree and the T-tree. This paper proposes a cacheconscious version of the T-tree, CST-tree, defined according to the cache-conscious definition. To separate the keys within a node into two parts, the CST-tree can gain higher cache hit ratio.展开更多
According to specifications for Welding Procedure Qualification of ASME IX Section and Chinese code, JB 4708 2000, a software package for managing welding documents has been rebuilt. Consequently, the new software pa...According to specifications for Welding Procedure Qualification of ASME IX Section and Chinese code, JB 4708 2000, a software package for managing welding documents has been rebuilt. Consequently, the new software package can be used in a Limited Area Network (LAN) with 4 different levels of authorities for different users. Therefore, the welding documents, including DWPS (Design for Welding Procedure Specifications), PQRs (Procedure Qualification Records) and WPS (Welding Procedure Specifications) can be shared within a company. At the same time, the system provides users various functions such as browsing, copying, editing, searching and printing records, and helps users to make decision of whether a new PQR test is necessary or not according to the codes above as well. Furthermore, super users can also browse the history of record modification and retrieve the records when needed.展开更多
This paper presents the basic concepts and principles,data structure and high efficient spatial index for multi_resolution image database.The database is characterized by arrangement of multi_resource image data and s...This paper presents the basic concepts and principles,data structure and high efficient spatial index for multi_resolution image database.The database is characterized by arrangement of multi_resource image data and seamless mosaic,distribution_based storage and management,integration with other spatial database software such as GeoStar and GeoGrid developed by Wuhan Technical University of Surveying and Mapping.展开更多
A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Que...A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.展开更多
Until recently, many computational materials scientists have shown little interest in materials databases. This is now changing be-cause the amount of computational data is rapidly increasing and the potential for dat...Until recently, many computational materials scientists have shown little interest in materials databases. This is now changing be-cause the amount of computational data is rapidly increasing and the potential for data mining provides unique opportunities for discovery and optimization. Here, a few examples of such opportunities are discussed relating to structural analysis and classification, discovery of correlations between materials properties, and discovery of unsuspected compounds.展开更多
In the last two decades of the 20th century, there has been an increasing interest in and emphasis on the study of the Hong Kong literature in both the academic and general public in Hong Kong. Recognizing the emergen...In the last two decades of the 20th century, there has been an increasing interest in and emphasis on the study of the Hong Kong literature in both the academic and general public in Hong Kong. Recognizing the emergent need of the resources on Hong Kong literature, the University Library System of the Chinese University of Hong Kong set up the Hong Kong Literature Database (the “Database”), which was the first Chinese literature database in the Internet in 2000. The paper will examine how the database is constructed using XML technology andometadata schema, The database also employs Unicode UTF-8 as the internal code. A mapping table for traditional and simplified Chinese characters was created based on Unihan and is used behind the scene so that a user can either input traditional or simplified Chinese characters and retrieval will give both traditional and simplified Chinese characters. Currently 65% of journals use OCR technology so that full-text searching is possible. The Chinese OCR technology will be examined in greater detail. Special features of the Database such as, page-by-page browse mode, position-highlight for full-page newspaper, linking Table-Of-Contents and book jackets from the Library catalogue, etc. are described. The paper will also bring out the problem of massive downloading and compare the state-of-the-art technology and their shortcomings. This paper shows how the Hong Kong Literature Database facilitates future collaboration and data exchange by using open standard, shareable structure and the latest technology.展开更多
One of the core developments in geomathematics in now days is the use of digital data processing in mineral prospecting and assessment. The information discovery is based on multidisciplinary geoscientific data and an...One of the core developments in geomathematics in now days is the use of digital data processing in mineral prospecting and assessment. The information discovery is based on multidisciplinary geoscientific data and an integrated management approach is crucial. The lack of a standard description hinders interoperations in database search and discovery. Metadata hierarchy aims to provide a standard view of the geoscientific data, and facilitate data description and discovery. In the research of integrated geoscientific database, the metadata hierarchy used a standardized description for each collection in the content structure and realized in semantic structure. It recorded both dataset identification and inner structures and relationships of objects, thus differed from many other applications. There were four tiers in the content structure and three levels in the semantic structure. With its help, database users could determine how applicable a dataset is to a project, and improve their queries to the database. Effectiveness of data accessing is significantly enhanced through the rich, consistent metadata.展开更多
