Design and Implementation of the Self-Management Travel System
|
|
|
- Dina Ross
- 10 years ago
- Views:
Transcription
1 Design and Implementation of the Self-Management Travel System Dongbei University of Finance and Economics School of Tourism and Hotel Management,Dalian, China Abstract Through skeleton system, rapid prototyping methods, the expansion of the knowledge base and reasoning mechanisms, this paper uses an object-oriented language development environment to design a small expert system applying to self-management of travel. Based on the existing network platform and combining with the actual situation of the electronic travel management, the system realizes the paperless office in order to improve office efficiency and quality of tourism management. Due to the existing network platform, the system uses asp.net + IIS + SQL Server 2005 as the development environment. It also makes full use of Microsoft Enterprise Library the third party mature plug to manage database resources in the development process, designs an optimal algorithm for database query and achieves system optimization which reduces the time of database query. 1.Introduction Keywords: Expert System, Travel Advisory, Mobile Computing With the development of the tourism industry, the tourism industry has become one of the pillar industries of the national economy in China. Each year thousands of people go on a trip, and they bring local income is not ignored, which is a lot of urban development tourism s reasons. In the era of rapid development of information technology and the Internet, travel information technology will greatly affect the process of information of the society as a whole. Information is the main pillar of the tourism business management activities [1], and also the basis of enterprise decision-making. Tourism enterprise is the user and information management of the beneficiaries; the current along with the unceasing development of information technology, tourism appears a network, balance the development trend of the words, thus increasing the tourism operators and managers of the complexity of the control. So tourism information management model research, become the focus of scholars analyses problems. Tourism information management mode is tourism enterprise in order to realize the corresponding information management goal. One can use repeatedly, and ensure the cost of a standardized system structure. Currently our country tourism has the small scale. The defects of the information construction are not perfect enough. So our country tourism should be actively for system reform, strengthen information construction, improve the efficiency of management of the tourism industry, and enhance the competitiveness of the tourism industry. All tourism enterprises are both users and the beneficiaries of information management. Expert System (ES)[2], as an important branch of artificial intelligence (AI)[3], is a computer system simulating the way of human experts to solve problems by analysis, judgment and reasoning according to the internal expert level knowledge. Expert system is an intelligent computer program system contains a large amount of some industry experts experience knowledge, through the human experts knowledge processing corresponding problems. In fact, a contains a large amount of professional knowledge and experience programming system, through the artificial intelligence technology and computer technology, according to some industry in one or more experts to provide knowledge and experience, and then carries on the analysis and judgment, solve the corresponding complicated problem. In some fields, it can establish and solve problems [4] at the expert level in human. Even exceed in some fields. Expert system is the most active, effective, rapid development and matures research field of artificial intelligence [5][6]. Many impressive results of artificial intelligence and expert systems research have been obtained in China in the eighties, and later have gone through a lot of detours and experienced a lot of frustration [7]. Recently, with the rapid development of computer and network communication technology, especially the massive popularity of the Internet and mobile communication devices, artificial intelligence and expert systems research active again [8]. Expert system in the tourism industry has also become the focus of many scholars. Journal of Convergence Information Technology(JCIT) Volume8, Number6,Mar 2013 doi: /jcit.vol8.issue6.24
2 2. The overall design of the system The experts of this system are the senior scholars in the field of tourism. Experts, based on the analysis of the structural elements of attractions tourists given, give advice and attractions judgment to determine the attractions they want to go, as detection model of judging criteria[9]. Knowledge engineer experts are responsible for system integration and analogy of the answers to the questions in order to find out the contradiction case and conceptual differences. Then correctly express the expert knowledge in the knowledge database of the computers for reasoning application. The knowledge engineers in our system are software designers. The user is known as the one who uses expert system. Before plan to travel, travel enthusiasts seek expert evaluation and recommended by expert systems where experts as consultants[10]. Tour assistances, such as the staff of the travel agency, use the expert system through mobile devices where as assistant. The workload calculation mainly includes five parts: travel guide, tour guide assignment, scenic introduced, costs introduction and personnel management. The tour guide assignment and costs introduction are calculated by the experimental project. The related modules functions are shown as Fig.1. Work load calculation Personal management Cost introduction Scenic introduction Guide assignment Travel guide Add Delete Query Export Calculate Audit 3. The realization of key technology Figure 1. Related module chart The data center of the tourism industry can be divided into five sub-systems, data acquisition system, data storage systems, data security system, disaster recovery & business continuity systems, and data mining & decision support system. 3.1.Data acquisition system It is the basic function of the data center and the foundation of normal operation to obtain the data required by the data center from other applications. The system import data of other system in the travel industry into data center with the help of interface and tool software. (1) Data of other travel industry is imported into data center by interface software, such as import the management data of Opera hotel into the data center. (2) The non-electronic information is imported into data center by electronic recognition system, such as input information of the China Tourism Yearbook into data center.
