数据库安全中英文对照外文翻译文献

数据库安全中英文对照外文翻译文献
数据库安全中英文对照外文翻译文献

中英文对照外文翻译文献(文档含英文原文和中文翻译)

Database Security in a Web Environment Introduction

Databases have been common in government departments and commercial enterprises for many years. Today, databases in any organization are increasingly opened up to a multiplicity of suppliers, customers, partners and employees - an idea that would have been unheard of a few years ago. Numerous applications and their associated data are now accessed by a variety of users requiring different levels of access via manifold devices and channels – often simultaneously. For example:

? Online banks allow customers to perform a variety of banking operations - via the Internet and over the telephone – whilst maintaining the privacy of account data.

? E-Commerce merchants and their Service Providers must store customer, order and payment data on their merchant server - and keep it secure.

? HR departments allow employees to update their personal information –whilst protecting certain management information from unauthorized access.

? The medical profession must protect the confidentiality of patient data –whilst allowing essential access for treatment.

? Online brokerages need to be able to provide large numbers of simultaneous users with up-to-date and accurate financial information.

This complex landscape leads to many new demands upon system security. The global growth of complex web-based infrastructures is driving a need for security solutions that provide mechanisms to segregate environments; perform integrity checking and maintenance; enable strong authentication and

non-repudiation; and provide for confidentiality. In turn, this necessitates comprehensive business and technical risk assessment to identify the threats,

vulnerabilities and impacts, and from this define a security policy. This leads to security definitions throughout the infrastructure - operating system, database management system, middleware and network.

Financial, personal and medical information systems and some areas of government have strict requirements for security and privacy. Inappropriate disclosure of sensitive information to the wrong parties can have severe social, legal and regulatory consequences. Failure to address the basics can result in substantial direct and consequential financial losses - witness the fraud losses through the compromise of several million credit card numbers in merchants’ databases [Occf], plus associated damage to brand-image and loss of consumer confidence.

This article discusses some of the main issues in database and web server security, and also considers important architecture and design issues.

A Simple Model

At the simplest level, a web server system consists of front-end software and back-end databases with interface software linking the two. Normally, the front-end software will consist of server software and the network server operating system, and the back-end database will be a relational or

object-oriented database fulfilling a variety of functions, including recording transactions, maintaining accounts and inventory. The interface software typically consists of Common Gateway Interface (CGI) scripts used to receive information from forms on web sites to perform online searches and to update the database.

Depending on the infrastructure, middleware may be present; in addition, security management subsystems (with session and user databases) that address the web server’s and related applications’ requirements for authentication, access

control and authorization may be present. Communications between this subsystem and either the web server, middleware or database are via application program interfaces (APIs)..

This simple model is depicted in Figure 1.

Security can be provided by the following components:

? Web server.

? Middleware.

? Operating system.

. Figure 1: A Simple Model.

? Database and Database Management System.

? Security management subsystem.

The security of such a system addresses

Aspects of authenticity, integrity and confidentiality and is dependent on the security of the individual components and their interactions. Some of the most common vulnerabilities arise from poor configuration, inadequate change control procedures and poor administration. However, even if these areas are properly

addressed, vulnerabilities still arise. The appropriate combination of people, technology and processes holds the key to providing the required physical and logical security. Attention should additionally be paid to the security aspects of planning, architecture, design and implementation.

In the following sections, we consider some of the main security issues associated with databases, database management systems, operating systems and web servers, as well as important architecture and design issues. Our treatment seeks only to outline the main issues and the interested reader should refer to the references for a more detailed description.

Database Security

Database management systems normally run on top of an operating system and provide the security associated with a database. Typical operating system security features include memory and file protection, resource access control and user authentication. Memory protection prevents the memory of one program interfering with that of another and limits access and use of the objects employing techniques such as memory segmentation. The operating system also protects access to other objects (such as instructions, input and output devices, files and passwords) by checking access with reference to access control lists. Security mechanisms in common operating systems vary tremendously and, for those that are lacking, there exists special-purpose security software that can be integrated with the existing environment. However, this can be an expensive, time-consuming task and integration difficulties may also adversely impact application behaviors.

Most database management systems consist of a number of modules - including database querying and database and file management - along with authorization, concurrent access and database description tables. These

management systems also use a variety of languages: a data definition language supports the logical definition of the database; developers use a data manipulation language; and a query language is used by non-specialist end-users.

Database management systems have many of the same security requirements as operating systems, but there are significant differences since the former are particularly susceptible to the threat of improper disclosure, modification of information and also denial of service. Some of the most important security requirements for database management systems are: ? Multi-Level Access Control.

? Confidentiality.

? Reliability.

? Integrity.

? Recovery.

These requirements, along with security models, are considered in the following sections.

Multi-Level Access Control

In a multi-application and multi-user environment, administrators, auditors, developers, managers and users – collectively called subjects - need access to database objects, such as tables, fields or records. Access control restricts the operations available to a subject with respect to particular objects and is enforced by the database management system. Mandatory access controls require that each controlled object in the database must be labeled with a security level, whereas discretionary access controls may be applied at the choice of a subject.