According to the objective reality in Yunnan Province,such as great difference of weather,a great proportion of minorities,technological backwardness of agricultural production,low conversion rate of research accompli...According to the objective reality in Yunnan Province,such as great difference of weather,a great proportion of minorities,technological backwardness of agricultural production,low conversion rate of research accomplishments,and a limited number of agricultural technical personnel,ASP.NET technique and SQL Server 2005 database technique are adopted.Database platform of county agricultural production technology in Yunnan Province is established by using B/S structure.This platform includes presentation layer,application layer,and data layer,involving regional information,technology column information,technology classification information,technology content and other databases.It has six functional modules,namely information browse,system management,regional maintenance,technical section maintenance,category maintenance and technical information release,integrating crop cultivation,livestock breeding,economic forest management,plant protection,agricultural products processing,agricultural machinery use and other agricultural technical information.This platform can exchange information dynamically with the client,perform the query request from users,and send the result to users.This database platform has friendly interface,profuse information,high pertinency and so on,which offers rich and reliable information resources to farmers,agricultural technical personnel,and government.At present,this platform has been popularized in some areas of Yunnan Province and has obtained good results.展开更多
In soft sensor field, just-in-time learning(JITL) is an effective approach to model nonlinear and time varying processes. However, most similarity criterions in JITL are computed in the input space only while ignoring...In soft sensor field, just-in-time learning(JITL) is an effective approach to model nonlinear and time varying processes. However, most similarity criterions in JITL are computed in the input space only while ignoring important output information, which may lead to inaccurate construction of relevant sample set. To solve this problem, we propose a novel supervised feature extraction method suitable for the regression problem called supervised local and non-local structure preserving projections(SLNSPP), in which both input and output information can be easily and effectively incorporated through a newly defined similarity index. The SLNSPP can not only retain the virtue of locality preserving projections but also prevent faraway points from nearing after projection,which endues SLNSPP with powerful discriminating ability. Such two good properties of SLNSPP are desirable for JITL as they are expected to enhance the accuracy of similar sample selection. Consequently, we present a SLNSPP-JITL framework for developing adaptive soft sensor, including a sparse learning strategy to limit the scale and update the frequency of database. Finally, two case studies are conducted with benchmark datasets to evaluate the performance of the proposed schemes. The results demonstrate the effectiveness of LNSPP and SLNSPP.展开更多
This paper studies and analyses the character of the tree structure,and then presents an algorithm which is concise and convinent for the construction of tree structure.It is especially fit for the application system ...This paper studies and analyses the character of the tree structure,and then presents an algorithm which is concise and convinent for the construction of tree structure.It is especially fit for the application system using database.The special storege organization needn’t to be established in the database using this algorithm.By SQL statement,the data dispersed in different storeage organization can be dynamically combined into the data set including two fields:father node field and child node field.Then the algorithm can process those data and display the tree structure rapidly. At last,we design a control called TFDTreeView which inherits from TTreeView control using this algorithm. TFDTreeView control provide a interface function,through which we can construct the tree structure convinently. On some occasions,this method will be good for the application system.And ,by building the control ,we can reuse it in many system development.展开更多
文摘Subsurface geological cross sections of 0 - 200 m depth were constructed using a dense drilling database of the Osaka Plain in the intra-arc Osaka Basin of the Japan island arc, an active plate margin. The cross sections revealed the subsurface geological structures and the geometry of folding and faulting in the basin. The comparison between the constructed subsurface cross sections and the seismic sections of the basement and basin fills at a depth of 1500 - 2000 m showed that the basement and shallow subsurface structures are similar;however, the shallow cross sections were of higher resolution than the deep seismic profiles.
基金Key Project of China Earthquake Administration during the ninth Five-year Plan (951204).
