首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 265 毫秒
1.
Workflow management systems are widely used in improving the efficiency of business processes.To develop a workflow management system is the key to workflow modeling.In this paper,the compositional time net is presented to model workflow processes on the basis of the analyzing methods of time Petri nets and workflows,and to describe the static relationships and the dynamic semantics of the task of multiple workflow composition.The paper puts more emphasis on checking the soundness of composed workflow,at the same time,combinational problems of non-conditional structure of the compositional time net are introduced and analyzed.A sufficient and necessary condition for determining the soundness of compositional nets is obtained.  相似文献   

2.
The alignment between information systems (IS) and business strategy along with its implications for perceived IS effectiveness and business performance is an important question, which is rarely studied in China. Based on an empirical study, this paper summarized the significance of IS strategic alignment and its impact on business performance. This study also measured business strategy, information system strategy, and information system strategic alignment, built a conceptual model to describe the relationship between these factors, and investigated their implications for information system performance and business performance. A structural equation model was employed to test the conceptual model. Analyses of data gathered in a survey indicate that information system strategic alignment is a better predictor of business performance than business strategy or information system strategy alone, although business strategy can significantly influence business performance.  相似文献   

3.
The reform for Chinese state-owned enterprises (SOEs) during the past twenty years selected several ways which couldn't solve essential problems and improve the performance of the SOEs in China. The reason is that traditional ownership institution wasn't changed at all, the institution reach an impasse in market system which resulted in the fact that SOEs couldn't get used to keen competition. This paper analyses an ownership restructuring case in which an executive holds major capital stock in a state textile institute restructured and therefore the state ownership was withdrawn from it completely, it expounds the rationality of the model selected and points out that the model is currently a very effective way by which M & S SOEs would withdraw from competitive business field successfully.  相似文献   

4.
The necessity of the main cable anticorrosion for suspension bridge is described, and operating principles and composition of main cable dehumidification system are analyzed. An idea using the waste heat of high temperature outlet air of dehumidification system to heat up regeneration air of rotary-type dehumidifier is put forward in this paper. The concrete scheme is to install a heat exchanger on air-out pipeline of roots blower and air-in pipeline of regeneration electric heater of rotary dehumidifier. Air preheated by the heat exchanger enters regeneration electric heater of rotary-type dehumidifier. Energy conservation of main cable dehumidification system for the Yangtze River highway bridge is calculated, and the results show that energy conservation rate can reach 44 %.  相似文献   

5.
Smooth communication is essential for the success of construction projects. As an easy-to-use, context-rich, and high-capacity communication tool, blogging is gaining popularity in construction industry. In this paper, the features of blogging technology and how it could benefit construction organizations are presented. To further improve the effectiveness of blogging technology in information and knowledge sharing, an ontology-based semantic blogging system is proposed. Semantic blogging is an extension of conventional blogging and ontology is the key enabling technology for it. Domain-ontology-based semantic blogging site is composed of a network of concepts, which are clearly defined and interlinked according to their context and bound to certain behaviors. This paper reports how the e-Cognos ontology was implemented into a blogging system and how the system functions to process its contents. The paper concludes that using on-tology-based semantic blogging site can greatly enhance information sharing between construction professionals and it is a very promising tool for construction communities to publish and share their experience.  相似文献   

6.
WebGIS is the result of combining the technology of Internet with that of Geographic Information Systems (GIS). This paper aims at some problems in the development of GIS. such as the system of development is instable, and presents the method of adopting component technology to accomplish WebGIS middleware which has been successfully applied to the Oil Production Engineering information visible system. It showed in practice that the WebGIS middleware can be easily embedded in the web pages to accomplish GIS application system in a network environment. On the one band. its application can reduce complexity of system and speed up the pace of development. On the other hand. it is certain to reduce the development costs and improve the main tainability.  相似文献   

7.
The focus of this paper is to build the damage identify system, which performs “system identification“ to detcct the positions and extents of structural damages. The identification of structural damage can be characterized as a nonlinear process which linear prediction models such as linear regression are not suitable. However. neural network techniques may provide an effective tool for system identification. The method of damage identification using the radial basis function neural network (P, BFNN) is presented in this paper. Using this method, a simple reinforced concrete structure has been tested both in the absence and presence of noise. The resuits show that the RBFNN identification technology can he used with related success for the solution of dynamic damage identification problems, even in the presence of a noisy identify data. Furthermore, a remote identification system based on that is set up with Java Technologies.  相似文献   

8.
This paper proposes a new thermodynamic hypothesis that states that a nonlinear natural system that is not isolated and involves positive feedbacks tends to minimize its resistance to the flow process through it that is imposed by its environment. We demonstrate that the hypothesis is consistent with flow behavior in saturated and unsaturated porous media, river basins, and the Earth-atmosphere system. While optimization for flow processes has been previously discussed by a number of researchers in the literature, the unique contribution of this work is to indicate that only the driving process is subject to opti-mality when multiple flow processes are simultaneously involved in a system.  相似文献   

