朋友,直接用百度翻译就行了,根本没人看的。
基于ORACLE数据库的铁路货车MIS整合烟台港务局联合港埠公司技术设备部 山东省烟台市 264000 程安广摘要:为解决铁路货车MIS信息资源整合与共享问题,本文介绍了三个系统(轨道衡称重系统、车号自动识别系统、港口生产管理信息系统铁路管理子系统)整合的原因、过程及效果,这是一例基于ORACLE的信息资源整合整体解决方案。关键词:MIS 信息孤岛 信息资源共享 信息资源整合 一、问题的提出轨道衡称重系统在港口生产中担负着铁路运输货物的计量工作,它可以精确地测出每一节车皮的重量,其精度满足国家规定的贸易结算的精度。车号自动识别系统可以精确地测出每一节车皮的车号、车型等信息。港口生产管理信息系统铁路管理子系统为现场生产服务,用于自备机车在港口自管铁路的行车及货运组织、调度及进出国家铁路取送车。三个系统关系如下图:但是,上述三个系统各自运行,功能独立,任何一方提供的数据都不能完全满足生产的需要,如轨道衡称重系统不可以直接实时传递没有火车号码的计量数据给编制提货单证的调度室,车号自动识别系统在不清楚重量的情况下无法自动校验出港车列编组。由于港口有大量散杂货进出港,港口生产管理信息系统铁路管理子系统的功能及运行效率影响着铁路行车及货运组织工作的质量及效率,影响着货主、港口的效益,影响着装卸生产的优质、高效、顺利地进行。若将这三个系统的功能进行整合,使之相互独立又相互关联、相互服务,将大大提高整个系统的效率。二、系统的目标通过整合,拟实现下列目标1、使港区铁路货车管理工作进一步规范化、标准化、自动化;2、实现自动计量、自动合成并传递计量单,提高工作效率;3、实现自动抄写、录入进港车辆信息功能,替代人工抄写、录入车辆信息工作,提高工作效率和准确性;车列进港后,可根据过衡系统和车号自识别系统编写到达列车编组单,核对实际到达车列的车号、次序、车种、空重状态、运用车和非运用车等,对车号等情况的准确性负责。4、实现自动校验出港车列编组功能,替代人工校验车列编组,提高生产作业效率和接发车组织工作的准确性,确保港区铁路行车、货运组织工作安全顺利进行;可凭编组单与计算机系统现场校验车号、次序、空重状态等。发现问题,及时通知车号员、行车调度员和值班员,如错误可以及时修改。5、实现车辆信息和计量信息的远程集成管理。在轨道衡室的计量设备和车号自动设备所读取的信息可以在铁路调度室通过远程实现数据处理,相反,调度室内生产管理信息系统的信息也可通过网络传递给轨道衡室,并在轨道衡室与计量系统内的信息进行计量单合成,所有的信息及数据都将与现有的生产管理信息系统集成管理。三、三大系统概述1、轨道衡称重系统我港GCU-100型100t不断轨式双向计量动态轨道衡通过轨道下面的压力、剪力传感器及室内的数据采集仪和应用软件完成过轨货车的动态称重。其应用软件完成数据采集分析、车位车种判别、有效重量数据的处理、运行车辆的车速运算处理、打印称重数据等功能。软件平台为:TURBO C。输出格式为文本文件。2、双向车号自动识别系统HTK-196型双向车号自动识别系统的功能是通过轨道之间的915兆赫兹天线及室内的数据采集仪和应用软件完成过轨车辆、机车的标签内容识别。按照铁道部的规定,2001年5月之后年检的车辆、机车必须安装机读标签。标签内容为: 车辆标签:属性码、车种、车型、车号、换长、制造商、制造日期。 机车标签:属性码、任务性质、车次、机车型号、配属路局、配属段。软件平台为:VISUAL B 。输出格式为文本文件。其车号报文格式说明(文本):辆数(2个字符) 头机车(1个字符) 回车换行车次(6个字符) 回车换行车型(5个字符) 车号(7个字符) 标重(3个字符) 自重(3个字符) 辆序(2个字符) 回车换行关于无机车存盘报文的格式说明: 一 二 三 四 五 六 七 八 九 一、char 1 ://1:有报文生成 0:无报文。 // 处理程序取走报文信息后,将该标识位置 0 。二、char 1:机后总量数(不含机车)三、char 1:起始速度(km/h)四、char 1:结束速度(km/h)五、char 1:车辆属性标识//有标签为51或54(51为企业自备车;54为铁路用车) ;无标签为0六、char 6:车型码//:6位,按字符串格式存放(原为5位)七、char 8:车号码//:实际车号7位,按字符串格式存放。八、char 2:标重//(低位、高位)九、char 2:自重//(低位、高位) // 注:自重与标重的数值为实际重量的10倍。3、港口生产管理信息系统港口生产管理信息系统分为调度子系统、货运商务子系统、铁路子系统、查询子系统等为港口现场生产服务。软件平台:数据库为ORACLE 8I FOR WINDOWS98,前端工具为DEVELOPER/2000(FORMS,REPORTS,GRAPHICS)。四、整合过程整合的核心是将轨道衡称重系统、双向车号自动识别系统的数据有机地嵌入港口生产管理信息系统,并将港口生产管理信息系统中加工后的数据有机地嵌入轨道衡称重系统。具体实现如下:1、对用户系统进行统一规划 公司生产系统有五大用户,具体到每一用户要求服务器实现的功能也是多种多样,要做到在管理上既方便又实用,需要合理规划用户资源,经过反复调研、实验,我们制定了一套自上而下都认可的比较科学的用户资源方案。 2、确定所需的基本表和中间表。遵照第一满足实际情况需要,第二在当前平台下能够实现,第三数据结构达到一定范式的原则,对三大系统的每一个原始数据进行剖析,最后确定了所需的基本表和中间表。3、 系统设计阶段此阶段对系统各功能模块的名称、标识符、功能、各功能间的调用关系、内部算法、所设计的数据库表名、列名和控制流程进行了详细的阅读、设计和说明,产生了详细的设计说明书,对部分功能复杂的模块还进一步设计了屏幕格式。4、 编程、调试、试运行、正式运行阶段其信息处理系统主要由上传及处理程序和接收及处理程序两部分组成。此程序是用POWERBUILDER(简称PB)编写的。上传及处理程序说明:当机器打开后, 此程序已处于运行状态, 无需人工操作,并且每过一分钟,自动扫描有没有新增加的含有轨道衡称重系统、双向车号自动识别系统的数据的文本文件。如果有,程序会自动获取数据到指定的基本表中, 然后进行数据处理,并保存结果。接收及处理程序说明:数据进入生产管理信息系统铁路子系统以后 首先在中间表中进行初始化 在程序中判断、选择新车的停放位置 统计将要插入的记录数 判断是否开始接收记录,查找标志记录及前、后顺序 修改与火车、车移股、车动态有关的表、视图、主键、序列发生器等 修改在港车中车动态有关的记录 修改新记录的顺序号 将新车插入到火车表、车移股表和车动态表中 修改其它不相符的程序。五、效果该系统在保留原有过衡计量并自动合成计量单功能的基础上,又扩展出自动抄写进港车辆信息功能、手工校验车列编组功能、自动校验车列编组功能,在依靠生产管理信息系统原有资源的基础上,实现了系统功能的整合。使我港铁路管理工作在核对现在车数、股道车号、次序、车种、空重状态信息等方面通过计算机网络实现了自动化。而且可以准确掌握进出港及调车作业中的车列编组,自动、及时地向行车调度和值班员报告错误的车辆和车列信息。替代了大量的手工作业,大大降低了职工劳动强度,改善了工作环境,提高了工作效率,最大限度地减少了空车当重车发、重车当空车发等发错车事故的发生,为港区铁路管理工作的安全、准确、优质、高效运行提供了技术保障。
大神帮你翻译。。。。。
Computer network security and to guard againstAbstract: When mankind entered the 21st century information society, the network society of the time, China will establish a complete set of network security system, especially from the policy and law to establish China's own characteristics, network security system.Key words: computer; network; security; preventIn the information age, information can help groups or individuals so that they benefit from, the same information can also be used to pose a threat to them, caused damage. Therefore network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both complement each other, are indispensable.First, the concept of computer network securityInternational Organization for Standardization of "computer security" is defined as: "To establish a data processing system and the adoption of technology and management of security protection, the protection of computer hardware, software, data is not due to accidental and malicious destruction of reasons, change and leakage." The above definition of computer security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the information security, information refers to the confidentiality, integrity and availability of protection, and network security Information security is the meaning of the extension, that network security is a network of information confidentiality, integrity and availability protection. Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be different. From the ordinary user's point of view, could only hope that personal privacy or confidential information transmission on the network be protected against eavesdropping, tampering and forgery; and network provider in addition to care about these network information security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network communications, and maintain the continuity of network communications.In essence, the network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious attacks on the destruction of both the technical aspects of network security issues, there are management issues, the two sides complement each other, are indispensable. Man-made network intrusion and attacks makes network security is facing new challenges.Second, computer network security status quoComputer network security is the network hardware, software and data systems are protected from accidental or malicious destruction of reasons, alteration, disclosure, the system continuous, reliable, normal operation of network services without disruption. Computer and network technology has the complexity and diversity, makes computer and network security has become a need to continue to update and improve the area. At present, hackers method has been more than the type of computer virus, and many attacks are fatal. In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack computer systems and resulting in network paralysis. Worms, backdoor (Back-doors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker attacks. However, none of these attacks means they reflect the astonishing power of today become worse. These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internet-based protocols and operating system level. From the Web process control procedures to the kernel-level Rootlets. Hackers practices escalating renovation, to the user's ability to guard against information security challenge.Third, computer network security precautions1, to strengthen the internal network management and the use of safety awareness among staff, many computer systems commonly used passwords to control access to system resources, which is anti-virus process, the most vulnerable and the most economical methods. Network administrator and terminal operator privileges in accordance with their responsibilities, choose a different password for the application data legitimate operation, to prevent unauthorized users to access the data and the use of network resources.On the network, software installation and management is crucial, it is not only related to network maintenance and management efficiency and quality, but also to the network security. A good antivirus software can be easily installed within minutes to the organization each NT server can also be downloaded and spread to all the purpose of the machine by the network administrator set up and manage to focus, it will work with the operating system and other security is closely linked to become a part of network security management, and automatically provide the best network virus defensive measures. When the computer virus on-line resources applications attack, such as the virus exists in the information-sharing network of media, it is necessary to the security at the gateway, on the network front-end for antivirus.2, network firewall technologyIs a kind of used to strengthen the network access control to prevent the external network users to illegal means to enter the external network