期刊文献+
共找到40,901篇文章
< 1 2 250 >
每页显示 20 50 100
Dynamic Update Scheme of Spectrum Information Based on Spectrum Opportunity Incentive in the Database-Assisted Dynamic Spectrum Management
1
作者 Zhang Yu Chen Yong +1 位作者 He Panfeng Cai Yueming 《China Communications》 SCIE CSCD 2024年第3期75-90,共16页
To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic upd... To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic update mechanism of SI based on spectrum opportunity incentive is established, in which spectrum users are encouraged to actively assist the database to update SI in real time. Secondly, the information update contribution(IUC) of spectrum opportunity is defined to describe the cost of accessing spectrum opportunity for heterogeneous spectrum users, and the profit of SI update obtained by the database from spectrum allocation. The process that the database determines the IUC of spectrum opportunity and spectrum user selects spectrum opportunity is mapped to a Hotelling model. Thirdly, the process of determining the IUC of spectrum opportunities is further modelled as a Stackelberg game by establishing multiple virtual spectrum resource providers(VSRPs) in the database. It is proved that there is a Nash Equilibrium in the game of determining the IUC of spectrum opportunities by VSRPs. Finally, an algorithm of determining the IUC based on a genetic algorithm is designed to achieve the optimal IUC. The-oretical analysis and simulation results show that the proposed method can quickly find the optimal solution of the IUC, and ensure that the spectrum resource provider can obtain the optimal profit of SI update. 展开更多
关键词 database-assisted dynamic spectrum management HOTELLING information updating contribution spectrum information updating STACKELBERG
下载PDF
Smart City Rail Transit Operation and Management Information Construction Strategy
2
作者 Jing Sun 《Journal of World Architecture》 2024年第2期7-11,共5页
Rail transit is considered one of the safest and most efficient modes of transportation.Ticketing,vehicle dispatching,and passenger flow control during rail transit operations in China have been improving over the yea... Rail transit is considered one of the safest and most efficient modes of transportation.Ticketing,vehicle dispatching,and passenger flow control during rail transit operations in China have been improving over the years.Smart city construction and intelligent management models has also been increasingly emphasized with the rapid development of information and internet technology.Therefore,it is essential to conduct relevant research and discussions to improve the overall efficiency and quality of urban rail transit operation and management.This article provides an overview of smart city rail transit operation and management informatization,the principles of construction,and the functions of smart city rail transit operation and management informatization.Additionally,it discusses the strategies for the construction of smart city rail transit operation and management information and its development prospects. 展开更多
关键词 Smart city Rail transit operation and management information construction
下载PDF
Improvement of the nutritional support management system for patients in intensive care units
3
作者 Yuan-Yuan Zhang Chun-Yi Wang +5 位作者 Dong-Xian Guo Hai-Nu Gao Xian-Shan Jin Yan-Li Wu Lu-Han Chen Zhi-Xian Feng 《World Journal of Psychiatry》 SCIE 2024年第1期44-52,共9页
BACKGROUND Nutritional support for patients hospitalized in the intensive care unit(ICU)is an important part of clinical treatment and care,but there are significant implementation difficulties.AIM To introduce a modi... BACKGROUND Nutritional support for patients hospitalized in the intensive care unit(ICU)is an important part of clinical treatment and care,but there are significant implementation difficulties.AIM To introduce a modified nutritional support management system for ICU patients based on closed-loop information management and psychological counseling.METHODS The division of functions,personnel training,system construction,development of an intelligent decision-making software system,quality control,and improvement of the whole process were carried out to systematically manage nutritional support for ICU patients.RESULTS Following the implementation of the whole process management system,the scores of ICU medical staff’s knowledge,attitudes/beliefs,and practices regarding nutritional support were comprehensively enhanced.The proportion of hospital bed-days of total enteral nutrition(EN)in ICU patients increased from 5.58%to 11.46%,and the proportion of EN plus parenteral nutrition increased from 42.71%to 47.07%.The rate of EN initiation within 48 h of ICU admission increased from 37.50%to 48.28%,and the EN compliance rate within 72 h elevated from 20.59%to 31.72%.After the implementation of the project,the Self-rating Anxiety Scale score decreased from 61.07±9.91 points to 52.03±9.02 points,the Self-rating Depression Scale score reduced from 62.47±10.50 points to 56.34±9.83 points,and the ICU stay decreased from 5.76±2.77 d to 5.10±2.12 d.CONCLUSION The nutritional support management system based on closed-loop information management and psychological counseling achieved remarkable results in clinical applications in ICU patients. 展开更多
