Design and Implementation of the Self-Management Travel System

Size: px
Start display at page:

Download "Design and Implementation of the Self-Management Travel System"

Transcription

1 Design and Implementation of the Self-Management Travel System Dongbei University of Finance and Economics School of Tourism and Hotel Management,Dalian, China Abstract Through skeleton system, rapid prototyping methods, the expansion of the knowledge base and reasoning mechanisms, this paper uses an object-oriented language development environment to design a small expert system applying to self-management of travel. Based on the existing network platform and combining with the actual situation of the electronic travel management, the system realizes the paperless office in order to improve office efficiency and quality of tourism management. Due to the existing network platform, the system uses asp.net + IIS + SQL Server 2005 as the development environment. It also makes full use of Microsoft Enterprise Library the third party mature plug to manage database resources in the development process, designs an optimal algorithm for database query and achieves system optimization which reduces the time of database query. 1.Introduction Keywords: Expert System, Travel Advisory, Mobile Computing With the development of the tourism industry, the tourism industry has become one of the pillar industries of the national economy in China. Each year thousands of people go on a trip, and they bring local income is not ignored, which is a lot of urban development tourism s reasons. In the era of rapid development of information technology and the Internet, travel information technology will greatly affect the process of information of the society as a whole. Information is the main pillar of the tourism business management activities [1], and also the basis of enterprise decision-making. Tourism enterprise is the user and information management of the beneficiaries; the current along with the unceasing development of information technology, tourism appears a network, balance the development trend of the words, thus increasing the tourism operators and managers of the complexity of the control. So tourism information management model research, become the focus of scholars analyses problems. Tourism information management mode is tourism enterprise in order to realize the corresponding information management goal. One can use repeatedly, and ensure the cost of a standardized system structure. Currently our country tourism has the small scale. The defects of the information construction are not perfect enough. So our country tourism should be actively for system reform, strengthen information construction, improve the efficiency of management of the tourism industry, and enhance the competitiveness of the tourism industry. All tourism enterprises are both users and the beneficiaries of information management. Expert System (ES)[2], as an important branch of artificial intelligence (AI)[3], is a computer system simulating the way of human experts to solve problems by analysis, judgment and reasoning according to the internal expert level knowledge. Expert system is an intelligent computer program system contains a large amount of some industry experts experience knowledge, through the human experts knowledge processing corresponding problems. In fact, a contains a large amount of professional knowledge and experience programming system, through the artificial intelligence technology and computer technology, according to some industry in one or more experts to provide knowledge and experience, and then carries on the analysis and judgment, solve the corresponding complicated problem. In some fields, it can establish and solve problems [4] at the expert level in human. Even exceed in some fields. Expert system is the most active, effective, rapid development and matures research field of artificial intelligence [5][6]. Many impressive results of artificial intelligence and expert systems research have been obtained in China in the eighties, and later have gone through a lot of detours and experienced a lot of frustration [7]. Recently, with the rapid development of computer and network communication technology, especially the massive popularity of the Internet and mobile communication devices, artificial intelligence and expert systems research active again [8]. Expert system in the tourism industry has also become the focus of many scholars. Journal of Convergence Information Technology(JCIT) Volume8, Number6,Mar 2013 doi: /jcit.vol8.issue6.24

2 2. The overall design of the system The experts of this system are the senior scholars in the field of tourism. Experts, based on the analysis of the structural elements of attractions tourists given, give advice and attractions judgment to determine the attractions they want to go, as detection model of judging criteria[9]. Knowledge engineer experts are responsible for system integration and analogy of the answers to the questions in order to find out the contradiction case and conceptual differences. Then correctly express the expert knowledge in the knowledge database of the computers for reasoning application. The knowledge engineers in our system are software designers. The user is known as the one who uses expert system. Before plan to travel, travel enthusiasts seek expert evaluation and recommended by expert systems where experts as consultants[10]. Tour assistances, such as the staff of the travel agency, use the expert system through mobile devices where as assistant. The workload calculation mainly includes five parts: travel guide, tour guide assignment, scenic introduced, costs introduction and personnel management. The tour guide assignment and costs introduction are calculated by the experimental project. The related modules functions are shown as Fig.1. Work load calculation Personal management Cost introduction Scenic introduction Guide assignment Travel guide Add Delete Query Export Calculate Audit 3. The realization of key technology Figure 1. Related module chart The data center of the tourism industry can be divided into five sub-systems, data acquisition system, data storage systems, data security system, disaster recovery & business continuity systems, and data mining & decision support system. 3.1.Data acquisition system It is the basic function of the data center and the foundation of normal operation to obtain the data required by the data center from other applications. The system import data of other system in the travel industry into data center with the help of interface and tool software. (1) Data of other travel industry is imported into data center by interface software, such as import the management data of Opera hotel into the data center. (2) The non-electronic information is imported into data center by electronic recognition system, such as input information of the China Tourism Yearbook into data center.