文摘With the massive growth of the seismic data, it is required a new method to manage them. In this paper, the design method will be reported about relational database based on tree structure. Comparing with other designs, it is not only simpler and easier to organize data, but also can simplify the design process of the database. This method has been used to design database of the earthquake monitor center station of the earthquake monitoring system for the Yangtze River Three Gorges Project and has shown good results.
文摘The integration of remote sensing (RS) with geographical information system (GIS) is a hotspot in geographical information science.A good database structure is important to the integration of RS with GIS,which should be beneficial to the complete integration of RS with GIS,able to deal with the disagreement between the resolution of remote sensing images and the precision of GIS data,and also helpful to the knowledge discovery and exploitation.In this paper,the database structure storing the spatial data based on semantic network is presented.This database structure has several advantages.Firstly,the spatial data is stored as raster data with space index,so the image processing can be done directly on the GIS data that is stored hierarchically according to the distinguishing precision.Secondly,the simple objects are aggregated into complex ones.Thirdly,because we use the indexing tree to depict the relationship of aggregation and the indexing pictures expressed by 2_D strings to describe the topology structure of the objects,the concepts of surrounding and region are expressed clearly and the semantic content of the landscape can be illustrated well.All the factors that affect the recognition of the objects are depicted in the factor space,which provides a uniform mathematical frame for the fusion of the semantic and non_semantic information.Lastly,the object node,knowledge node and the indexing node are integrated into one node.This feature enhances the ability of system in knowledge expressing,intelligent inference and association.The application shows that this database structure can benefit the interpretation of remote sensing image with the information of GIS.
文摘In this paper, we research on the research on the mass structured data storage and sorting algorithm and methodology for SQL database under the big data environment. With the data storage market development and centering on the server, the data will store model to data- centric data storage model. Storage is considered from the start, just keep a series of data, for the management system and storage device rarely consider the intrinsic value of the stored data. The prosperity of the Internet has changed the world data storage, and with the emergence of many new applications. Theoretically, the proposed algorithm has the ability of dealing with massive data and numerically, the algorithm could enhance the processing accuracy and speed which will be meaningful.
基金thankful to the Dean of Scientific Research at Najran University for funding this work under the Research Groups Funding Program,Grant Code(NU/RG/SERC/12/6).
文摘Data protection in databases is critical for any organization,as unauthorized access or manipulation can have severe negative consequences.Intrusion detection systems are essential for keeping databases secure.Advancements in technology will lead to significant changes in the medical field,improving healthcare services through real-time information sharing.However,reliability and consistency still need to be solved.Safeguards against cyber-attacks are necessary due to the risk of unauthorized access to sensitive information and potential data corruption.Dis-ruptions to data items can propagate throughout the database,making it crucial to reverse fraudulent transactions without delay,especially in the healthcare industry,where real-time data access is vital.This research presents a role-based access control architecture for an anomaly detection technique.Additionally,the Structured Query Language(SQL)queries are stored in a new data structure called Pentaplet.These pentaplets allow us to maintain the correlation between SQL statements within the same transaction by employing the transaction-log entry information,thereby increasing detection accuracy,particularly for individuals within the company exhibiting unusual behavior.To identify anomalous queries,this system employs a supervised machine learning technique called Support Vector Machine(SVM).According to experimental findings,the proposed model performed well in terms of detection accuracy,achieving 99.92%through SVM with One Hot Encoding and Principal Component Analysis(PCA).
文摘Considerable interest in hydrogen bonding involving chalcogen has been growing since the IUPAC committee has redefined hydrogen bonding. Not only the focus is on unconventional acceptors, but also on donors not discussed before. It has been mentioned in previous studies that the proton of the H-C group could be involved in hydrogen bonding, but with conventional acceptors. In this study, we explored the ability of hydrogen bond formation of Se, S and Te acceptors with the H-C donor using Cambridge Structural Database in conjunction with Ab Initio calculations. In the CSD, there are respectively 256, 6249 and 11 R1,R2,-C=Se, R1,R2,-C=S and R1,R2,-C=Te structures that form hydrogen bonds, in which the N,N groups are majority. Except for C=S acceptor which can form a hydrogen bond with its C, C group, both C=Se and C=Te acceptors could form a hydrogen bond only with N,C and N,N groups. CSD analysis shows very similar d (norm) around -0.04 Å, while DFT-calculated interaction for N,C and N,N groups are also similar. Both interaction distances derived from CSD analysis and DFT-calculated interaction energies demonstrate that the acceptors form stable complexes with H-CF3. Besides hydrogen bonds, dispersion interactions are forces stabilizing the complexes since their contribution can reach 50%. Analysis of intra-molecular geometries and Ab Initio partial charges show that this bonding stems from resonance induced C<sup>δ+</sup>=X<sup>δ-</sup> dipoles. In many respects, both C=Se, C=S and C=Te are similar to C=S, with similar d (norm) and calculated interaction strengths.