3 3.2. Data storage system The data storage system stores all the data in data center, and achieves data format specification The data storage system is the core of the entire data center, and all data resources in data center will be stored in the storage system. Storage system, the underlying support platform of the other subsystems, provides standardized data for specific business. Specific construction method is as follows (1)Information resource management platform manages standard specification such as classification and coding of structured information, index system results, the outcome of the data element, unstructured information classification and departments acquisition publishing duties specification. It through two enterprise service bus deployment provides a unified enterprise service integration platform to solve diverse problems of industry data exchange and interface, and provides a unified platform for enterprise and external data exchange. (2)It builds a uniform knowledge management platform, to realize classification, cataloging, unified retrieval of data sources dispersed in a variety of business systems and other industry, and realizes information collection, publishing process to achieve enterprise knowledge management, self-improvement and self-development. (3)The data storage system uses dynamic storage pool technology. According to storage capacity future required, dynamic storage pool technology allocates virtual disk capacity for application servers with no need to consider the actual capacity. When the physical storage capacity reaches a pre-set warning line, the system will give alarm and add new disk device to the storage pool, which called automatic expansion. 3.3.Data security system Figure2. Data storage system It is used to protect the data center from viruses and hackers, in order to build an information security system that treats security policy as a core and combines management, technology and operation and maintenance together. On the purpose of ensure the safety of data center and reliable operation, we realize a comprehensive range of protection for the data center of the tourism industry. The system provides advanced threat prevention that protects endpoints from targeted attacks and unknown attacks. It includes instantly available active protection technology and management control functions. Proactive technologies automatically analyze application behaviors and network communications to detect and block suspicious activities, while management control functions can deny specific device and application activities which is considered high risk for enterprises, even block specific actions based on the user's location.
4 Figure3. Data system model 3.4.Security system for disaster recovery & business continuity The system is used to improve the overall availability of the data center and provide disaster recovery services. It creates a travel industry data disaster recovery center, and provides disaster recovery services of tourism enterprise information systems. The establishment of a centralized data analysis application platform and data released displayed system realize unified management of publishing and data display and bring existing analysis applications systems in information system of the industry. It belongs to the decision-making level of the management of the tourism industry, and enhances the scientific, timeliness, effectiveness of management. Traditional disaster recovery system is directly built on each application server, installs backup software, set up disaster recovery strategy separately on each application server and remote backup to a disaster recovery center directly. When the business systems has less demanding on the performance of the application server and the network has not much pressure, traditional disaster recovery backup system could meet the requirement. However, with the expansion of business systems and increase in concurrent access of the user terminal, the manage stress of application systems, performance pressure of application server and pressure on the network are also grown, at this time the traditional distributed disaster recovery system will seriously influence the performance of application server and network. Traditional system of the overall structure described in figure 4. Figure4. Traditional disaster recovery system of the overall structure The program uses the integrated disaster recovery system, the platform adds a layer of performance & security guarantee on the traditional disaster recovery system, that is to add a local data backup & disaster recovery system, which greatly improve the performance and safety of the overall system. The system adds a disaster recovery server in the same city disaster recovery site, then through backup software of data remote disaster recovery to synchronously replicate data in local backup