3 3.2. Data storage system The data storage system stores all the data in data center, and achieves data format specification The data storage system is the core of the entire data center, and all data resources in data center will be stored in the storage system. Storage system, the underlying support platform of the other subsystems, provides standardized data for specific business. Specific construction method is as follows (1)Information resource management platform manages standard specification such as classification and coding of structured information, index system results, the outcome of the data element, unstructured information classification and departments acquisition publishing duties specification. It through two enterprise service bus deployment provides a unified enterprise service integration platform to solve diverse problems of industry data exchange and interface, and provides a unified platform for enterprise and external data exchange. (2)It builds a uniform knowledge management platform, to realize classification, cataloging, unified retrieval of data sources dispersed in a variety of business systems and other industry, and realizes information collection, publishing process to achieve enterprise knowledge management, self-improvement and self-development. (3)The data storage system uses dynamic storage pool technology. According to storage capacity future required, dynamic storage pool technology allocates virtual disk capacity for application servers with no need to consider the actual capacity. When the physical storage capacity reaches a pre-set warning line, the system will give alarm and add new disk device to the storage pool, which called automatic expansion. 3.3.Data security system Figure2. Data storage system It is used to protect the data center from viruses and hackers, in order to build an information security system that treats security policy as a core and combines management, technology and operation and maintenance together. On the purpose of ensure the safety of data center and reliable operation, we realize a comprehensive range of protection for the data center of the tourism industry. The system provides advanced threat prevention that protects endpoints from targeted attacks and unknown attacks. It includes instantly available active protection technology and management control functions. Proactive technologies automatically analyze application behaviors and network communications to detect and block suspicious activities, while management control functions can deny specific device and application activities which is considered high risk for enterprises, even block specific actions based on the user's location.

4 Figure3. Data system model 3.4.Security system for disaster recovery & business continuity The system is used to improve the overall availability of the data center and provide disaster recovery services. It creates a travel industry data disaster recovery center, and provides disaster recovery services of tourism enterprise information systems. The establishment of a centralized data analysis application platform and data released displayed system realize unified management of publishing and data display and bring existing analysis applications systems in information system of the industry. It belongs to the decision-making level of the management of the tourism industry, and enhances the scientific, timeliness, effectiveness of management. Traditional disaster recovery system is directly built on each application server, installs backup software, set up disaster recovery strategy separately on each application server and remote backup to a disaster recovery center directly. When the business systems has less demanding on the performance of the application server and the network has not much pressure, traditional disaster recovery backup system could meet the requirement. However, with the expansion of business systems and increase in concurrent access of the user terminal, the manage stress of application systems, performance pressure of application server and pressure on the network are also grown, at this time the traditional distributed disaster recovery system will seriously influence the performance of application server and network. Traditional system of the overall structure described in figure 4. Figure4. Traditional disaster recovery system of the overall structure The program uses the integrated disaster recovery system, the platform adds a layer of performance & security guarantee on the traditional disaster recovery system, that is to add a local data backup & disaster recovery system, which greatly improve the performance and safety of the overall system. The system adds a disaster recovery server in the same city disaster recovery site, then through backup software of data remote disaster recovery to synchronously replicate data in local backup