Access control in database management systems is more complicated than in operating systems since, in the latter, all objects are unrelated whereas in a database the converse is true. Databases are also required to make access

decisions based on a finer degree of subject and object granularity. In multi-level systems, access control can be enforced by the use of views - filtered subsets of the database - containing the precise information that a subject is authorized to see.

A general principle of access control is that a subject with high level security should not be able to write to a lower level object, and this poses a problem for database management systems that must read all database objects and write new objects. One solution to this problem is to use a trusted database management system.

Confidentiality

Some databases will inevitably contain what is considered confidential data. For example, it could be inherently sensitive or its source may be sensitive, or it may belong to a sensitive table, thus making it difficult to determine what is actually confidential. Disclosure is also difficult to define, as it can be direct, indirect, involve the disclosure of bounds or even mere existence.

An inference problem exists in database management systems whereby users can infer sensitive information from relatively insensitive queries. A trivial example is a request for information about the average salary of an employee and the number of employees turns out to be just one, thus revealing the employee’s salary. However, much more sophisticated statistical inference attacks can also be mounted. This highlights the fact that, although the data itself may be properly controlled, confidential information may still leak out.

Controls can take several forms: not divulging sensitive information to unauthorized parties (which depends on the respective subject and object security levels), logging what each user knows or masking response data. The first control can be implemented fairly easily, the second quickly becomes

unmanageable for a large number of users and the third leads to imprecise responses, and also exemplifies the trade-off between precision and security. Polyinstantiation refers to multiple instances of a data object existing in the database and it can provide a partial solution to the inference problem whereby different data values are supplied, depending on the security level, in response to the same query. However, this makes consistency management more difficult.

Another issue that arises is when the security level of an aggregate amount is different to that of its elements (a problem commonly referred to as aggregation). This can be addressed by defining appropriate access control using views.

Reliability, Integrity and Recovery

Arguably, the most important requirements for databases are to ensure that the database presents consistent information to queries and can recover from any failures. An important aspect of consistency is that transactions execute atomically; that is, they either execute completely or not at all.

Concurrency control addresses the problem of allowing simultaneous programs access to a shared database, while avoiding incorrect behavior or interference. It is normally addressed by a scheduler that uses locking techniques to ensure that the transactions are serial sable and independent. A common technique used in commercial products is two-phase locking (or variations thereof) in which the database management system controls when transactions obtain and release their locks according to whether or not transaction processing has been completed. In a first phase, the database management system collects the necessary data for the update: in a second phase, it updates the database. This means that the database can recover from incomplete transactions by repeating

either of the appropriate phases. This technique can also be used in a distributed database system using a distributed scheduler arrangement.

System failures can arise from the operating system and may result in corrupted storage. The main copy of the database is used for recovery from failures and communicates with a cached version that is used as the working version. In association with the logs, this allows the database to recover to a very specific point in the event of a system failure, either by removing the effects of incomplete transactions or applying the effects of completed transactions. Instead of having to recover the entire database after a failure, recovery can be made more efficient by the use of check pointing. It is used during normal operations to write additional updated information - such as logs, before-images of incomplete transactions, after-images of completed transactions - to the main database which reduces the amount of work needed for recovery. Recovery from failures in distributed systems is more complicated, since a single logical action is executed at different physical sites and the prospect of partial failure arises.

Logical integrity, at field level and for the entire database, is addressed by the use of monitors to check important items such as input ranges, states and transitions. Error-correcting and error-detecting codes are also used.

Security Models

Various security models exist that address different aspects of security in operating systems and database management systems. For example, the

Bell-LaPadula model defines security in terms of mandatory access control and addresses confidentiality only. The Bell LaPadula models, and other models including the Biba model for integrity, are described more fully in [Cast95] and [Pfle89]. These models are implementation-independent and provide a powerful

insight into the properties of secure systems, lead to design policies and principles, and some form the basis for security evaluation criteria.

Web Server Security

Web servers are now one of the most common interfaces between users and back-end databases, and as such, their security becomes increasingly important. Exploitation of vulnerabilities in the web server can lead to unforeseen attacks on middleware and backend databases, bypassing any controls that may be in place. In this section, we focus on common web server vulnerabilities and how the authentication requirements of web servers and databases are met.

In general, a web server platform should not be shared with other applications and should be the only machine allowed to access the database. Using a firewall can provide additional security - either between the web server and users or between the web server and back-end database - and often the web server is placed on a de-militarized zone (DMZ) of a firewall. While firewalls can be used to block certain incoming connections, they must allow HTTP (and HTTPS) connections through to the web server, and so attacks can still be launched via the ports associated with these connections.

Vulnerabilities

Vulnerabilities appear on a weekly basis and, here, we prefer to focus on some general issues rather than specific attacks. Common web server vulnerabilities include:

? No policy exists.

? The default configuration is on.