基金This work was supported by the National Natural Science Foundation of China,the Ministry of Science and Technology of China,and the Swedish Research Council.
文摘Computer-assisted chemical structure searching plays a critical role for efficient structure screening in cheminformatics. We designed a high-performance chemical structure & data search engine called DCAIKU, built on CouchDB and ElasticSearch engines. DCAIKU converts the chemical structure similarity search problem into a general text search problem to utilize off-the-shelf full-text search engines. DCAIKU also supports flexible document structures and heterogeneous datasets with the help of schema-less document database. Our evaluations show that DCAIKU can handle both keyword search and structural search against millions of records with both high accuracy and low latency. We expect that DCAIKU will lay the foundation towards large-scale and cost-effective structural search in materials science and chemistry research.
基金Supported bythe National High Technology of 863Project (2002AA1Z2308 ,2002AA118030)
文摘Recent studies have addressed that the cache be havior is important in the design of main memory index structures. Cache-conscious indices such as the CSB^+-tree are shown to outperform conventional main memory indices such as the AVL-tree and the T-tree. This paper proposes a cacheconscious version of the T-tree, CST-tree, defined according to the cache-conscious definition. To separate the keys within a node into two parts, the CST-tree can gain higher cache hit ratio.
文摘According to specifications for Welding Procedure Qualification of ASME IX Section and Chinese code, JB 4708 2000, a software package for managing welding documents has been rebuilt. Consequently, the new software package can be used in a Limited Area Network (LAN) with 4 different levels of authorities for different users. Therefore, the welding documents, including DWPS (Design for Welding Procedure Specifications), PQRs (Procedure Qualification Records) and WPS (Welding Procedure Specifications) can be shared within a company. At the same time, the system provides users various functions such as browsing, copying, editing, searching and printing records, and helps users to make decision of whether a new PQR test is necessary or not according to the codes above as well. Furthermore, super users can also browse the history of record modification and retrieve the records when needed.
文摘This paper presents the basic concepts and principles,data structure and high efficient spatial index for multi_resolution image database.The database is characterized by arrangement of multi_resource image data and seamless mosaic,distribution_based storage and management,integration with other spatial database software such as GeoStar and GeoGrid developed by Wuhan Technical University of Surveying and Mapping.
文摘A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.
文摘Until recently, many computational materials scientists have shown little interest in materials databases. This is now changing be-cause the amount of computational data is rapidly increasing and the potential for data mining provides unique opportunities for discovery and optimization. Here, a few examples of such opportunities are discussed relating to structural analysis and classification, discovery of correlations between materials properties, and discovery of unsuspected compounds.
文摘In the last two decades of the 20th century, there has been an increasing interest in and emphasis on the study of the Hong Kong literature in both the academic and general public in Hong Kong. Recognizing the emergent need of the resources on Hong Kong literature, the University Library System of the Chinese University of Hong Kong set up the Hong Kong Literature Database (the “Database”), which was the first Chinese literature database in the Internet in 2000. The paper will examine how the database is constructed using XML technology andometadata schema, The database also employs Unicode UTF-8 as the internal code. A mapping table for traditional and simplified Chinese characters was created based on Unihan and is used behind the scene so that a user can either input traditional or simplified Chinese characters and retrieval will give both traditional and simplified Chinese characters. Currently 65% of journals use OCR technology so that full-text searching is possible. The Chinese OCR technology will be examined in greater detail. Special features of the Database such as, page-by-page browse mode, position-highlight for full-page newspaper, linking Table-Of-Contents and book jackets from the Library catalogue, etc. are described. The paper will also bring out the problem of massive downloading and compare the state-of-the-art technology and their shortcomings. This paper shows how the Hong Kong Literature Database facilitates future collaboration and data exchange by using open standard, shareable structure and the latest technology.