through the internal network, access internal network resources and protect the internal network operating environment special for Network Interconnection Devices. It is between two or more networks such as packet transmission link in accordance with a certain degree of security strategy to implement the inspection, to determine whether the network communication between are allowed to, and monitor the network running. Although the firewall is to protect the network from an effective means of hacking, but there are obviously inadequate: through the firewall can not protect against outside attack other means, can not prevent defectors from the inside and inadvertent threats posed by users, but also can not completely prevent the transmission of the virus have been infected with the software or documents, and can not protect against data-driven attacks.3, security encryption technologyEncryption technology for the global e-commerce to provide a guarantee, so that Internet-based electronic trading system has become possible, thus improving the symmetric encryption and asymmetric encryption technology is still the mainstream of the 21st century. Symmetric encryption to the conventional password-based technology, computing encryption and decryption operations use the same key. Asymmetric encryption, encryption key that is different from the decryption key, encryption keys are made public, anyone can use, only the decryption key to decrypt people know.4, the network host operating system security and physical security measuresNetwork firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system level. After the firewall is based on the network host operating system security and physical security measures. In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time, host security checks and bug fixes, as well as a backup safety system as a supplementary safety measures. These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from within. System backup is the last line of defense network system, used to attack after the System Restore. The firewall and host security measures is the overall system security by auditing, intrusion detection and response processor constitute the overall safety inspection and response measures. It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection subsystem. Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning message. Moreover, the system's security audit also can be used as the future consequences of aggressive behavior and to deal with security policy on the system to improve sources of information.In short, network security is a comprehensive issue, involving technology, management, use and many other aspects, including both its own information system security issues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a panacea. To this end the establishment of a network with Chinese characteristics, security system, the need for national policies and regulations to support and joint research and development group. Security and anti-security like two sides of contradictions, always pick-up, so the security industry is a future with the development of new technologies and the continuous development of industry.References:[1] Huang Yi-qiang, et al. On the software development needs analysis phase of the main tasks. Quarterly Journal of Sun Yat-sen University, 2002 (01).[2] Hu Daoyuan. Computer LAN [M]. Beijing: Tsinghua University Press, 2001.[3] Zhu Lisen, even Shougong. Computer Network Application Technology [M]. Beijing: Patent Literature Publishing House, 2001.[4] Xie Xiren. Computer Networks (4th edition) [M]. Beijing: Publishing House of Electronics Industry, 2003.[5]孙小刚, Han Dong, et al. Oriented software engineering, Visual C + + Network Programming [M]. Beijing: Tsinghua University Press, 2004,11.仅供参考,请自借鉴。希望对您有帮助。补充:您可以随时找我,我会帮你翻译好发过去,随时欢迎您的咨询。
198 浏览 6 回答
233 浏览 3 回答
118 浏览 4 回答
182 浏览 2 回答
273 浏览 4 回答
323 浏览 5 回答
165 浏览 4 回答
251 浏览 5 回答
341 浏览 5 回答
184 浏览 4 回答
307 浏览 4 回答
229 浏览 2 回答
324 浏览 3 回答
176 浏览 3 回答
254 浏览 5 回答