? Reusable passwords appear in clear.

? Unnecessary ports available for network services are not disabled.

英文版excel中英文对照表

英文版Excel 中英文对照表 激活(activate) 数组(array) 数组公式(array formula) 相关联的数据透视表(associated PivotTable report )自动套用格式(autoformat) 坐标轴(asix) 基础地址(base address) “合并计算”表(consolidation table) 比较条件(comparison criteria) 比较运算符(comparison operator) 常量(constant) 单元格引用(cell reference) 当前区域(current region) 分类轴(category asix) 分类字段(category field) 复制区域(copy area) 计算列(calculated column) 计算项(calculated item) 计算字段(数据库)(calculated field) 计算字段(数据透视表)(calculated field) 列标题(column heading) 列字段(column field) 条件(criteria) 条件窗格((criteria pane) 条件格式(conditional format) 图表工作表(chart sheet) 图表区(chart area) 修订记录(change history) 约束条件(constraints) 证书验证机构(certifying authority) 自定义计算(custom calculation) 垂直线(drop lines) 从属单元格(dependents) 明细数据(detail data) 默认工作表模板(default worksheet template) 默认工作簿模板(default workbook template) 默认启动工作簿(default startup workbook ) 目标区域(destination area) 数据标签 (data label) 数据标志(data marker) 数据表(data table) 数据表单(data form) 数据窗格(data pane)

(完整版)数据库重要术语(中英文)

单词汇总(数据库专业一点的词汇其实主要就是每章后面review items的内容,在这里简单列一 下,如果你实在没时间看书,至少这些单词要认识。): 1. 数据库系统:database system(DS),database ma nageme nt system(DBMS) 2. 数据库系统(DS),数据库管理系统(DBMS) 3. 关系和关系数据库table= relation,column = attribute 属性,domain, atomic domain, row= tuple , relati onal database, relati on schema, relati on in sta nee, database schema, database in sta nee; 4. 表=关系,列=属性属性,域,原子域,排=元组,关系型数据库,关系模式,关系实例,数 据库模式,数据库实例; 1. key 们:super key, can didate key, primary key, foreig n key, referencing relati on, referen ced relati on; 2. 超码,候选码,主码,外码,参照关系,被参照关系 5. 关系代数(relational algebra): selection, project, natural join, Cartesian product, set operations, union, in tersect, set differe nee ( except\m in us), Ren ame, assig nment, outer join, group ing, tuple relati on calculus 6. (关系代数):选择,项目,自然连接,笛卡尔积,集合运算,集,交集,集合差(除负), 重命名,分配,外连接,分组,元组关系演算 7. sql组成: DDL :数据库模式定义语言,关键字:create DML :数据操纵语言,关键字:Insert、delete、update DCL :数据库控制语言,关键字:grant、remove DQL :数据库查询语言,关键字:select 8. 3. SQL 语言:DDL,DML,DCL,QL,sql query structure, aggregate functions, nested subqueries, exists(as an operator), uni que(as an operator), scalar subquery, asserti on, in dex(i ndices), catalogs, authorization, all privileges, granting, revoking , grant option, trigger, stored procedure, stored fun cti on 4. SQL语言:DDL,DML,DCL,QL,SQL查询结构,聚合函数,嵌套子查询,存在(如运 营商),独特的(如运营商),标量子查询,断言指数(指数) ,目录,授权,所有权限,授 予,撤销,GRANT OPTION,触发器,存储过程,存储函数 8. 表结构相关:Integrity constraints, domain constraints, referential integrity constraints 9. 完整性约束,域名约束,参照完整性约束 5. 数据库设计(ER 模型):Entity-Relationship data model, ER diagram, composite attribute, sin gle-valued and multivalued attribute, derived attribute, binary relati on ship set, degree of relati on ship set, mapp ing card in ality, 1-1, 1-m, m-n relati on ship set (one to one, one to many, many to many), participati on, partial or total participati on, weak en tity sets, discrim in ator attributes, specialization and generalization 6. 实体关系数据模型,ER图,复合属性,单值和多值属性,派生属性,二元关系集,关系集, 映射基数的程度,1-1,1-米,MN关系集合(一对一,一对多,多对多) ,参与部分或全部参与,弱实体集,分辨符属性,特化和概化 10. 函数依赖理论:functional dependence, normalization, lossless join (or lossless) decomposition, First Normal Form (1NF), the third normal form (3NF), Boyce-codd normal form (BCNF), R satisfies F, F