5 disaster recovery server to the city disaster recovery server. This process is conducted between local disaster recovery server and the city disaster recovery center server which does not affect the running of the business system. Through the establishment of the alternate application system of the city disaster recovery site, the system takes over the production center for business services when the local production center suffer from the disaster, to avoid catastrophe losses, ensure the operation of business system as much as possible, and achieve application-level disaster recovery. After the disaster of local production center, data of city disaster recovery center can be copied back via network, thereby restoring the business system of local production center. During the copy process the operations of disaster recovery center will not be interrupted. The system adds a disaster recovery server in the offsite disaster recovery site, then through backup software of data remote disaster recovery to asynchronously replicate data in local backup disaster recovery server to the offsite disaster recovery server. This process is conducted between local disaster recovery server and the offset disaster recovery center server which does not affect the running of the business system. When local production center needs data restoring, data of offset disaster recovery center can be copied back via network, thereby restoring the business system of local production center. In order to enhance the data security of offsite backup, offsite backup system build CDP (continuous data protection) data snapshot as the data backup of history version. CDP (continuous data protection) snapshot data can provides data analysis and verification services at any time, without interfering with the operation of the business system and affecting the original data. Off-site data backup adopts asynchronous mode, backup data maintain on local, and remote backup only when the network is idle, in order to reduce the pressure on network. Traditional disaster recovery system is directly built on each application server, installs backup software, set up disaster recovery strategy separately on each application server and remote backup to a disaster recovery center directly. 3.5.Data mining and decision support system The system achieves the extraction and reuse of specification data of the data center. Data Mining is a process to extract implicit but potentially useful information and knowledge people do not know from a large number of incomplete, noises, fuzzy and random data. With the rapid development of information technology, the amount of data accumulated by people grows rapidly. How to extract useful knowledge from massive data becomes a top priority. Responsive to the need, data mining come into being developed which is the key step of the Knowledge Discovery in Database. Data mining capabilities of the data center in the tourism industry is the summary, statistics and analysis of variety specified information for users. The system establishes a central database using index system as the core, according to the content in basic indicators that teased out by the information resource planning, extracts, transforms, and loads data from various business systems in the industry to the specification database of the data center Logical structure, data mining is shown in FIG. 5:

6 Figure 5. logic chart data mining 3.6. The optimization techniques of the database SGA (System Global Area) is the workspace of the database, combining Oracle processes to form an Oracle database instance which used to manage database data and answer users' requests. SGA has three components: the database cache, shared pool area and log buffer. The memory area is configured by the corresponding parameters in the initialization file initsid.ora, the performance efficiency of which also is affected by the various parameters in initsid.ora. Connect to the database as the DBA, SGA settings information is got by executing the following statement: SQL>select * from v$sga. 1) Optimization of the data buffer When the user reading data, the server process first removes data from the data file storage on the disk, then stores the data in the data buffer from which back to the user. The process shows that the size of the data buffer has a direct impact on the access speed of the database. If the data buffer is too small, it will result in frequent reading disk file when there are lots of users and slow database running, which would impact the use of the application. Whether the data buffer has been configured reasonably can be determined by hit rate. The data buffer hit rate can better reflect the database performance. The detail calculation is shown as follow: SQL>select (1 - (sum(decode(name, 'physical reads', value, 0)) / (sum(decode(name, 'db block gets', value, 0)) + sum(decode(name, 'consistent gets', value, 0))))) * 100 "Hit Ratio" from v$sysstat; Hit Ratio is equal to which represents the proportions of the number of times request a block of data and the number of times provided by an Oracle database buffer. If the Hit ratio is lower than 98%, the data buffer should be increased whose size is decided by parameter db_block_size. The initial size of Oracle is 2KB. Suppose that there is a database whose with a size of 40KB, it needs 20 times I/O for 2KB database to complete the read process while only 5 times for 8KB database. Therefore, the more the buffer blocks in high-speed buffer area, the more possible for Oracle to find the same data and the more rapid the query speed. 2)Optimization of the shared pool Shared pool includes the library cache and data dictionary cache. Hit rate is the indicators to measure the performance of the two buffers. Shared pool is managed by LRU algorithm to ensure code and data dictionary used frequently can be stored in the shared pool. The query of data dictionary Hit rate: SQL>select (1 - (sum (get misses) / sum (gets))) * 100 "Hit Ratio" from v$rowcache; Query result is The query of Library cache hit rate: SQL>select sum(pins) / (sum(pins) + sum(reloads)) * 100 "Hit Ratio" from v$libraycache; The Hit Ratio is If the library cache of shared pool and hit ratio of data dictionary are lower than 95%, the value of share size in initsid.ora should be increased.