关键词 Closed-loop information Psychological counseling Intensive care unit patients Nutritional support management system
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
4
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRimE Threat Actors Threat Modeling Security Architecture
下载PDF
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management
5
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWim) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
Information Management in Disaster and Humanitarian Response: A Case in United Nations Office for the Coordination of Humanitarian Affairs
6
作者 Solomon M. Zewde 《Intelligent Information Management》 2023年第2期47-65,共19页
To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to imp... To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to improve its information management and increase the availability of accurate, real-time data for disaster and humanitarian response teams, significant gaps persist. There are inefficiencies in the emergency management of data at every stage of its lifecycle: collection, processing, analysis, distribution, storage, and retrieval. Disaster risk reduction and disaster risk management are the two main tenets of the United Nations’ worldwide plan for disaster management. Information systems are crucial because of the crucial roles they play in capturing, processing, and transmitting data. The management of information is seldom discussed in published works. The goal of this study is to employ qualitative research methods to provide insight by facilitating an expanded comprehension of relevant contexts, phenomena, and individual experiences. Humanitarian workers and OCHA staffers will take part in the research. The study subjects will be chosen using a random selection procedure. Online surveys with both closed- and open-ended questions will be used to compile the data. UN OCHA offers a structure for the handling of information via which all humanitarian actors may contribute to the overall response. This research will enable the UN Office for OCHA better gather, process, analyze, disseminate, store, and retrieve data in the event of a catastrophe or humanitarian crisis. 展开更多
关键词 information Systems management information management UNOCHA (United Nations Office for Coordination of Humanitarian Affairs) Humanitarian Emergency Actors DISASTER Risk Reduction RESPONSE Emer-gency management
下载PDF
Analysis of the Standardization of Administrative Management in Colleges and Universities Under the Background of Information Technology
7
作者 Wei Wang 《Journal of Contemporary Educational Research》 2023年第4期72-77,共6页
In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and qu... In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and quality of work by dealing with and constructing information-based methods,innovating administrative management models,and adopting more efficient and scientific methods to address various problems and shortcomings encountered in work.As an important part of university management,administrative management is a complex task.Establishing a standardized management model through information technology can further improve the comprehensive efficiency of administrative management.In this regard,the administrative standardization in universities under the background of information technology is analyzed and studied in this paper. 展开更多
关键词 information background UNIVERSITIES Administrative management Standardization Online publication:April 27 2023
下载PDF
Design of User Interface for Tractor Cab Real-time Information Management System 被引量:2
8
作者 Weiwei ZHOU Yang LU +2 位作者 Chunxia JIANG Zhixiong LU Wenxin JIN 《Asian Agricultural Research》 2015年第11期53-57,61,共6页
In this paper,the user interface of tractor cab real-time information management system was designed. Based on the principle of "user friendly",it reasonably arranged spatial position of information manageme... In this paper,the user interface of tractor cab real-time information management system was designed. Based on the principle of "user friendly",it reasonably arranged spatial position of information management system according to spatial distribution of tractor cab. Then,it analyzed operation habits and thinking ways of drivers,and formulated design principle meeting demands of drivers. Besides,it used LabView software to design user interface,including interface layout and interface design. User interface includes basic information interface,job information interface,camera monitoring interface,and fault diagnosis interface. Finally,it made evaluation of the user interface from color,indicator lamp,dial,and pointer. Results indicate that the designed user interface layout conforms to cognition mentality and operation habits and easy to get familiar and grasp; graphical interface is vivid and easy to stimulate pleasure of drivers in operation; interface color matching is coordinated; the layout of controls is hierarchical and logic,and operating mode is consistent with Windows system. 展开更多