人工智能专业外文翻译-机器人

译文资料: 机器人 首先我介绍一下机器人产生的背景,机器人技术的发展,它应该说是一个科学技术发展共同的一个综合性的结果,同时,为社会经济发展产生了一个重大影响的一门科学技术,它的发展归功于在第二次世界大战中各国加强了经济的投入,就加强了本国的经济的发展。另一方面它也是生产力发展的需求的必然结果,也是人类自身发展的必然结果,那么随着人类的发展,人们在不断探讨自然过程中,在认识和改造自然过程中,需要能够解放人的一种奴隶。那么这种奴隶就是代替人们去能够从事复杂和繁重的体力劳动,实现人们对不可达世界的认识和改造,这也是人们在科技发展过程中的一个客观需要。 机器人有三个发展阶段,那么也就是说,我们习惯于把机器人分成三类,一种是第一代机器人,那么也叫示教再现型机器人,它是通过一个计算机,来控制一个多自由度的一个机械,通过示教存储程序和信息,工作时把信息读取出来,然后发出指令,这样的话机器人可以重复的根据人当时示教的结果,再现出这种动作,比方说汽车的点焊机器人,它只要把这个点焊的过程示教完以后,它总是重复这样一种工作,它对于外界的环境没有感知,这个力操作力的大小,这个工件存在不存在,焊的好与坏,它并不知道,那么实际上这种从第一代机器人,也就存在它这种缺陷,因此,在20世纪70年代后期,人们开始研究第二代机器人,叫带感觉的机器人,这种带感觉的机器人是类似人在某种功能的感觉,比如说力觉、触觉、滑觉、视觉、听觉和人进行相类比,有了各种各样的感觉,比方说在机器人抓一个物体的时候,它实际上力的大小能感觉出来,它能够通过视觉,能够去感受和识别它的形状、大小、颜色。抓一个鸡蛋,它能通过一个触觉,知道它的力的大小和滑动的情况。第三代机器人,也是我们机器人学中一个理想的所追求的最高级的阶段,叫智能机器人,那么只要告诉它做什么,不用告诉它怎么去做,它就能完成运动,感知思维和人机通讯的这种功能和机能,那么这个目前的发展还是相对的只是在局部有这种智能的概念和含义,但真正完整意义的这种智能机器人实际上并没有存在,而只是随着我们不断的科学技术的发展,智能的概念越来越丰富,它内涵越来越宽。 下面我简单介绍一下我国机器人发展的基本概况。由于我们国家存在很多其

数据库方面中英文对照

本科毕业设计(论文) 英文翻译 题目创业平台设计与实现 学生姓名 专业班级网 学号 院(系) 指导教师(职称) 完成时间 2008 年6 月6 日

英文原文 An Overview of Servlet and JSP Technology Gildas Avoine and Philippe Oechslin EPFL, Lausanne, Switzerland 1.1 A Servlet's Job Servlets are Java programs that run on Web or application servers, acting as a middle layer between requests coming from Web browsers or other HTTP clients and databases or applications on the HTTP server. Their job is to perform the following tasks, as illustrated in Figure 1-1. Figure 1-1 1.Read the explicit data sent by the client. The end user normally enters this data in an HTML form on a Web page. However, the data could also come from an applet or a custom HTTP client program. 2.Read the implicit HTTP request data sent by the browser. Figure 1-1 shows a single arrow going from the client to the Web server (the layer where servlets and JSP execute), but there are really two varieties of data: the explicit data that the end user enters in a form and the behind-the-scenes HTTP information. Both varieties are critical. The HTTP information includes cookies, information about media types and compression schemes the browser understands, and so on. 3.Generate the results. This process may require talking to a database, executing an RMI or EJB call, invoking a Web service, or computing the response directly. Your real data may be in a relational database. Fine. But your database probably doesn't speak HTTP or return results in HTML, so the Web browser can't talk directly to the database. Even if it could, for security reasons, you probably would not want it to. The same argument applies to most other applications. You need the Web middle layer to extract the incoming data from the HTTP stream, talk to

文献综述_人工智能

人工智能的形成及其发展现状分析 冯海东 (长江大学管理学院荆州434023) 摘要:人工智能的历史并不久远,故将从人工智能的出现、形成、发展现 状及前景几个方面对其进行分析,总结其发展过程中所出现的问题,以及发展现状中的不足之处,分析其今后的发展方向。 关键词:人工智能,发展过程,现状分析,前景。 一.引言 人工智能最早是在1936年被英国的科学家图灵提出,并不为多数人所认知。 当时,他编写了一个下象棋的程序,这就是最早期的人工智能的应用。也有著名的“图灵测试”,这也是最初判断是否是人工智能的方案,因此,图灵被尊称为“人工智能之父”。人工智能从产生到发展经历了一个起伏跌宕的过程,直到目前为止,人工智能的应用技术也不是很成熟,而且存在相当的缺陷。 通过搜集的资料,将详细的介绍人工智能这个领域的具体情况,剖析其面临的挑战和未来的前景。 二.人工智能的发展历程 1. 1956年前的孕育期 (1) 从公元前伟大的哲学家亚里斯多德(Aristotle)到16世纪英国哲学家培根(F. Bacon),他们提出的形式逻辑的三段论、归纳法以及“知识就是力量”的警句,都对人类思维过程的研究产生了重要影响。 (2)17世纪德国数学家莱布尼兹(G..Leibniz)提出了万能符号和推理计算思想,为数理逻辑的产生和发展奠定了基础,播下了现代机器思维设计思想的种子。而19世纪的英国逻辑学家布尔(G. Boole)创立的布尔代数,实现了用符号语言描述人类思维活动的基本推理法则。 (3) 20世纪30年代迅速发展的数学逻辑和关于计算的新思想,使人们在计算机出现之前,就建立了计算与智能关系的概念。被誉为人工智能之父的英国天才的数学家图灵(A. Tur-ing)在1936年提出了一种理想计算机的数学模型,即图灵机之后,1946年就由美国数学家莫克利(J. Mauchly)和埃柯特(J. Echert)研制出了世界上第一台数字计算机,它为人工智能的研究奠定了不可缺少的物质基础。1950年图灵又发表了“计算机与智能”的论文,提出了著名的“图灵测试”,形象地指出什么是人工智能以及机器具有智能的标准,对人工智能的发展产生了极其深远的影响。 (4) 1934年美国神经生理学家麦克洛奇(W. McCulloch) 和匹兹(W. Pitts )建立了第一个神经网络模型,为以后的人工神经网络研究奠定了基础。 2. 1956年至1969年的诞生发育期 (1)1956年夏季,麻省理工学院(MIT)的麦卡锡(J.McCarthy)、明斯基(M. Minshy)、塞尔夫里奇(O. Selfridge)与索罗门夫(R. Solomonff)、 IBM的洛