7 4. Experimental analysis In order to validate this paper analyzes independent travel information management system effectiveness, through the simulation results verify the performance of the system in this paper height, simulation operation of the environment is: Windows operating system, PC P4 T g, 4 gram, Inte182865G graphics, MATLAB6.0. Through the experimental analysis this paper design of independent travel information management system management efficiency and error rate, and then analyzes the performance of the system in this paper. The results of detailed respectively with figure 6 and figure 7 description: Figure 6.this paper system management efficiency Figure 7. this paper system management error rate Comprehensive analysis chart 6 and figure 7, the paper presents the design of independent travel management system to keep the efficiency of between 94% and 97%, management error rate keep between 2% and 4.6%, reached higher level. Finally shows that the design of the independent tourism management system performance is higher, can quickly and accurately deal with related issues, has made the satisfactory effect, and it has high application value. 5.Conclusions The travel expert intelligent system is an inevitable choice for the development of the information technology in tourism industry, a must for realization of Information Resources Integration in tourism industry, fully shared, effective use, and tapping the value of information resources, and a necessary tools to improve the scientific & efficiency of the decision-making management, innovation management, and the quality of decision management. Therefore, the construction of the data center of the tourism industry is the requirements of the times, the needs of the industry reform & development

8 and the inevitable process in the development of the tourism industry construction. 6. Acknowledgment This research is funded by the planning project (12TABG013) of China National Tourism Administration. 7.Reference [1] Xia Li, Juan Chen, "Research on Knowledge Acquisition and Reasoning Mechanism of Pathologic Diagnosis Expert System", JCIT, Vol. 7, No. 20, pp. 550 ~ 556, 2012 [2] WANG Jiancong, "The study on The Expert System Used for E-commerce Reputation Evaluation", JDCTA, Vol. 6, No. 22, pp. 188 ~ 194, 2012 [3] ZHANG Jingzong, "Research of Surveying and Mapping Based on Adaptive Fuzzy Neural Network and Expert System", JCIT, Vol. 7, No. 23, pp. 115 ~ 122, 2012 [4] Sang-Woong Lee, Jeong-Seon Park, "Microscopic Image Recognition-based Fish Disease Diagnosis System", JCIT, Vol. 6, No. 10, pp. 355 ~ 364, 2011 [5] LIU Jinye, GU Lize, LUO Shoushan, "An Anonymous Authentication Scheme for Mobile Communication Based on Third-Party", IJACT, Vol. 4, No. 16, pp. 45 ~ 54, 2012 [6] Peng Lu, Dongdai Zhou, Xiao Cong, Shanshan Qin, Shaochun Zhong, "Design and Implementation of Computerized Adaptive Testing System for Multi-Terminals", JDCTA, Vol. 6, No. 18, pp. 401 ~ 410, 2012 [7] He Ke, Chen Xue, "A Bandwidth Allocation Algorithm for Video Distributions in Vehicular Networks", IJACT, Vol. 4, No. 3, pp. 26 ~ 33, 2012 [8] Steven K.C. Lo, "A Cooperative Multi-Agent Environment for Mobile Peer-to-Peer Security System", JCIT, Vol. 6, No. 9, pp. 285 ~ 295, 2011 [9] Chen Ling, Ming Chen, Wenjun Zhang, Feng Tian, "AR Cloudlets for Mobile Computing", JDCTA, Vol. 5, No. 12, pp. 162 ~ 169, 2011 [10] Xu Wu, "A Stable Group-based Trust Management Scheme for Mobile P2P Networks", JDCTA, Vol. 5, No. 2, pp. 116 ~ 125, 2011

Design of Electronic Medical Record System Based on Cloud Computing Technology

Design of Electronic Medical Record System Based on Cloud Computing Technology TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.5, May 2014, pp. 4010 ~ 4017 DOI: http://dx.doi.org/10.11591/telkomnika.v12i5.4392 4010 Design of Electronic Medical Record System Based

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system

More information

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b

HIDS and NIDS Hybrid Intrusion Detection System Model Design Zhenqi Wang 1, a, Dankai Zhang 1,b Advanced Engineering Forum Online: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 991-994 doi:10.4028/www.scientific.net/aef.6-7.991 2012 Trans Tech Publications, Switzerland HIDS and NIDS Hybrid Intrusion