关键词 TRACTOR information management system USER INTERFACE LabView
下载PDF
Developing a Geological Management Information System: National Important Mining Zone Database 被引量:1
9
作者 左仁广 汪新庆 夏庆霖 《Journal of China University of Geosciences》 SCIE CSCD 2006年第1期79-83,94,共6页
Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics data... Geo-data is a foundation for the prediction and assessment of ore resources, so managing and making full use of those data, including geography database, geology database, mineral deposits database, aeromagnetics database, gravity database, geochemistry database and remote sensing database, is very significant. We developed national important mining zone database (NIMZDB) to manage 14 national important mining zone databases to support a new round prediction of ore deposit. We found that attention should be paid to the following issues: ① data accuracy: integrity, logic consistency, attribute, spatial and time accuracy; ② management of both attribute and spatial data in the same system;③ transforming data between MapGIS and ArcGIS; ④ data sharing and security; ⑤ data searches that can query both attribute and spatial data. Accuracy of input data is guaranteed and the search, analysis and translation of data between MapGIS and ArcGIS has been made convenient via the development of a checking data module and a managing data module based on MapGIS and ArcGIS. Using AreSDE, we based data sharing on a client/server system, and attribute and spatial data are also managed in the same system. 展开更多
关键词 geological management information system checking data ARCSDE transforming data format data sharing data security
下载PDF
Trust and Security on Semantic HIM (Health Information Management)
10
作者 Nasim Khozouei Razie Vanda Peyman Khozouei 《Intelligent Information Management》 2012年第6期401-406,共6页
Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-base... Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-based medicine, so that is the most important, richest and the most realistic source of medical and health information. Health information management systems that require systems to the storage, retrieval, storage and elimination of health records (by law), and adjust to the rules of professional. These processes are difficult and time consuming for human. In the meantime semantic HIM seem best solution. 展开更多
关键词 HEALTH information management (Him) MEDICAL Document HEALTH information System(HIS) SEMANTIC Web Security TRUST
下载PDF
The Effectiveness of Blackboard System, Uses and Limitations in Information Management
11
作者 Jamilah A. Alokluk 《Intelligent Information Management》 2018年第6期133-149,共17页
This paper presents a review of the literature on the effectiveness of Blackboard system, its uses and limitations in information management and highlights the ongoing debate of it. A critical evaluation of Blackboard... This paper presents a review of the literature on the effectiveness of Blackboard system, its uses and limitations in information management and highlights the ongoing debate of it. A critical evaluation of Blackboard system literature reveals a good number of academic views, studies, theories, models and experiences regarding the virtual learning environment. The extant literature shows that the world of information management is always in flux as it is being impacted on by the learning technology such as blackboard system. Blackboard system now has a recognised presence in the information management of the education system. Now the question is: how effective is this Blackboard system? The article will explore, in part, how blackboard is designed as suitable learning models in terms of learner cognitive engagement and constructivist perspective, resulting in the effective Blackboard system. It will further cover to review the effectiveness of Blackboard as an aid to pedagogy. Finally, the article will also present a comparison between Blackboard and other LMS such as Moodle to explore the effectiveness and limitations of the Blackboard for better academic information management. 展开更多
关键词 BLACKBOARD Virtual LEARNING Environment (VLE) PEDAGOGY LEARNING management System (LMS) information management
下载PDF
The Implementation of Human Resource Management Information System
12
作者 Hsiu-Li Liao Su-Houn Liu Ling Chen 《Management Studies》 2020年第2期116-120,共5页
