Computer application systems engineering center: a software factory

Author(s):  
K. Yamashita ◽  
O. Sasaki
2012 ◽  
Vol 241-244 ◽  
pp. 747-751
Author(s):  
Ding Li ◽  
Shuang Ya Zhou ◽  
Shun Tao ◽  
Jia Jia Xue ◽  
Xiang Ning Xiao

The common information model CIM in IEC61970 standard is an abstract description of existing physical objects and their relationship in power system, which has been widely used in the construction of computer application systems of power system. In order to track the real-time operation state of power system when analyzing the area of vulnerability (AOV) to voltage sags, this paper proposes a novel method to obtain the data required by AOV analysis through parsing source data defined with CIM, and source data are from the SCADA system, equipment management system and management information system of safe production. The design scheme of AOV analysis using CIM is introduced, and method of parsing CIM is also provided. Finally, the method is applied to a regional power system of China, and graphic results of AOV are shown under balanced and unbalanced faults.


2011 ◽  
Vol 383-390 ◽  
pp. 435-439
Author(s):  
Yi Bing Cao ◽  
Yi Xin Hua ◽  
Jiang Shui Zhang ◽  
Xiao Lin Liu ◽  
Hui Zhang

With the development of computer technology, the importance attached to the security of computer application systems is increasing day by day. Access control, as an important security technology, has been applied in the operating system, the database management system, security management and network operating system etc. This paper adopt the system ideology of high cohesion and low coupling in software engineering, achieve the design of login component by improving RBAC model under .NET platform, the model increases mechanism of direct authorize the users and shield part of users’ authority based on authorize main role, enriches the old RBAC mode of controlling authority, avoids the illegal operation of users, make sure the security of the system. Meanwhile, the component is well designed, and can be easily used as login component in large systems.


1996 ◽  
Vol 11 (2) ◽  
pp. 119-128
Author(s):  
Simon Ho ◽  
Richard Pike

While recent surveys suggest that capital budgeting systems in business organizations continue to become more formalized and sophisticated, a constraint on the use of sophisticated capital budgeting techniques seems to be the degree of support provided by firms’ capital budgeting information systems (CABIS). This paper, based on a survey of 146 large firms, outlines the current status of CABIS and their usage pattern. It was found that although two-thirds of sample firms have specific computer application systems for capital budgeting, most CABIS are relatively unsophisticated and less than adequate in providing the information and decision support capabilities required to use sophisticated capital budgeting techniques effectively. In particular, the barrier and problems encountered in the use of probabilistic risk analysis were explored. Implications of these findings are discussed.


2011 ◽  
Vol 63-64 ◽  
pp. 73-76
Author(s):  
Li Min Liu

Embedded systems are the most popular computer application systems. Their applications have changed life of people in the world. They can be found anywhere, and almost can be used in every field. But few people know the concept of an embedded system. In this paper, the concept and definition of embedded systems are discussed and analyzed. A considered concept of embedded system should include several factors, computer core, to build in, managed object and relevant software, despite to issue a consistent definition is difficult.


1985 ◽  
Vol 10 (1) ◽  
pp. 97-111 ◽  
Author(s):  
Heinrich C. Mayr ◽  
Peter C. Lockemann ◽  
Martin Bever

Sign in / Sign up

Export Citation Format

Share Document