More information

Construction of Library Management Information System

Construction of Library Management Information System Construction of Library Management Information System Lian-feng Zhang, Rui-jin Zhou, Li-ping Sui, and Guo-qing Wu Henan Institute of Science and Technology Xin-xiang, China [email protected] Abstract. Library

More information

Design and Implementation of Production Management Information System for Jiujiang Railway Track Depot

Design and Implementation of Production Management Information System for Jiujiang Railway Track Depot Management Information System for Jiujiang Railway Track Depot 1 Information Technology Center Jiujiang University Jiujiang, Jiangxi, 332005, China E-mail: [email protected] Upon analyzing the actual situation

More information

On Cloud Computing Technology in the Construction of Digital Campus

On Cloud Computing Technology in the Construction of Digital Campus 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus

More information

ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM

ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM Computer Modelling and New Technologies, 2011, Vol.15, No.4, 41 45 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM N.

More information

Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4

Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4 5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016) Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang

More information

Design of Data Archive in Virtual Test Architecture

Design of Data Archive in Virtual Test Architecture Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Design of Data Archive in Virtual Test Architecture Lian-Lei

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to [email protected] 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

In-memory databases and innovations in Business Intelligence

In-memory databases and innovations in Business Intelligence Database Systems Journal vol. VI, no. 1/2015 59 In-memory databases and innovations in Business Intelligence Ruxandra BĂBEANU, Marian CIOBANU University of Economic Studies, Bucharest, Romania [email protected],

More information

Cloud Security - Characteristics, Advantages and Disadvantages

Cloud Security - Characteristics, Advantages and Disadvantages The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,

More information

Secospace elog. Secospace elog

Secospace elog. Secospace elog Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page

More information

Optimization of Distributed Crawler under Hadoop

Optimization of Distributed Crawler under Hadoop MATEC Web of Conferences 22, 0202 9 ( 2015) DOI: 10.1051/ matecconf/ 2015220202 9 C Owned by the authors, published by EDP Sciences, 2015 Optimization of Distributed Crawler under Hadoop Xiaochen Zhang*

More information

PERSONALIZED WEB MAP CUSTOMIZED SERVICE

PERSONALIZED WEB MAP CUSTOMIZED SERVICE CO-436 PERSONALIZED WEB MAP CUSTOMIZED SERVICE CHEN Y.(1), WU Z.(1), YE H.(2) (1) Zhengzhou Institute of Surveying and Mapping, ZHENGZHOU, CHINA ; (2) North China Institute of Water Conservancy and Hydroelectric

More information

Data Migration In Heterogeneous Databases (ETL)

Data Migration In Heterogeneous Databases (ETL) Data Migration In Heterogeneous Databases (ETL) Tribhuvan Shweta M. 1, Rasane Pratiksha V. 2, Prof. M. R. Bendre 3 Abstract Development of economic systems presents rapid growth trend and requires establishing

More information

Study Plan for the Bachelor Degree in Computer Information Systems

Study Plan for the Bachelor Degree in Computer Information Systems Study Plan for the Bachelor Degree in Computer Information Systems The Bachelor Degree in Computer Information Systems/Faculty of Information Technology and Computer Sciences is granted upon the completion

More information

A Scheme for Implementing Load Balancing of Web Server

A Scheme for Implementing Load Balancing of Web Server Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public

More information

B.Sc (Computer Science) Database Management Systems UNIT-V

B.Sc (Computer Science) Database Management Systems UNIT-V 1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used

More information

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing

Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing www.ijcsi.org 579 Research and realization of Resource Cloud Encapsulation in Cloud Manufacturing Zhang Ming 1, Hu Chunyang 2 1 Department of Teaching and Practicing, Guilin University of Electronic Technology

More information

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract

Technical Note. Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies. Abstract Technical Note Dell PowerVault Solutions for Microsoft SQL Server 2005 Always On Technologies Abstract This technical note provides information on the Dell PowerVault storage solutions, based on the Microsoft

More information

One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA)

One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA) One Continuous Auditing Practice in China: Data-oriented Online Auditing(DOOA) Wei Chen, Jin-cheng Zhang, and Yu-quan Jiang Nanjing Audit University, Nanjing, Jiangsu 210029, China [email protected]

More information

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications

More information

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA

AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA AN APPLICATION OF INFORMATION RETRIEVAL IN P2P NETWORKS USING SOCKETS AND METADATA Ms. M. Kiruthika Asst. Professor, Fr.C.R.I.T, Vashi, Navi Mumbai. [email protected] Ms. Smita Dange Lecturer,