Human resource management has begun to conduct information technology to enhance the efficiency of human resource work.The research objectives are:(1)Does the implementation of human resource management information sy... Human resource management has begun to conduct information technology to enhance the efficiency of human resource work.The research objectives are:(1)Does the implementation of human resource management information system enhance work efficiency?(2)What are key factors to influence the implementation of human resource management information system?This research adopts case study with in-depth interviews at W University of Science and Technology.The interviewees of this study were mainly one director and four staffs working at the Department of Human Resource.The research results show that the system quality is acceptable and the system security is perfect.All users have consistent opinions on the bad quality of information and they spend more time to check the data at work.The system use frequency of each user is different,mainly depending on the content of their work.Users who are used less have higher user satisfaction in human resource management information system.Most users perceive that the personal benefit is increased,and feel that this system can enhance personal benefits and improve the organization benefits for personnel management. 展开更多
关键词 human resource management system quality information quality PERSONAL
下载PDF
Design and implementation of the system of students information management based on WEB 被引量:1
13
作者 Xiang Xin 《International Journal of Technology Management》 2014年第11期1-3,共3页
关键词 学生信息管理系统 工具设计 WEB NET技术 Server 高校学生 体系结构 管理工作
下载PDF
Management of Address Information to Improve Quality of Customer Contact
14
作者 CHANG Taiwoo PARK Jinwoo +2 位作者 PARK Chankwon JEONG Hanil NAM Yunseok 《Journal of Electronic Science and Technology of China》 2004年第3期122-127,共6页
Customer relationship management systems are gaining importance in today's business environment since customer satisfaction is crucial to the success of an enterprise, and especially so in e-business environment w... Customer relationship management systems are gaining importance in today's business environment since customer satisfaction is crucial to the success of an enterprise, and especially so in e-business environment where customers can find substitute suppliers quite easily. In CRM, the quality of customer information is very important, and the address information even more so. It is because the address information plays a major role for customer contact channel and for timely and effective marketing service. Furthermore, it gives the basic source of geographic information for the offline delivery, the terminal activity of the e-commerce. In this study, we analyze various standards and proposals for the address information, and propose data models for the management of the information focusing on address components, and proto-type systems for management and service. 展开更多
关键词 customer relationship management customer information address information address component
下载PDF
Reconstruction and implementation of information management system of library based on MARC
15
作者 陈凤岩 唐振宇 步兆军 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2005年第2期209-212,共4页
The limitations of MARC and the advantages of applying XML in the library are analyzed. We also have made partial reconstruction to the existing Information Management System of the HIT library and implementation of t... The limitations of MARC and the advantages of applying XML in the library are analyzed. We also have made partial reconstruction to the existing Information Management System of the HIT library and implementation of the prototype system. This research work will significantly influence the coordination of international library resource databases and the achievement of global information sharing. 展开更多
关键词 信息管理系统 XML MARC 图书馆 自动化技术
下载PDF
Development of an integrated water resources information management system(WRIMS)
16
《Global Geology》 1998年第1期106-106,共1页
关键词 Development of an integrated water resources information management system WRimS
下载PDF
Measuring the Impact of Information Technology (IT) on Supply Chain Management (SCM) Through Indicators: An Exploratory Study
17
作者 Marcelo T. Okano Femando A. S. Marins 《Journal of Modern Accounting and Auditing》 2014年第5期583-593,共11页
关键词 供应链管理 IT部门 信息技术 SCM 测量 合作伙伴 专业人士 交付使用
下载PDF
The Role of Information Security Development (ISD) in Effective Information Security Management (ISM) Implementation in the Banks: A Nigerian Case
18
作者 Dorcas Adebola Babatunde Mohamad Hisyam Selamat Ramat Titilayo Salman 《Journal of Modern Accounting and Auditing》 2014年第5期614-619,共6页
关键词 信息安全管理 尼日利亚 ISM ISD 银行 组织文化 案例 安全计划
下载PDF
Design and Implementation of the Road Traffic Offense Information Management System Based on J2EE
19
作者 Ai-mei XIAO 《通讯和计算机(中英文版)》 2015年第1期1-5,共5页
关键词 信息管理系统 道路交通管理 J2EE框架 交通违法 JAVABEANS组件 设计 信息共享 信息化管理
下载PDF
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
20
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 information Technology (IT) Identity and Access management (IAM) Saviynt User Identities Access Privileges Authentication Processes Risk management
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部