数据库(中英文翻译)

原文: Planning the Database It is important to plan how the logical storage structure of the database will affect system performance and various database management operations. For example, before creating any tablespaces for your database, you should know how many data files will make up the tablespace,what type of information will be stored in each tablespace, and on which disk drives the datafiles will be physically stored. When planning the overall logical storage of the database structure, take into account the effects that this structure will have when the database is actually created and running. You may have database objects that have special storage requirements due to type or size. In distributed database environments, this planning stage is extremely important. The physical location of frequently accessed data dramatically affects application performance. During the planning stage, develop a backup strategy for the database. You can alter the logical storage structure or design of the database to improve backup efficiency. Backup strategies are introduced in a later lesson. These are the types of questions and considerations, which you will encounter as a DBA, and this course (in its entirety) is designed to help you answer them. Databases: Examples Different types of databases have their own specific instance and storage requirements. Your Oracle database software includes templates for the creation of these different types of databases. Characteristics of these examples are the following: ? Data Warehouse: Store data for long periods and retrieve them in read operations. ? Transaction Processing: Accommodate many, but usually small, transactions. ? General Purpose: Work with transactions and store them for a medium length of time.

论文《人工智能》---文献检索结课作业

人工智能 【摘要】:人工智能是一门极富挑战性的科学,但也是一门边沿学科。它属于自然科学和社会科学的交叉。涉及的学科主要有哲学、认知科学、数学、神经生理学、心理学、计算机科学、信息论、控制论、不定性论、仿生学等。人工智能(Artificial Intelligence),英文缩写为AI。它是研究、开发用于模拟、延伸和扩展人的智能的理论、方法、技术及应用系统的一门新的技术科学。人工智能是计算机科学的一个分支,它企图了解智能的实质,并生产出一种新的能以人类智能相似的方式做出反应的智能机器,该领域的研究包括机器人、语言识别、图像识别、自然语言处理和专家系统等1。 【关键词】:人工智能;应用领域;发展方向;人工检索。 1.人工智能描述 人工智能(Artificial Intelligence) ,英文缩写为AI。它是研究、开发用于模拟、延伸和扩展人的智能的理论、方法、技术及应用系统的一门新的技术科学2。人工智能是计 算机科学的一个分支,它企图了解智 能的实质,并生产出一种新的能以人 类智能相似的方式作出反应的智能 机器,该领域的研究包括机器人、语 言识别、图像识别、自然语言处理和 专家系统等。“人工智能”一词最初 是在1956 年Dartmouth学会上提出 的。从那以后,研究者们发展了众多 理论和原理,人工智能的概念也随之扩展。人工智能是一门极富挑战性的科学,从事这项工作的人必须懂得计算机知识,心理学和哲学。人工智能是包括十分广泛的科学,它由不同的领域组成,如机器学习,计算机视觉等等,总的说来,人工智能研究的一个主要目标是使机器能够胜任一些通常需要人类智能才能完成的复杂工作。但不同的时代、不同的人对这种“复杂工作”的理解是不同的。例如繁重的科学和工程计算本来是要人脑来承担的,现在计算机不但能完成这种计算, 而且能够比人脑做得更快、更准确,因之当代人已不再把这种计算看作是“需要人类智能才能完成的复 1.蔡自兴,徐光祐.人工智能及其应用.北京:清华大学出版社,2010 2元慧·议当人工智能的应用领域与发展状态〖J〗.2008

(完整版)数据库重要术语(中英文)