More information

The Construction of Seismic and Geological Studies' Cloud Platform Using Desktop Cloud Visualization Technology

The Construction of Seismic and Geological Studies' Cloud Platform Using Desktop Cloud Visualization Technology Send Orders for Reprints to [email protected] 1582 The Open Cybernetics & Systemics Journal, 2015, 9, 1582-1586 Open Access The Construction of Seismic and Geological Studies' Cloud Platform Using

More information

Administration Guide NetIQ Privileged Account Manager 3.0.1

Administration Guide NetIQ Privileged Account Manager 3.0.1 Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use

More information

Discussion on Airport Business Intelligence System Architecture

Discussion on Airport Business Intelligence System Architecture Discussion on Airport Business Intelligence System Architecture WANG Jian-bo FAN Chong-jun FU Hui-gang Business School University of Shanghai for Science and Technology Shanghai 200093, P. R. China Abstract

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing

More information

NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality

NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality NETAPP TECHNICAL REPORT NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality Abhinav Joshi, NetApp Chaffie McKenna, NetApp August 2008 TR-3701 Version 1.0

More information

Method of Fault Detection in Cloud Computing Systems

Method of Fault Detection in Cloud Computing Systems , pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,

More information

Design of the Database of Library Information

Design of the Database of Library Information Design of the Database of Library Information XueLian Feng and HaiYan Liu Baotou railway vocational technical college,baotou,inner Mongolia, 014040,China [email protected], [email protected]

More information

Explain how to prepare the hardware and other resources necessary to install SQL Server. Install SQL Server. Manage and configure SQL Server.

Explain how to prepare the hardware and other resources necessary to install SQL Server. Install SQL Server. Manage and configure SQL Server. Course 6231A: Maintaining a Microsoft SQL Server 2008 Database About this Course Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge

More information

AnyBackup Family. Product Overview

AnyBackup Family. Product Overview Overview of EISOO AnyBackup Appliance AnyBackup Family Adhering to the idea of "All-in-One Protection", EISOO creatively released AnyBackup Family which covers series of hardware and software products

More information

The Application and Development of Software Testing in Cloud Computing Environment

The Application and Development of Software Testing in Cloud Computing Environment 2012 International Conference on Computer Science and Service System The Application and Development of Software Testing in Cloud Computing Environment Peng Zhenlong Ou Yang Zhonghui School of Business

More information

The Research in Remote and Real-time Monitoring System of Digitized Earthquake Omen Instrument

The Research in Remote and Real-time Monitoring System of Digitized Earthquake Omen Instrument 2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010) IPCSIT vol. 53 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V53.No.1.13 The Research in Remote and

More information

Figure 1: Architecture of a cloud services model for a digital education resource management system.

Figure 1: Architecture of a cloud services model for a digital education resource management system. World Transactions on Engineering and Technology Education Vol.13, No.3, 2015 2015 WIETE Cloud service model for the management and sharing of massive amounts of digital education resources Binwen Huang

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

Microsoft SQL Database Administrator Certification

Microsoft SQL Database Administrator Certification Microsoft SQL Database Administrator Certification Training for Exam 70-432 Course Modules and Objectives www.sqlsteps.com 2009 ViSteps Pty Ltd, SQLSteps Division 2 Table of Contents Module #1 Prerequisites

More information

Available online at www.sciencedirect.com Available online at www.sciencedirect.com

Available online at www.sciencedirect.com Available online at www.sciencedirect.com Available online at www.sciencedirect.com Available online at www.sciencedirect.com Physics Physics Procedia Procedia 00 (2011) 24 (2012) 000 000 2293 2297 Physics Procedia www.elsevier.com/locate/procedia

More information

Maintaining a Microsoft SQL Server 2008 Database

Maintaining a Microsoft SQL Server 2008 Database Maintaining a Microsoft SQL Server 2008 Database Course 6231A: Five days; Instructor-Led Introduction Elements of this syllabus are subject to change. This five-day instructor-led course provides students

More information

ORACLE DATABASE 10G ENTERPRISE EDITION

ORACLE DATABASE 10G ENTERPRISE EDITION ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.