基金Funded by the National 863 Program of China (No.2002AA130406)the Key Project of China Geological Survey (No.200218310077).
文摘One of the core developments in geomathematics in now days is the use of digital data processing in mineral prospecting and assessment. The information discovery is based on multidisciplinary geoscientific data and an integrated management approach is crucial. The lack of a standard description hinders interoperations in database search and discovery. Metadata hierarchy aims to provide a standard view of the geoscientific data, and facilitate data description and discovery. In the research of integrated geoscientific database, the metadata hierarchy used a standardized description for each collection in the content structure and realized in semantic structure. It recorded both dataset identification and inner structures and relationships of objects, thus differed from many other applications. There were four tiers in the content structure and three levels in the semantic structure. With its help, database users could determine how applicable a dataset is to a project, and improve their queries to the database. Effectiveness of data accessing is significantly enhanced through the rich, consistent metadata.
基金Supported by the National Science & Technology Pillar Program during the Eleventh Five-Year Plan Period(2006BAD10A14)
文摘According to the objective reality in Yunnan Province,such as great difference of weather,a great proportion of minorities,technological backwardness of agricultural production,low conversion rate of research accomplishments,and a limited number of agricultural technical personnel,ASP.NET technique and SQL Server 2005 database technique are adopted.Database platform of county agricultural production technology in Yunnan Province is established by using B/S structure.This platform includes presentation layer,application layer,and data layer,involving regional information,technology column information,technology classification information,technology content and other databases.It has six functional modules,namely information browse,system management,regional maintenance,technical section maintenance,category maintenance and technical information release,integrating crop cultivation,livestock breeding,economic forest management,plant protection,agricultural products processing,agricultural machinery use and other agricultural technical information.This platform can exchange information dynamically with the client,perform the query request from users,and send the result to users.This database platform has friendly interface,profuse information,high pertinency and so on,which offers rich and reliable information resources to farmers,agricultural technical personnel,and government.At present,this platform has been popularized in some areas of Yunnan Province and has obtained good results.
基金Supported by the National Natural Science Foundation of China(61273160)the Fundamental Research Funds for the Central Universities(14CX06067A,13CX05021A)
文摘In soft sensor field, just-in-time learning(JITL) is an effective approach to model nonlinear and time varying processes. However, most similarity criterions in JITL are computed in the input space only while ignoring important output information, which may lead to inaccurate construction of relevant sample set. To solve this problem, we propose a novel supervised feature extraction method suitable for the regression problem called supervised local and non-local structure preserving projections(SLNSPP), in which both input and output information can be easily and effectively incorporated through a newly defined similarity index. The SLNSPP can not only retain the virtue of locality preserving projections but also prevent faraway points from nearing after projection,which endues SLNSPP with powerful discriminating ability. Such two good properties of SLNSPP are desirable for JITL as they are expected to enhance the accuracy of similar sample selection. Consequently, we present a SLNSPP-JITL framework for developing adaptive soft sensor, including a sparse learning strategy to limit the scale and update the frequency of database. Finally, two case studies are conducted with benchmark datasets to evaluate the performance of the proposed schemes. The results demonstrate the effectiveness of LNSPP and SLNSPP.
文摘This paper studies and analyses the character of the tree structure,and then presents an algorithm which is concise and convinent for the construction of tree structure.It is especially fit for the application system using database.The special storege organization needn’t to be established in the database using this algorithm.By SQL statement,the data dispersed in different storeage organization can be dynamically combined into the data set including two fields:father node field and child node field.Then the algorithm can process those data and display the tree structure rapidly. At last,we design a control called TFDTreeView which inherits from TTreeView control using this algorithm. TFDTreeView control provide a interface function,through which we can construct the tree structure convinently. On some occasions,this method will be good for the application system.And ,by building the control ,we can reuse it in many system development.