期刊文献+
共找到4,629篇文章
< 1 2 232 >
每页显示 20 50 100
The Research on Open Sharing of Higher Education Park Based on Intelligent Security System
1
作者 Yan Dong 《Journal of Computer and Communications》 2024年第3期101-106,共6页
The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, e... The intelligent security system is a series of systems that use modern information technology means such as artificial intelligence, cloud computing, big data, face recognition to carry out comprehensive monitoring, early warning, prevention and control, disposal, etc, for security protection. It is the development trend of security system in the future, and it is also the basis for open sharing between higher education parks and universities. By using content analysis, unstructured interviews and other research methods, this paper deeply studies the feasibility and basic ideas of the construction of intelligent security system in Shahe Higher Education Park, and forms basic experience and typical practices through the project construction, which further promotes the more intelligent, standardized and scientific safety management in colleges and universities. It really provides an important theoretical basis and practical guidance for the opening and sharing between higher education parks and universities. 展开更多
关键词 Intelligent security system Higher Education Park Open Sharing
下载PDF
An Efficient SDFRM Security System for Blockchain Based Internet of Things
2
作者 Vivekraj Mannayee Thirumalai Ramanathan 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1545-1563,共19页
Blockchain has recently sparked interest in both the technological and businessfirms.The Internet of Things's(IoT)core principle emerged due to the connectivity of several new technologies,including wireless techno... Blockchain has recently sparked interest in both the technological and businessfirms.The Internet of Things's(IoT)core principle emerged due to the connectivity of several new technologies,including wireless technology,the Inter-net,embedded automation systems,and micro-electromechanical devices.Manu-facturing environments and operations have been successfully converted by implementing recent advanced technology like Cloud Computing(CC),Cyber-Physical System(CSP),Information and Communication Technologies(ICT)and Enterprise Model,and other technological innovations into the fourth indus-trial revolution referred to as Industry 4.0.Data management is defined as the pro-cess of accumulation in order to make better business decisions,and process,secure and store information about a company.In the incipient model,there are interconnected contrivances and Machine-to-Machine(M2M)interactions,and transaction data are stored on the Blockchain.Security is a challenging aspect that must be punctiliously considered during the design and development phases of a CSP.In this research article,we proposed a Secure and Distributed Framework for Resource Management(SDFRM)in Industry 4.0 environments within a distribu-ted and collaborative Industry 4.0 system,the dynamic and trust-based Distributed Management Framework(DMF)of shared resource access.Such issues are focused by taking into account of the traditional characteristics of IoT/Industrial Internet of Things’(IIoT)-predicated environments,an SDFRM in Industry 4.0 environments within a distributed and collaborative Industry 4.0 system.Also,to ensure strong privacy over the procedures associated with Access Control(AC),a privacy-preserving method is proposed and integrated into the DMF.The proposed DMF,based on blockchain technology and peer-to-peer networks,allows dynamic access management and system governance without using third parties who could be attacked.We worked hard to design and implement the pro-posal to demonstrate its viability and evaluate its performance.Our proposal out-performs the Multichain Blockchain in terms of successful storage transactions with an achieved average throughput of 98.15%. 展开更多
关键词 Internet of things blockchain data privacy security system distributed management IIoT
下载PDF
Research on the Construction of Computer Network Security System in Middle School Campus Network 被引量:1
3
作者 Haijing Xing 《Journal of Electronic Research and Application》 2023年第3期27-32,共6页
In order to improve the security of high school campus networks,this paper introduces the goal,system composition,and function of the network security of high school campus networks,and puts forward a series of strate... In order to improve the security of high school campus networks,this paper introduces the goal,system composition,and function of the network security of high school campus networks,and puts forward a series of strategies,including the establishment of network security protection system,data backup and recovery mechanism,and strengthening network security management and training.Through these strategies,the safety and stable operation of the campus network can be ensured,the quality of education can be improved,and school’s development can be promoted. 展开更多
关键词 Network security Physical security Software security