5 disaster recovery server to the city disaster recovery server. This process is conducted between local disaster recovery server and the city disaster recovery center server which does not affect the running of the business system. Through the establishment of the alternate application system of the city disaster recovery site, the system takes over the production center for business services when the local production center suffer from the disaster, to avoid catastrophe losses, ensure the operation of business system as much as possible, and achieve application-level disaster recovery. After the disaster of local production center, data of city disaster recovery center can be copied back via network, thereby restoring the business system of local production center. During the copy process the operations of disaster recovery center will not be interrupted. The system adds a disaster recovery server in the offsite disaster recovery site, then through backup software of data remote disaster recovery to asynchronously replicate data in local backup disaster recovery server to the offsite disaster recovery server. This process is conducted between local disaster recovery server and the offset disaster recovery center server which does not affect the running of the business system. When local production center needs data restoring, data of offset disaster recovery center can be copied back via network, thereby restoring the business system of local production center. In order to enhance the data security of offsite backup, offsite backup system build CDP (continuous data protection) data snapshot as the data backup of history version. CDP (continuous data protection) snapshot data can provides data analysis and verification services at any time, without interfering with the operation of the business system and affecting the original data. Off-site data backup adopts asynchronous mode, backup data maintain on local, and remote backup only when the network is idle, in order to reduce the pressure on network. Traditional disaster recovery system is directly built on each application server, installs backup software, set up disaster recovery strategy separately on each application server and remote backup to a disaster recovery center directly. 3.5.Data mining and decision support system The system achieves the extraction and reuse of specification data of the data center. Data Mining is a process to extract implicit but potentially useful information and knowledge people do not know from a large number of incomplete, noises, fuzzy and random data. With the rapid development of information technology, the amount of data accumulated by people grows rapidly. How to extract useful knowledge from massive data becomes a top priority. Responsive to the need, data mining come into being developed which is the key step of the Knowledge Discovery in Database. Data mining capabilities of the data center in the tourism industry is the summary, statistics and analysis of variety specified information for users. The system establishes a central database using index system as the core, according to the content in basic indicators that teased out by the information resource planning, extracts, transforms, and loads data from various business systems in the industry to the specification database of the data center Logical structure, data mining is shown in FIG. 5:
6 Figure 5. logic chart data mining 3.6. The optimization techniques of the database SGA (System Global Area) is the workspace of the database, combining Oracle processes to form an Oracle database instance which used to manage database data and answer users' requests. SGA has three components: the database cache, shared pool area and log buffer. The memory area is configured by the corresponding parameters in the initialization file initsid.ora, the performance efficiency of which also is affected by the various parameters in initsid.ora. Connect to the database as the DBA, SGA settings information is got by executing the following statement: SQL>select * from v$sga. 1) Optimization of the data buffer When the user reading data, the server process first removes data from the data file storage on the disk, then stores the data in the data buffer from which back to the user. The process shows that the size of the data buffer has a direct impact on the access speed of the database. If the data buffer is too small, it will result in frequent reading disk file when there are lots of users and slow database running, which would impact the use of the application. Whether the data buffer has been configured reasonably can be determined by hit rate. The data buffer hit rate can better reflect the database performance. The detail calculation is shown as follow: SQL>select (1 - (sum(decode(name, 'physical reads', value, 0)) / (sum(decode(name, 'db block gets', value, 0)) + sum(decode(name, 'consistent gets', value, 0))))) * 100 "Hit Ratio" from v$sysstat; Hit Ratio is equal to which represents the proportions of the number of times request a block of data and the number of times provided by an Oracle database buffer. If the Hit ratio is lower than 98%, the data buffer should be increased whose size is decided by parameter db_block_size. The initial size of Oracle is 2KB. Suppose that there is a database whose with a size of 40KB, it needs 20 times I/O for 2KB database to complete the read process while only 5 times for 8KB database. Therefore, the more the buffer blocks in high-speed buffer area, the more possible for Oracle to find the same data and the more rapid the query speed. 2)Optimization of the shared pool Shared pool includes the library cache and data dictionary cache. Hit rate is the indicators to measure the performance of the two buffers. Shared pool is managed by LRU algorithm to ensure code and data dictionary used frequently can be stored in the shared pool. The query of data dictionary Hit rate: SQL>select (1 - (sum (get misses) / sum (gets))) * 100 "Hit Ratio" from v$rowcache; Query result is The query of Library cache hit rate: SQL>select sum(pins) / (sum(pins) + sum(reloads)) * 100 "Hit Ratio" from v$libraycache; The Hit Ratio is If the library cache of shared pool and hit ratio of data dictionary are lower than 95%, the value of share size in initsid.ora should be increased.
