Malfunction data management system for facility life cycle maintenance

2003 ◽  
Vol 2003.7 (0) ◽  
pp. 339-340
Author(s):  
Munehisa FUKUYAMA ◽  
Satoshi NAGASHIMA ◽  
Muneyuki HIRAI ◽  
Shozo TAKATA
10.28945/3651 ◽  
2017 ◽  
Vol 6 ◽  
pp. 01
Author(s):  
Jay Hoecker ◽  
Debbie Bernal ◽  
Alex Brito ◽  
Arda Ergonen ◽  
Richard Stiftinger

The current data management systems for the life cycle of scientific models needed an upgrade. What technology platform offered the best option for an Enterprise Data Management system?


2012 ◽  
Vol 83 ◽  
pp. 188-197
Author(s):  
Ke Chang Lin ◽  
Yi Qing Ni ◽  
Xiao Wei Ye ◽  
Kai Yuan Wong

The data management system (DMS) is an essential part for long-term structural health monitoring (SHM) systems, which stores a pool of monitoring data for various applications. A robust database within a DMS is generally used to archive, manage and update life-cycle information of civil structures. However, many applications especially those to large-scale structures provide little support for visualizing the long-term monitoring data. This paper presents the development of an efficient visualized DMS by integrating 4-dimension (4D) model technology, nested relational database, and virtual reality (VR) technology. Spatial data of the 4D model are organized in nested tables, while real-time (temporal) monitoring data are linked to the 4D model. The model is then reconstructed by use of an OpenSceneGraph 3D engine. A user interface is developed to query the database and display the data via the 4D model. To demonstrate its efficiency, the proposed method has been applied to the Canton Tower, a supertall tower-like structure instrumented with a long-term SHM system


1984 ◽  
Vol 106 (4) ◽  
pp. 297-303 ◽  
Author(s):  
W. C. Mosley

Certain aspects of the space station data system set it apart from any other spacecraft data system ever developed: serviceable and repairable to a degree never before possible; operational lifetime spans generations of technology; dynamically extendible to accommodate evolutionary growth; unprecedented levels of complexity will occur early in the life cycle; unprecedented levels of data storage and onboard processing capacity will be required early in the life cycle. These factors, as well as others that are known, top-level space station requirements, form the basis from which derived data management system requirements (again top-level) are assembled. From these requirements, the architectural properties that need emphasis in the architectural selection process are identified. Additionally, other issues that may influence the architecture are identified and an architectural baseline is established. From this base, an example of controlled growth helps to identify other technology issues, so that the architectural discussion ends with a summary of technology issues that result from the requirements and the need for tools and techniques to support controlled growth. The architecture discussion is followed by a discussion of generic technology areas as well as related technology areas and the challenges to initial space station development. Technology areas that offer promise of enhanced capabilities in the future are also identified. This paper is not a comprehensive assessment of data management system technology, nor is it advocating a particular approach. Its purpose is to illuminate design and technology areas for further discussion and formal investigation.


2017 ◽  
Vol 4 (1) ◽  
pp. 62-66
Author(s):  
Luyen Ha Nam

From long, long time ago until nowadays information still takes a serious position for all aspect of life, fromindividual to organization. In ABC company information is somewhat very sensitive, very important. But how wekeep our information safe, well we have many ways to do that: in hard drive, removable disc etc. with otherorganizations they even have data centre to save their information. The objective of information security is to keep information safe from unwanted access. We applied Risk Mitigation Action framework on our data management system and after several months we have a result far better than before we use it: information more secure, quickly detect incidents, improve internal and external collaboration etc.


2014 ◽  
Vol 36 (7) ◽  
pp. 1485-1499 ◽  
Author(s):  
Jie SONG ◽  
Tian-Tian LI ◽  
Zhi-Liang ZHU ◽  
Yu-Bin BAO ◽  
Ge YU

1991 ◽  
Author(s):  
Douglas E. Shackelford ◽  
John B. Smith ◽  
Joan Boone ◽  
Barry Elledge

Sign in / Sign up

Export Citation Format

Share Document