下载PDF
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
4
作者 Iman Almomani Walid El-Shafai +3 位作者 Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa 《Computers, Materials & Continua》 SCIE EI 2023年第2期3515-3537,共23页
Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private s... Nowadays,there is tremendous growth in biometric authentication and cybersecurity applications.Thus,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors.Therefore,designing and implementing robust security algorithms for users’biometrics is still a hot research area to be investigated.This work presents a powerful biometric security system(BSS)to protect different biometric modalities such as faces,iris,and fingerprints.The proposed BSSmodel is based on hybridizing auto-encoder(AE)network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy.The employed AE network is unsupervised deep learning(DL)structure used in the proposed BSS model to extract main biometric features.These obtained features are utilized to generate two random chaos matrices.The first random chaos matrix is used to permute the pixels of biometric images.In contrast,the second random matrix is used to further cipher and confuse the resulting permuted biometric pixels using a two-dimensional(2D)chaotic logisticmap(CLM)algorithm.To assess the efficiency of the proposed BSS,(1)different standardized color and grayscale images of the examined fingerprint,faces,and iris biometrics were used(2)comprehensive security and recognition evaluation metrics were measured.The assessment results have proven the authentication and robustness superiority of the proposed BSSmodel compared to other existing BSSmodels.For example,the proposed BSS succeeds in getting a high area under the receiver operating characteristic(AROC)value that reached 99.97%and low rates of 0.00137,0.00148,and 3516 CMC,2023,vol.74,no.20.00157 for equal error rate(EER),false reject rate(FRR),and a false accept rate(FAR),respectively. 展开更多
关键词 Biometric security deep learning AE network 2D CLM cybersecurity and authentication applications feature extraction unsupervised learning
下载PDF
Analytical Investigation on Computer Network Security System of Colleges and Universities
5
作者 徐悦 《电脑知识与技术(过刊)》 2013年第1X期266-268,共3页
With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management cond... With the development of network technology,computer systems of colleges and universities gradually use network management and services,which provides comprehensive and convenient information access and management conditions.How ever,in the network environment,the security of the system faces security threats like virus,malicious software and human at tack,which may make the network data of the computer system damaged and tampered,or even lead to network system paraly sis,breakdown of system concerning management and payment,missing and stealing of confidential documents.Therefore,it is of important application significance to promote the security of computer network systems of colleges and universities.This paper conducts comprehensive analysis on the security system of computer network systems of colleges and universities,elaborates its R&D and application status and puts forward specific schemes of prevention and solutions,which provides suggestions and refer ence for its construction. 展开更多
关键词 Colleges and Universities Computer Network security system PREVENTION
下载PDF
The Social Security System in Reform
6
《China Today》 1994年第8期18-20,共3页
China,already possessing a large number of retirees,will become one of the countries with a predominant-ly aged population by the end of the century.A retirement boom is ex-pected for the year 2030,when China will hav... China,already possessing a large number of retirees,will become one of the countries with a predominant-ly aged population by the end of the century.A retirement boom is ex-pected for the year 2030,when China will have over 100 million senior citizens living on an annual pension of billions of yuan.There-fore China is working to legislate a Chinese style social insurance system by the year 2000.This system will be independent of enterprises and cov-er workers in both rural and urban areas.It will be reasonable in its.expenditures because its funding will come from a wide range of sources.It will make a balanced and rational use of these funds and will be run by a highly socialized and coordinated administration. 展开更多
关键词 security The Social security system in Reform
下载PDF
China's Social Security System for the Urban Poor
7
《China's Foreign Trade》 2000年第1期43-43,共1页
China'ssocialsecuritysystemiscomposedofthreefields:basiclivingsecurityforunemployedstaffandworkers,unemploymentinsuranceandminimumlivingseeurityforurbaninhabitants.Thebasiclivingconditionofunemployedstaffandworker... China'ssocialsecuritysystemiscomposedofthreefields:basiclivingsecurityforunemployedstaffandworkers,unemploymentinsuranceandminimumlivingseeurityforurbaninhabitants.Thebasiclivingconditionofunemployedstaffandworkersareguaranteedbyemploymentservicecent... 展开更多