7 4. Experimental analysis In order to validate this paper analyzes independent travel information management system effectiveness, through the simulation results verify the performance of the system in this paper height, simulation operation of the environment is: Windows operating system, PC P4 T g, 4 gram, Inte182865G graphics, MATLAB6.0. Through the experimental analysis this paper design of independent travel information management system management efficiency and error rate, and then analyzes the performance of the system in this paper. The results of detailed respectively with figure 6 and figure 7 description: Figure 6.this paper system management efficiency Figure 7. this paper system management error rate Comprehensive analysis chart 6 and figure 7, the paper presents the design of independent travel management system to keep the efficiency of between 94% and 97%, management error rate keep between 2% and 4.6%, reached higher level. Finally shows that the design of the independent tourism management system performance is higher, can quickly and accurately deal with related issues, has made the satisfactory effect, and it has high application value. 5.Conclusions The travel expert intelligent system is an inevitable choice for the development of the information technology in tourism industry, a must for realization of Information Resources Integration in tourism industry, fully shared, effective use, and tapping the value of information resources, and a necessary tools to improve the scientific & efficiency of the decision-making management, innovation management, and the quality of decision management. Therefore, the construction of the data center of the tourism industry is the requirements of the times, the needs of the industry reform & development
8 and the inevitable process in the development of the tourism industry construction. 6. Acknowledgment This research is funded by the planning project (12TABG013) of China National Tourism Administration. 7.Reference [1] Xia Li, Juan Chen, "Research on Knowledge Acquisition and Reasoning Mechanism of Pathologic Diagnosis Expert System", JCIT, Vol. 7, No. 20, pp. 550 ~ 556, 2012 [2] WANG Jiancong, "The study on The Expert System Used for E-commerce Reputation Evaluation", JDCTA, Vol. 6, No. 22, pp. 188 ~ 194, 2012 [3] ZHANG Jingzong, "Research of Surveying and Mapping Based on Adaptive Fuzzy Neural Network and Expert System", JCIT, Vol. 7, No. 23, pp. 115 ~ 122, 2012 [4] Sang-Woong Lee, Jeong-Seon Park, "Microscopic Image Recognition-based Fish Disease Diagnosis System", JCIT, Vol. 6, No. 10, pp. 355 ~ 364, 2011 [5] LIU Jinye, GU Lize, LUO Shoushan, "An Anonymous Authentication Scheme for Mobile Communication Based on Third-Party", IJACT, Vol. 4, No. 16, pp. 45 ~ 54, 2012 [6] Peng Lu, Dongdai Zhou, Xiao Cong, Shanshan Qin, Shaochun Zhong, "Design and Implementation of Computerized Adaptive Testing System for Multi-Terminals", JDCTA, Vol. 6, No. 18, pp. 401 ~ 410, 2012 [7] He Ke, Chen Xue, "A Bandwidth Allocation Algorithm for Video Distributions in Vehicular Networks", IJACT, Vol. 4, No. 3, pp. 26 ~ 33, 2012 [8] Steven K.C. Lo, "A Cooperative Multi-Agent Environment for Mobile Peer-to-Peer Security System", JCIT, Vol. 6, No. 9, pp. 285 ~ 295, 2011 [9] Chen Ling, Ming Chen, Wenjun Zhang, Feng Tian, "AR Cloudlets for Mobile Computing", JDCTA, Vol. 5, No. 12, pp. 162 ~ 169, 2011 [10] Xu Wu, "A Stable Group-based Trust Management Scheme for Mobile P2P Networks", JDCTA, Vol. 5, No. 2, pp. 116 ~ 125, 2011
Design of Electronic Medical Record System Based on Cloud Computing Technology
TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou
3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University
UPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
Big Data Storage Architecture Design in Cloud Computing
Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,
Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system
HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b
Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion
Construction of Library Management Information System
Construction of Library Management Information System Lian-feng Zhang, Rui-jin Zhou, Li-ping Sui, and Guo-qing Wu Henan Institute of Science and Technology Xin-xiang, China [email protected] Abstract. Library
Design and Implementation of Production Management Information System for Jiujiang Railway Track Depot
Management Information System for Jiujiang Railway Track Depot 1 Information Technology Center Jiujiang University Jiujiang, Jiangxi, 332005, China E-mail: [email protected] Upon analyzing the actual situation
On Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM
Computer Modelling and New Technologies, 2011, Vol.15, No.4, 41 45 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM N.
Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4
5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016) Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang
Design of Data Archive in Virtual Test Architecture
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Design of Data Archive in Virtual Test Architecture Lian-Lei
Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *
Send Orders for Reprints to [email protected] 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network
In-memory databases and innovations in Business Intelligence
Database Systems Journal vol. VI, no. 1/2015 59 In-memory databases and innovations in Business Intelligence Ruxandra BĂBEANU, Marian CIOBANU University of Economic Studies, Bucharest, Romania [email protected],
Cloud Security - Characteristics, Advantages and Disadvantages
The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,
Secospace elog. Secospace elog
Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page
Optimization of Distributed Crawler under Hadoop
MATEC Web of Conferences 22, 0202 9 ( 2015) DOI: 10.1051/ matecconf/ 2015220202 9 C Owned by the authors, published by EDP Sciences, 2015 Optimization of Distributed Crawler under Hadoop Xiaochen Zhang*
PERSONALIZED WEB MAP CUSTOMIZED SERVICE
CO-436 PERSONALIZED WEB MAP CUSTOMIZED SERVICE CHEN Y.(1), WU Z.(1), YE H.(2) (1) Zhengzhou Institute of Surveying and Mapping, ZHENGZHOU, CHINA ; (2) North China Institute of Water Conservancy and Hydroelectric
Data Migration In Heterogeneous Databases (ETL)
Data Migration In Heterogeneous Databases (ETL) Tribhuvan Shweta M. 1, Rasane Pratiksha V. 2, Prof. M. R. Bendre 3 Abstract Development of economic systems presents rapid growth trend and requires establishing
Study Plan for the Bachelor Degree in Computer Information Systems
Study Plan for the Bachelor Degree in Computer Information Systems The Bachelor Degree in Computer Information Systems/Faculty of Information Technology and Computer Sciences is granted upon the completion
A Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
B.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing
www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology
Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract
Technical Note Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note provides information on the Dell PowerVault storage solutions, based on the Microsoft
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA)
One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA) Wei Chen, Jin-cheng Zhang, and Yu-quan Jiang Nanjing Audit University, Nanjing, Jiangsu 210029, China [email protected]
The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications
AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA
AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. [email protected] Ms. Smita Dange Lecturer,
The Construction of Seismic and Geological Studies' Cloud Platform Using Desktop Cloud Visualization Technology
Send Orders for Reprints to [email protected] 1582 The Open Cybernetics & Systemics Journal, 2015, 9, 1582-1586 Open Access The Construction of Seismic and Geological Studies' Cloud Platform Using
Administration Guide NetIQ Privileged Account Manager 3.0.1
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
Discussion on Airport Business Intelligence System Architecture
Discussion on Airport Business Intelligence System Architecture WANG Jian-bo FAN Chong-jun FU Hui-gang Business School University of Shanghai for Science and Technology Shanghai 200093, P. R. China Abstract
Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing
NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality
NETAPP TECHNICAL REPORT NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality Abhinav Joshi, NetApp Chaffie McKenna, NetApp August 2008 TR-3701 Version 1.0
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
Design of the Database of Library Information
Design of the Database of Library Information XueLian Feng and HaiYan Liu Baotou railway vocational technical college,baotou,inner Mongolia, 014040,China [email protected], [email protected]
Explain how to prepare the hardware and other resources necessary to install SQL Server. Install SQL Server. Manage and configure SQL Server.