单词汇总(数据库专业一点的词汇其实主要就是每章后面review items的内容,在这里简单列一下,如果你实在没时间看书,至少这些单词要认识。): 1.数据库系统:database system(DS),database management system(DBMS) 2.数据库系统(DS),数据库管理系统(DBMS) 3.关系和关系数据库table= relation,column = attribute属性,domain, atomic domain, row= tuple, relational database, relation schema, relation instance, database schema, database instance; 4.表=关系,列=属性属性,域,原子域,排=元组,关系型数据库,关系模式,关系实例,数 据库模式,数据库实例; 1.key们: super key, candidate key, primary key, foreign key, referencing relation, referenced relation; 2.超码,候选码,主码,外码,参照关系,被参照关系 5.关系代数(relational algebra):selection, project, natural join, Cartesian product, set operations, union, intersect, set difference ( except\minus), Rename, assignment, outer join, grouping, tuple relation calculus 6.(关系代数):选择,项目,自然连接,笛卡尔积,集合运算,集,交集,集合差(除\负), 重命名,分配,外连接,分组,元组关系演算 7. sql组成: DDL:数据库模式定义语言,关键字:create DML:数据操纵语言,关键字:Insert、delete、update DCL:数据库控制语言,关键字:grant、remove DQL:数据库查询语言,关键字:select 8. 3.SQL语言:DDL,DML,DCL,QL,sql query structure, aggregate functions, nested subqueries, exists(as an operator), unique(as an operator), scalar subquery, assertion, index(indices), catalogs, authorization, all privileges, granting, revoking, grant option, trigger, stored procedure, stored function 4.SQL语言:DDL,DML,DCL,QL,SQL查询结构,聚合函数,嵌套子查询,存在(如运 营商),独特的(如运营商),标量子查询,断言指数(指数),目录,授权,所有权限,授予,撤销,GRANT OPTION,触发器,存储过程,存储函数 9.表结构相关:Integrity constraints, domain constraints, referential integrity constraints 10.完整性约束,域名约束,参照完整性约束 5.数据库设计(ER 模型):Entity-Relationship data model, ER diagram, composite attribute, single-valued and multivalued attribute, derived attribute,binary relationship set, degree of relationship set, mapping cardinality,1-1, 1-m, m-n relationship set (one to one, one to many, many to many), participation, partial or total participation, weak entity sets, discriminator attributes, specialization and generalization 6.实体关系数据模型,ER图,复合属性,单值和多值属性,派生属性,二元关系集,关系集, 映射基数的程度,1-1,1-米,MN关系集合(一对一,一对多,多对多),参与部分或全部参与,弱实体集,分辨符属性,特化和概化 11.函数依赖理论:functional dependence, normalization, lossless join (or lossless) decomposition, First Normal Form (1NF), the third normal form (3NF), Boyce-codd normal form (BCNF), R satisfies F, F holds on R, Dependency preservation保持依赖, Trivial, closure of a set of functional dependencies函数依赖集的闭包, closure of a set of attributes属性集闭包,

SQL命令大全-中英文对照

[code=SQL][/code] --语句功能 --数据操作 SELECT --从数据库表中检索数据行和列 INSERT --向数据库表添加新数据行 DELETE --从数据库表中删除数据行 UPDATE --更新数据库表中的数据 --数据定义 CREATE TABLE --创建一个数据库表 DROP TABLE --从数据库中删除表 ALTER TABLE --修改数据库表结构 CREATE VIEW --创建一个视图 DROP VIEW --从数据库中删除视图 CREATE INDEX --为数据库表创建一个索引DROP INDEX --从数据库中删除索引 CREATE PROCEDURE --创建一个存储过程DROP PROCEDURE --从数据库中删除存储过程CREATE TRIGGER --创建一个触发器 DROP TRIGGER --从数据库中删除触发器CREATE SCHEMA --向数据库添加一个新模式DROP SCHEMA --从数据库中删除一个模式CREATE DOMAIN --创建一个数据值域 ALTER DOMAIN --改变域定义 DROP DOMAIN --从数据库中删除一个域 --数据控制 GRANT --授予用户访问权限 DENY --拒绝用户访问 REVOKE --解除用户访问权限 --事务控制 COMMIT --结束当前事务 ROLLBACK --中止当前事务 SET TRANSACTION --定义当前事务数据访问特征--程序化SQL DECLARE --为查询设定游标 EXPLAN --为查询描述数据访问计划 OPEN --检索查询结果打开一个游标 FETCH --检索一行查询结果 CLOSE --关闭游标 PREPARE --为动态执行准备SQL 语句EXECUTE --动态地执行SQL 语句

人工智能专家系统_外文翻译原文

附件 毕业生毕业论文(设计)翻译原文 论文题目远程农作物病虫害诊断专家系统的设计与实现系别_____ ______ _ 年级______ _ _ _ _ _ 专业_____ ___ ___ 学生姓名______ _____ 学号 ___ __ _ 指导教师______ ___ _ __ _ 职称______ __ ___ 系主任 _________________ _ _ ___ 2012年 04月22 日