9.
The control of nuclear fuel manipulator crane (MC) drive system is essential for its running and other systems are designed surrounding the drive system.This paper gives a brief introduction to the composition and function of MC,analyses its drive mode and control method and applies PLC to control its frequency transducer directly to help the motor work more stable.Based on the control requirements of bridge,trolley,Hoist,the control system of bridge applies a drive mode with 2-drag2 drive model on both sides and a multi-control method to realize simultaneous runningof two sides,1-drag-1 model on through-going axes and closed loop control method finish the precise location of trolley,and the using of 1-drag-1 model drive mode and closed loop control method solves the protect control difficulty of hoist which stops/starts repeatedly and changes speed.  相似文献   

10.
This paper presents a method for the generation of satisfied strange attractor images, which is based on the idea of Genetic Algorithm and is realized by adding a controller to a chaotic system.The principle of the method is introduced. Some problems which exist in genetic algorithm's parameter optimization are discussed in detail. Finally, the effectiveness of the method for finding pretty strange attractors is verified. It is helpful to pattern design and works of arts and crafts.  相似文献   

11.
12.
Growing numbers of users and many access policies that involve many different resource attributes in service-oriented environments cause various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes based on access policies for Web services, and proposes a general attribute based role-based access control(GARBAC) model. The model introduces the notions of single attribute expression, composite attribute expression, and composition permission, defines a set of elements and relations among its elements and makes a set of rules, assigns roles to user by inputing user's attributes values. The model is a general access control model, can support more granularity resource information and rich access control policies, also can be used to wider application for services. The paper also describes how to use the GARBAC model in Web services environments.  相似文献   

13.
In this paper, we designed a customer-centered data warehouse system with five subjects: listing, bidding, transaction, accounts, and customer contact based on the business process of online auction companies. For each subject, we analyzed its fact indexes and dimensions. Then take transaction subject as example, analyzed the data warehouse model in detail, and got the multi-dimensional analysis structure of transaction subject. At last, using data mining to do customer segmentation, we divided customers into four types: impulse customer, prudent customer, potential customer, and ordinary customer. By the result of multi-dimensional customer data analysis, online auction companies can do more target marketing and increase customer loyalty.  相似文献   

14.
The key problem of securing multieast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed (MPE) scheme is an approach which is based on Polynomial expansion (PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number (SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.  相似文献   

15.
敏捷信息系统体系结构的研究   总被引:4,自引:3,他引:4  
根据现代制造环境下业务流程重组和动态企业建模的需要 ,提出敏捷信息系统的体系结构 ,讨论了敏捷信息系统体系结构的概念、组成、构造原则和结构框架。该结构采用构件支持动态企业建模 ,实现了系统级的软件重用 ,通过建立管理任务平台实现 MIS应用系统和企业过程的分离 ,从而使信息系统支持复杂的动态企业过程。  相似文献   

16.
基于CBR的事故处理智能决策支持系统研究   总被引:1,自引:0,他引:1  
在人工智能和交通事故学的理论基础上,给出了基于CBR的交通事故处理决策支持系统的总体框架。从交通事故处理的过程出发,分析了系统设计应解决的现场草图快速绘制、肇事车速的确定以及在网络框架下的责任认定等主要问题,并阐述了系统采用基于CBR推理机制的原因及系统结构的各功能模块的开发,同时提出了对系统的案例库和知识库的建立方法,最后进行了实例论证。  相似文献   

17.
CA作为电子商务安全策略的重要组成部分,承担着验证电子商务网络交易中传递的信息以及各方身份的重任.我国的CA发展已具备一定规模,在实际应用中取得了一定成效,但是还存在着不少问题.文章通过对国内主要CA的介绍与分析,探讨了CA发展中的一些问题,并提出了解决的思路.  相似文献   

18.
Reflection mechanism for reuse software architecture (RMRSA) divides a software architecture into base-level architecture and meta-level architecture logically. Base-level architecture is the ordinary architecture; meta-level represents and manipulates the reusable meta-information of base-level architecture explicitly. Through reflection, the modification of meta-level architecture will result in the modification of the architecture in base-level. Then we can gain a new base-level architecture design. In this paper, we use π-calculus to define the constituents and their interaction processes of RMRSA, by these definition, we specify the business function in base-level at runtime, and illustrate the reflection mechanism between the base-level architecture and meta-level architecture.  相似文献   

19.
In order to support just-in-time reconfiguration of business process execution language (BPEL) process, a template-based mapping method is proposed to map business level process to BPEL process. The method builds up mapping relationships between the key points of business level process and BPEL process, which helps users to adjust the business level process with simplified operations, and automatically maps the changes to BPEL. In addition, a case of the application of the method in a clothing enterprise was illustrated.  相似文献   

20.
基于事例推理系统中事例相似度评估方法若干问题的探讨   总被引:5,自引:0,他引:5  
对基于事例外推理系统中事例相似度评估方法存在若干问题进行探讨,采用对事例匹配过程及几种匹配函数进行研究和分析的方法,认为当前常用的匹配函数在支持不良结构决策领域的CBR系统中并不十分有效,因此必须寻求一种有效的事例相似度评估方法来改善此类CBR系统的事例检索性能。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号