Course 6231A: Maintaining a Microsoft SQL Server 2008 Database About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge
AnyBackup Family. Product Overview
Overview of EISOO AnyBackup Appliance AnyBackup Family Adhering to the idea of "All-in-One Protection", EISOO creatively released AnyBackup Family which covers series of hardware and software products
The Application and Development of Software Testing in Cloud Computing Environment
2012 International Conference on Computer Science and Service System The Application and Development of Software Testing in Cloud Computing Environment Peng Zhenlong Ou Yang Zhonghui School of Business
The Research in Remote and Real-time Monitoring System of Digitized Earthquake Omen Instrument
2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010) IPCSIT vol. 53 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V53.No.1.13 The Research in Remote and
Figure 1: Architecture of a cloud services model for a digital education resource management system.
World Transactions on Engineering and Technology Education Vol.13, No.3, 2015 2015 WIETE Cloud service model for the management and sharing of massive amounts of digital education resources Binwen Huang
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
Microsoft SQL Database Administrator Certification
Microsoft SQL Database Administrator Certification Training for Exam 70-432 Course Modules and Objectives www.sqlsteps.com 2009 ViSteps Pty Ltd, SQLSteps Division 2 Table of Contents Module #1 Prerequisites
Available online at www.sciencedirect.com Available online at www.sciencedirect.com
Available online at www.sciencedirect.com Available online at www.sciencedirect.com Physics Physics Procedia Procedia 00 (2011) 24 (2012) 000 000 2293 2297 Physics Procedia www.elsevier.com/locate/procedia
Maintaining a Microsoft SQL Server 2008 Database
Maintaining a Microsoft SQL Server 2008 Database Course 6231A: Five days; Instructor-Led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students
ORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
Operation and Maintenance Management Strategy of Cloud Computing Data Center
, pp.5-9 http://dx.doi.org/10.14257/astl.2014.78.02 Operation and Maintenance Management Strategy of Cloud Computing Data Center Wei Bai 1, Wenli Geng 1 1 Computer and information engineering institute
MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:
MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining
Features of AnyShare
of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Oracle 11g Database Administration
Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database
MOC 20467B: Designing Business Intelligence Solutions with Microsoft SQL Server 2012
MOC 20467B: Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Course Overview This course provides students with the knowledge and skills to design business intelligence solutions
Understanding Disk Storage in Tivoli Storage Manager
Understanding Disk Storage in Tivoli Storage Manager Dave Cannon Tivoli Storage Manager Architect Oxford University TSM Symposium September 2005 Disclaimer Unless otherwise noted, functions and behavior
ITPS AG. Aplication overview. DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System. SQL Informational Management System 1
ITPS AG DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System Aplication overview SQL Informational Management System 1 Contents 1 Introduction 3 Modules 3 Aplication Inventory 4 Backup Control
HUAWEI OceanStor Enterprise Storage System Success Cases
Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies
Capability Service Management System for Manufacturing Equipments in
Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
Optimal Planning Software Platform Development with Cloud Computing Technology
Optimal Planning Software Platform Development with Cloud Computing Technology Anton Shabaev, Vladimir Kuznetsov, Dmitry Kositsyn Petrozavodsk State University (PetrSU) Petrozavodsk, Russia {ashabaev,
Cloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
Original-page small file oriented EXT3 file storage system
Original-page small file oriented EXT3 file storage system Zhang Weizhe, Hui He, Zhang Qizhen School of Computer Science and Technology, Harbin Institute of Technology, Harbin E-mail: [email protected]
Microsoft SQL Server Always On Technologies
Microsoft SQL Server Always On Technologies Hitachi Data Systems Contributes Always On Storage Solutions A Partner Solutions White Paper By Rick Andersen and Simon Pengelly December 2006 Executive Summary
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
Eloquence Training What s new in Eloquence B.08.00
Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium
Course 5431: Getting Started with Microsoft Office PowerPoint 2007. Course 5420: Editing and Proofreading Documents in Microsoft Office Word 2007
This level of training is designed to help you make the most of your first steps into computing. They cover a basic introduction to a range of Microsoft products such as Word, Power Point and Excel. Course
Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 621-625. Research Article
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 621-625 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis on the problems and countermeasures for
SOLUTIONS INC. BACK-IT UP. Online Backup Solution
SOLUTIONS INC. Online Backup Solution Data loss is a nightmare Your data is growing exponentially 1MB of data is worth US$10,000 If you find yourself now in a situation where you have to deal with an explosion
Administering the Web Server (IIS) Role of Windows Server
Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course
Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.
DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows
Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days
On-line Payment and Security of E-commerce
ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,
Study on Redundant Strategies in Peer to Peer Cloud Storage Systems
Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang
Study on Cloud Service Mode of Agricultural Information Institutions
Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud
VERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
SQL Server 2014 New Features/In- Memory Store. Juergen Thomas Microsoft Corporation
SQL Server 2014 New Features/In- Memory Store Juergen Thomas Microsoft Corporation AGENDA 1. SQL Server 2014 what and when 2. SQL Server 2014 In-Memory 3. SQL Server 2014 in IaaS scenarios 2 SQL Server
A Design and Implementation of a Web Server Log File Analyzer
A Design and Implementation of a Web Server Log File Analyzer Yu-Hsin Cheng 1, Chien-Hung Huang 2 1 Department of Information Management, Ling Tung University No. 1, Ling tung Rd., Taichung, Taiwan 2 Department
Windows Geo-Clustering: SQL Server
Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering
Introduction. Part I: Finding Bottlenecks when Something s Wrong. Chapter 1: Performance Tuning 3
Wort ftoc.tex V3-12/17/2007 2:00pm Page ix Introduction xix Part I: Finding Bottlenecks when Something s Wrong Chapter 1: Performance Tuning 3 Art or Science? 3 The Science of Performance Tuning 4 The
A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster
, pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing
The Design of B2B E-commerce System Based on MVC Model and J2EE
MANAGEMENT SCIENCE AND ENGINEERING Vol. 4, No. 4, 2010, pp. 113-119 www.cscanada.org ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net The Design of B2B E-commerce System Based on MVC Model
Development of a Web-based Information Service Platform for Protected Crop Pests
Development of a Web-based Information Service Platform for Protected Crop Pests Chong Huang 1, Haiguang Wang 1 1 Department of Plant Pathology, China Agricultural University, Beijing, P. R. China 100193
Virtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms
Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November
Inmagic Content Server Standard and Enterprise Configurations Technical Guidelines
Inmagic Content Server v1.3 Technical Guidelines 6/2005 Page 1 of 15 Inmagic Content Server Standard and Enterprise Configurations Technical Guidelines Last Updated: June, 2005 Inmagic, Inc. All rights
Large-Scale Data Sets Clustering Based on MapReduce and Hadoop
Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE
Ultimate Server Client Software
Ultimate Server Client Software GPRS NET Data Logger Ul mate Server is dedicatedly developed for high volume data applica on. 1. Receive data from Data Loggers in UDP or TCP via GPRS, Ethernet and SMS
Infortrend EonNAS 3000 and 5000: Key System Features
Infortrend EonNAS 3000 and 5000: Key System Features White paper Abstract This document introduces Infortrend s EonNAS 3000 and 5000 systems and analyzes key features available on these systems. Table
Random forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