More information

Operation and Maintenance Management Strategy of Cloud Computing Data Center

Operation and Maintenance Management Strategy of Cloud Computing Data Center , pp.5-9 http://dx.doi.org/10.14257/astl.2014.78.02 Operation and Maintenance Management Strategy of Cloud Computing Data Center Wei Bai 1, Wenli Geng 1 1 Computer and information engineering institute

More information

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003:

MCSE SYLLABUS. Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access to shared folders. Managing and Maintaining

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as

More information

Oracle 11g Database Administration

Oracle 11g Database Administration Oracle 11g Database Administration Part 1: Oracle 11g Administration Workshop I A. Exploring the Oracle Database Architecture 1. Oracle Database Architecture Overview 2. Interacting with an Oracle Database

More information

MOC 20467B: Designing Business Intelligence Solutions with Microsoft SQL Server 2012

MOC 20467B: Designing Business Intelligence Solutions with Microsoft SQL Server 2012 MOC 20467B: Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Course Overview This course provides students with the knowledge and skills to design business intelligence solutions

More information

Understanding Disk Storage in Tivoli Storage Manager

Understanding Disk Storage in Tivoli Storage Manager Understanding Disk Storage in Tivoli Storage Manager Dave Cannon Tivoli Storage Manager Architect Oxford University TSM Symposium September 2005 Disclaimer Unless otherwise noted, functions and behavior

More information

ITPS AG. Aplication overview. DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System. SQL Informational Management System 1

ITPS AG. Aplication overview. DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System. SQL Informational Management System 1 ITPS AG DIGITAL RESEARCH & DEVELOPMENT SQL Informational Management System Aplication overview SQL Informational Management System 1 Contents 1 Introduction 3 Modules 3 Aplication Inventory 4 Backup Control

More information

HUAWEI OceanStor Enterprise Storage System Success Cases

HUAWEI OceanStor Enterprise Storage System Success Cases Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies

More information

Capability Service Management System for Manufacturing Equipments in

Capability Service Management System for Manufacturing Equipments in Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Optimal Planning Software Platform Development with Cloud Computing Technology

Optimal Planning Software Platform Development with Cloud Computing Technology Optimal Planning Software Platform Development with Cloud Computing Technology Anton Shabaev, Vladimir Kuznetsov, Dmitry Kositsyn Petrozavodsk State University (PetrSU) Petrozavodsk, Russia {ashabaev,

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Original-page small file oriented EXT3 file storage system

Original-page small file oriented EXT3 file storage system Original-page small file oriented EXT3 file storage system Zhang Weizhe, Hui He, Zhang Qizhen School of Computer Science and Technology, Harbin Institute of Technology, Harbin E-mail: [email protected]

More information

Microsoft SQL Server Always On Technologies

Microsoft SQL Server Always On Technologies Microsoft SQL Server Always On Technologies Hitachi Data Systems Contributes Always On Storage Solutions A Partner Solutions White Paper By Rick Andersen and Simon Pengelly December 2006 Executive Summary

More information

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf

More information

Eloquence Training What s new in Eloquence B.08.00

Eloquence Training What s new in Eloquence B.08.00 Eloquence Training What s new in Eloquence B.08.00 2010 Marxmeier Software AG Rev:100727 Overview Released December 2008 Supported until November 2013 Supports 32-bit and 64-bit platforms HP-UX Itanium

More information

Course 5431: Getting Started with Microsoft Office PowerPoint 2007. Course 5420: Editing and Proofreading Documents in Microsoft Office Word 2007

Course 5431: Getting Started with Microsoft Office PowerPoint 2007. Course 5420: Editing and Proofreading Documents in Microsoft Office Word 2007 This level of training is designed to help you make the most of your first steps into computing. They cover a basic introduction to a range of Microsoft products such as Word, Power Point and Excel. Course

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 621-625. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 621-625. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 621-625 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis on the problems and countermeasures for

More information

SOLUTIONS INC. BACK-IT UP. Online Backup Solution

SOLUTIONS INC. BACK-IT UP. Online Backup Solution SOLUTIONS INC. Online Backup Solution Data loss is a nightmare Your data is growing exponentially 1MB of data is worth US$10,000 If you find yourself now in a situation where you have to deal with an explosion

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972B: Administering the Web Server (IIS) Role of Windows Server Page 1 of 7 Administering the Web Server (IIS) Role of Windows Server Course 10972B: 4 days; Instructor-Led Introduction This course

More information

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system.

Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows operating system. DBA Fundamentals COURSE CODE: COURSE TITLE: AUDIENCE: SQSDBA SQL Server 2008/2008 R2 DBA Fundamentals Would-be system and database administrators. PREREQUISITES: At least 6 months experience with a Windows

More information

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Administering the Web Server (IIS) Role of Windows Server 10972B; 5 Days

More information

On-line Payment and Security of E-commerce

On-line Payment and Security of E-commerce ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,

More information

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang

More information

Study on Cloud Service Mode of Agricultural Information Institutions

Study on Cloud Service Mode of Agricultural Information Institutions Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud

More information

VERITAS Business Solutions. for DB2

VERITAS Business Solutions. for DB2 VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................

More information

SQL Server 2014 New Features/In- Memory Store. Juergen Thomas Microsoft Corporation

SQL Server 2014 New Features/In- Memory Store. Juergen Thomas Microsoft Corporation SQL Server 2014 New Features/In- Memory Store Juergen Thomas Microsoft Corporation AGENDA 1. SQL Server 2014 what and when 2. SQL Server 2014 In-Memory 3. SQL Server 2014 in IaaS scenarios 2 SQL Server

More information

A Design and Implementation of a Web Server Log File Analyzer

A Design and Implementation of a Web Server Log File Analyzer A Design and Implementation of a Web Server Log File Analyzer Yu-Hsin Cheng 1, Chien-Hung Huang 2 1 Department of Information Management, Ling Tung University No. 1, Ling tung Rd., Taichung, Taiwan 2 Department

More information

Windows Geo-Clustering: SQL Server

Windows Geo-Clustering: SQL Server Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering

More information

Introduction. Part I: Finding Bottlenecks when Something s Wrong. Chapter 1: Performance Tuning 3

Introduction. Part I: Finding Bottlenecks when Something s Wrong. Chapter 1: Performance Tuning 3 Wort ftoc.tex V3-12/17/2007 2:00pm Page ix Introduction xix Part I: Finding Bottlenecks when Something s Wrong Chapter 1: Performance Tuning 3 Art or Science? 3 The Science of Performance Tuning 4 The

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

The Design of B2B E-commerce System Based on MVC Model and J2EE

The Design of B2B E-commerce System Based on MVC Model and J2EE MANAGEMENT SCIENCE AND ENGINEERING Vol. 4, No. 4, 2010, pp. 113-119 www.cscanada.org ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net The Design of B2B E-commerce System Based on MVC Model

More information

Development of a Web-based Information Service Platform for Protected Crop Pests

Development of a Web-based Information Service Platform for Protected Crop Pests Development of a Web-based Information Service Platform for Protected Crop Pests Chong Huang 1, Haiguang Wang 1 1 Department of Plant Pathology, China Agricultural University, Beijing, P. R. China 100193

More information

Virtual Infrastructure Security

Virtual Infrastructure Security Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both

More information

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November

More information

Inmagic Content Server Standard and Enterprise Configurations Technical Guidelines

Inmagic Content Server Standard and Enterprise Configurations Technical Guidelines Inmagic Content Server v1.3 Technical Guidelines 6/2005 Page 1 of 15 Inmagic Content Server Standard and Enterprise Configurations Technical Guidelines Last Updated: June, 2005 Inmagic, Inc. All rights

More information

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop

Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Journal of Computational Information Systems 7: 16 (2011) 5956-5963 Available at http://www.jofcis.com Large-Scale Data Sets Clustering Based on MapReduce and Hadoop Ping ZHOU, Jingsheng LEI, Wenjun YE

More information

Ultimate Server Client Software

Ultimate Server Client Software Ultimate Server Client Software GPRS NET Data Logger Ul mate Server is dedicatedly developed for high volume data applica on. 1. Receive data from Data Loggers in UDP or TCP via GPRS, Ethernet and SMS

More information

Infortrend EonNAS 3000 and 5000: Key System Features

Infortrend EonNAS 3000 and 5000: Key System Features Infortrend EonNAS 3000 and 5000: Key System Features White paper Abstract This document introduces Infortrend s EonNAS 3000 and 5000 systems and analyzes key features available on these systems. Table

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information