EXPERT SYSTEMS AND ARTIFICIAL INTELLIGENCE Expert Systems are computer programs that are derived from a branch of computer science research called Artificial Intelligence (AI). AI's scientific goal is to understand intelligence by building computer programs that exhibit intelligent behavior. It is concerned with the concepts and methods of symbolic inference, or reasoning, by a computer, and how the knowledge used to make those inferences will be represented inside the machine. Of course, the term intelligence covers many cognitive skills, including the ability to solve problems, learn, and understand language; AI addresses all of those. But most progress to date in AI has been made in the area of problem solving -- concepts and methods for building programs that reason about problems rather than calculate a solution. AI programs that achieve expert-level competence in solving problems in task areas by bringing to bear a body of knowledge about specific tasks are called knowledge-based or expert systems. Often, the term expert systems is reserved for programs whose knowledge base contains the knowledge used by human experts, in contrast to knowledge gathered from textbooks or non-experts. More often than not, the two terms, expert systems (ES) and knowledge-based systems (KBS), are used synonymously. Taken together, they represent the most widespread type of AI application. The area of human intellectual endeavor to be captured in an expert system is called the task domain. Task refers to some goal-oriented, problem-solving activity. Domain refers to the area within which the task is being performed. Typical tasks are diagnosis, planning, scheduling, configuration and design. An example of a task domain is aircraft crew scheduling, discussed in Chapter 2. Building an expert system is known as knowledge engineering and its practitioners are called knowledge engineers. The knowledge engineer must make sure that the computer has all the knowledge needed to solve a problem. The knowledge engineer must choose one or more forms in which to represent the required knowledge as symbol patterns in the memory of the computer -- that is, he (or she) must choose a knowledge representation. He must also ensure that the computer can use the knowledge efficiently by selecting from a handful of reasoning methods. The practice of knowledge engineering is described later. We first describe the components of expert systems. The Building Blocks of Expert Systems Every expert system consists of two principal parts: the knowledge base; and the reasoning, or inference, engine.

信息系统和数据库中英文对照外文翻译文献

中英文对照翻译 信息系统开发和数据库开发 在许多组织中,数据库开发是从企业数据建模开始的,企业数据建模确定了组织数据库的范围和一般内容。这一步骤通常发生在一个组织进行信息系统规划的过程中,它的目的是为组织数据创建一个整体的描述或解释,而不是设计一个特定的数据库。一个特定的数据库为一个或多个信息系统提供数据,而企业数据模型(可能包含许多数据库)描述了由组织维护的数据的范围。在企业数据建模时,你审查当前的系统,分析需要支持的业务领域的本质,描述需要进一步抽象的数据,并且规划一个或多个数据库开发项目。图1显示松谷家具公司的企业数据模型的一个部分。 1.1 信息系统体系结构 如图1所示,高级的数据模型仅仅是总体信息系统体系结构(ISA)一个部分或一个组织信息系统的蓝图。在信息系统规划期间,你可以建立一个企业数据模型作为整个信息系统体系结构的一部分。根据Zachman(1987)、Sowa和Zachman (1992)的观点,一个信息系统体系结构由以下6个关键部分组成: 数据(如图1所示,但是也有其他的表示方法)。 操纵数据的处理(着系可以用数据流图、带方法的对象模型或者其他符号表示)。 网络,它在组织内并在组织与它的主要业务伙伴之间传输数据(它可以通过网络连接和拓扑图来显示)。 人,人执行处理并且是数据和信息的来源和接收者(人在过程模型中显示为数据的发送者和接收者)。 执行过程的事件和时间点(它们可以用状态转换图和其他的方式来显示)。 事件的原因和数据处理的规则(经常以文本形式显示,但是也存在一些用于规划的图表工具,如决策表)。 1.2 信息工程 信息系统的规划者按照信息系统规划的特定方法开发出信息系统的体系结构。信息工程是一种正式的和流行的方法。信息工程是一种面向数据的创建和维护信息系统的方法。因为信息工程是面向数据的,所以当你开始理解数据库是怎样被标识和定义时,信息工程的一种简洁的解释是非常有帮助的。信息工程遵循自顶向下规划的方法,其中,特定的信息系统从对信息需求的广泛理解中推导出来(例如,我们需要关于顾客、产品、供应商、销售员和加工中心的数据),而不是合并许多详尽的信息请求(如一个订单输入屏幕或按照地域报告的销售汇总)。自顶向下规划可使开发人员更全面地规划信息系统,提供一种考虑系统组件集成的方法,增进对信息系统与业务目标的关系的理解,加深对信息系统在整个组织中的影响的理解。 信息工程包括四个步骤:规划、分析、设计和实现。信息工程的规划阶段产

