Construction of ASP Platform Based on the Manufacture of Typical Components for the Engineering Machinery

Article Preview

Abstract:

Briefly reviewed the origin and presence of ASP, elicited the basic requirements of the construction of ASP platform on all-purpose and special needs for enterprises manufacturing the products of engineering machinery. The hierarchy of overall structure for ASP was presented with five layers: client’s layer, representation layer, professional logic layer, integration layer, and resource layer for different functions. Emphasis was focused on the data centers with the representation layer closer to the client’s terminals, the original IT resources stored in the local areas, and important data stored in the secure stations and backup and with standby data centers; on the manufacturing system based on CAD/CAPP/VM and other related techniques; and on the security system with access manipulations, secret keys, ID discriminations and audit tracking. The initial ASP platform has been set up for the medium and small sized enterprises, and was actuated with Rational Rose, UML adopted for the web system, and JavaScript employed for the events, databases, and development of the user’s terminals. Quanhigh Machinery Company was taken as an example in application with four kinds of typical components of engineering machinery.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

89-93

Citation:

Online since:

December 2007

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2008 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Y. Zhang: Chinese Journal of Computers. 2006, Vol. 29 (2006) No. 8, pp.1453-1459.

Google Scholar

[2] J. Cao, S.S. Zhang and M.L. Li: Chinese Journal of Computers, Vol. 28 (2005) No. 4, pp.721-730.

Google Scholar

[3] Y. P. Chen, Z.Z. Li, Y.Z. Tang and et al: Chinese Journal of Computers, Vol. 29 (2006) No. 7, pp.1076-1083.

Google Scholar

[4] W.Q. Sun, B.H. Shan, C. Zhang and et al: Chinese Journal of Computers, Vol. 29(2006) No. 7, pp.1199-1208.

Google Scholar

[5] B. Wu, J. Shi: Network Security Technology and Applications, Vol. 11(2006), pp.39-40.

Google Scholar

[6] P.Z. Revesz: ACM Transactions on Database Systems, Vol. 23(1998) No. 1, pp.58-99.

Google Scholar

[7] J. Mirkovic, G. Prier: Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, (2002), pp.312-321.

Google Scholar

[8] Y. Zhong, X.L. Qin, J.P. Zheng and et al: Chinese Journal of Computers, Vol. 29 (2006) No. 8, pp.1408-1418.

Google Scholar