Font Size: a A A

The Research And Implementation Of Plan-Desinging Domain’s Document Model And Knowledge Search

Posted on:2014-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:Y W LiFull Text:PDF
GTID:2248330398472284Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the development of21century’s economy, knowledge plays a very important role. Along with the development and expansion of the enterprise, enterprise’s knowledge is accumulating all the way, and it has become an important wealth that can’t be deprived by other enterprises.Recently, in order to manage the enterprise’s knowledge efficiently, knowledge management as a kind of new enterprise management mode, is gradually penetrate into more and more enterprises. Enterprise knowledge management platform has become more mature than before, the platform can effectively integrate the various kinds of knowledge, and users can quickly search the information through a search engine with keywords and content that matching the data information. In this way, the search engine can provide much information for the users, which greatly facilitated the information’s sharing between users in a certain extent.Although the knowledge platform supplies strong functions for users, there are also some problems we have to solve. For the first one, it ignores the security problem of the enterprise. For the second one, it cannot guarantee the precision of the search, although it can ensure the accuracy rate. In this paper, I will carry out the research work based on the two questions, and the research contents are as follows:1) The internal knowledge that stores in the knowledge management platform has several carriers, and most of it stores in document format. This paper will be on the base that knowledge is stored in document, then research the document classification, combine the organizational structure of this field. In this way, the knowledge is easy to store and search.2) Considerate the enterprise’s internal knowledge security, this paper adopts role based access control technique in the system; add the concept "role" between users and permissions. The system establishes contact not only between the users and the roles, but also between the roles and the permissions to ensure the security of enterprise knowledge. Users of the system are divided into a number of groups, and then assign the appropriate role to the user group, and each role has its corresponding set of permissions. We can just assign role for each user when they are created, in this way it can simplifies the user rights management, and reduce system overhead. When users login in the system, they can access the system content according to their role.3)Considerate search of the enterprise’s internal knowledge efficient, this paper uses the rules engine for its ease of use and functional completeness, on the base of studying and using rule engine, establish a set of rules to improve the knowledge utilization.This paper will implement a user access system according to the role-based control and rule engine technology based on the three mentioned point above. The users will login the system according to the corresponding role, then based on the user’s role and user search keywords, in combination with a rule engine in the use of rules, to provide users with the corresponding enterprise knowledge.
Keywords/Search Tags:Knowledge Management, Rule Engine, Role basedaccess control, Search
PDF Full Text Request
Related items