英文数据库列表

英文数据库列表 英文数据库 A ACM Digital Library收录了美国计算机协会(Association for Computing Machinery)的各种电子期刊、会议录、快报等文献AGRICOLA 农业参考文献数据库,涉及美国农业和生命科学等领域,提供了1970年至今的重要农业信息。 American Chemical Socitey 美国化学学会全文期刊数据库 American Mathematics Society 美国数学学会数据库,世界上最权威的数学学术团体,数据库内容涉及数学及数学在统计学、工程学、物理学、经济学、生物学、运筹学、计算机科学中的应用等 American Physical Society (APS) 美国物理学会数据库,为用户提供期刊的在线阅读。 Annual Reviews 为全世界的科学团体服务,提供由著名科学家撰写的评论。Annual Reviews分生物医学、物理学和社会科学三个主题,共出版29种期刊。 ASCE The American Society of Civil Engineers美国土木工程师协会数据库 ASME Technical Journal 美国机械工程师学会数据库。美国机械工程师学会,主持着世界上最大的技术出版之一,制定各种工业和制造业

行业标准。由于工程领域各学科间交叉性不断增长,ASME出版物也相应提供了跨学科前沿科技的资讯。 B Beilstein/Gmelin crossfire 以电子方式提供包含可供检索的化学结构和化学反应、相关的化学和物理性质,以及详细的药理学和生态学数据在内的最全面的信息资源。 BIOSIS Previews 世界上最大的关于生命科学的文摘索引数据库。Blackwell 英国Blackwell(英文文献期刊) (https://www.360docs.net/doc/3e11043210.html,) Blackwell出版公司是世界上最大的期刊出版商之一(总部设在英国伦敦的牛津),以出版国际性期刊为主,包含很多非英美地区出版的英文期刊。它所出版的学术期刊在科学技术、医学、社会科学以及人文科学等学科领域享有盛誉。 近年来,Blackwell出版的期刊不断发展。目前,Blackwell出版期刊总数已超过700种,其中理科类期刊占54%左右,其余为人文社会科学类。涉及学科包括:农业、动物学、医学、工程、数学统计、计算机技术、商业经济、生命科学、物理学、人文科学、艺术、社会及行为科学等。 https://www.360docs.net/doc/3e11043210.html,V5ZW11Y2geE5 Blackwell出版期刊的学术质量很高,很多是各学科领域内的核心刊物,据最新统计,其中被SCI收录的核心期刊有239种,被SSCI 收录的有118种。

9个常用的国外英文论文文献数据库

9个常用的国外英文论文文献数据库9个论文文献数据库,科研搬砖,阅读涨姿势,论文写作小帮手!先说说什么是数据库:学术科研中说的「数据库」和「文献数据库」,往往是一种网站的形式,这个网站的贮存了大量文献数据(比如论文)可以简单的理解为一个网络图书馆。 数据库中的论文往往都是耗费了大量的时间和精力整理出 来的,还有很多是需要购买版权才可以放在互联网上的,再加上维护这个网站本身就耗费颇多,因此这些数据库通常不是完全免费的,你可以在上面免费查找文献,浏览摘要等简介内容,但是如果你要下载文献,就要付钱。 大学因为科研和教学需要,常年要下载大量的论文材料,所以就会和数据库的经营者签订很多协议,例如包年,就是给一定量的钱,然后就可以无限制下载论文。也有按照下载的数量进行计费。那英语作为世界第一学术语言,有哪些数据库是值得大家分享的呢?1、Wiley InterScience(英文文献期刊)Wiley InterScience是John Wiely & Sons公司创建的动态在线内容服务,1997年开始在网上开通。通过InterScience,Wiley 学术期刊集成全文数据库(Academic Search Premier,简称ASP):包括有关生物科学、工商经济、资讯科技、通讯传播、工程、教育、艺术、文学、医药学等领域的七千多种期刊,

其中近四千种全文刊。 学术研究图书馆(Academic Research Library,简称ARL)综合参考及人文社会科学期刊论文数据库,涉及社会科学、人文科学、商业与经济、教育、历史、传播学、法律、军事、文化、科学、医学、艺术、心理学、宗教与神学、社会学等学科,收录2,300多种期刊和报纸,其中全文刊占三分之二,有图像。可检索1971年来的文摘和1986年来的全文。商业信息数据库(ABI/INFORM)ABI即为Abstracts of Business Information的缩写,世界着名商业及经济管理期刊论文数据库,收录有关财会、银行、商业、计算机、经济、能源、工程、环境、金融、国际贸易、保险、法律、管理、市场、税收、电信等主题的1,500多种商业期刊,涉及这些行业的市场、企业文化、企业案例分析、公司新闻和分析、国际贸易与投资、经济状况和预测等方面,其中全文刊超过50%,其余为文摘,有图像。 医学电子期刊全文数据库(ProQuest Medical Library)该数据库收录有220种全文期刊,文献全文以PDF格式或文本加图像格式存储;收录范围包括所有保健专业的期刊,有护理学、儿科学、神经学、药理学、心脏病学、物理治疗及其它方面。 6. BlackwellBlackwell出版公司是世界上最大的期刊出版商之一(总部设在英国伦敦的牛津),以出版国际性期刊为主,

相关文档
最新文档