关键词 security China’s Social security system for the Urban Poor
下载PDF
Study on the Construction of Eco-security System in China under the Ecological Civilization Concept——Based on the Ecological Civilization Construction in Qingzhen City of Guizhou Province 被引量:5
8
作者 QIU Gao-hui 《Meteorological and Environmental Research》 CAS 2011年第1期39-42,共4页
The construction of eco-security system was a complicated systematic project, included the comprehensive construction and collaborative propulsion of eco-environment system, eco-economy system, eco-culture system, eco... The construction of eco-security system was a complicated systematic project, included the comprehensive construction and collaborative propulsion of eco-environment system, eco-economy system, eco-culture system, eco-society system and eco-law system. The comprehensive, coordinated and sustainable development of ecology, economy and society only could be achieved under the guidance of ecological civilization concept by the integrated consideration, comprehensive planning and multi-coordination. 展开更多
关键词 Ecological civilization Ecological security Sustainable development China
下载PDF
The intelligent security system based on the public switch telephone network
9
作者 Tian-fu YUAN (Shanghai University of Engineering Science,shanghai 201620,China) 《Journal of Measurement Science and Instrumentation》 CAS 2010年第S1期11-14,共4页
This paper elaborates the design and development of the intelligent security system based on the public switch telephone network.The system includes two parts:security detection emission,and radio reception and signal... This paper elaborates the design and development of the intelligent security system based on the public switch telephone network.The system includes two parts:security detection emission,and radio reception and signal process connected to the phone line with the telephone set at home or in the office.The core of radio reception and signal process is Micro Control Unit,which, in coordination with other peripheral circuits such as telephone line interface,signaling tone detection,dual tone multi-frequency(DTMF)reception and emission,and voice notification,informs the subscriber of the alarm via voice through Public Switch Telephone Network(PSTN).In addition,the subscriber can easily modify telephone numbers stored in the system. 展开更多
关键词 INTELLIGENT control ENVIRONMENT MONITOR security m
下载PDF
Review of Effective Convergence between China's Rural Minimum Subsistence Security System and the Development Policy of Poverty Alleviation
10
作者 WEI Song School of Management,Guizhou University for Nationalities,Guiyang 550025,China 《Asian Agricultural Research》 2011年第4期66-69,共4页
Based on the conclusion of the related researches on China's rural poverty alleviation policies and poverty problems,studies of Chinese scholars on the convergence between rural minimum subsistence system and the ... Based on the conclusion of the related researches on China's rural poverty alleviation policies and poverty problems,studies of Chinese scholars on the convergence between rural minimum subsistence system and the development policies of poverty alleviation are illustrated and personal understandings proposed.On the one hand,considering the actual situations of the quickening of China's urbanization and deepening of poverty,it is necessary to make significant adjustment and transformation in China's poverty reduction policies and minimum subsistence security system.On the other hand,it is pointed out that there is no omnipotent experience to follow in the convergence of minimum subsistence security system and poverty reduction policies.The actual conditions in various regions should be taken into consideration.And it is suggested that China should achieve the organic integration of rural minimum subsistence security system and poverty alleviation policies from management,capital and policy. 展开更多
关键词 COUNTRYSIDE Minimum SUBSISTENCE security system Po
下载PDF
The Analysis and Amendment of Security System in 3G
11
作者 Min ZHAO Ling SHI 《Intelligent Information Management》 2009年第1期1-5,共5页
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper an... This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR. 展开更多
关键词 3G security 3G security Structure 3G AUTHENTICATION and KEY AGREEMENT protocol security arith- metic
下载PDF
Protection Model of Security Systems Based on Neyman-Person Criterion
12
作者 Haitao Lv Ruimin Hu +1 位作者 Jun Chen Zheng He 《Communications and Network》 2013年第3期578-583,共6页
In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the pr... In this paper security systems deployed over an area are regarded abstractly as a diagram of security network. We propose the Neyman-Pearson protection model for security systems, which can be used to determine the protection probability of a security system and find the weakest breach path of a security network. We present the weakest breach path problem formulation, which is defined by the breach protection probability of an unauthorized target passing through a guard field, and provide a solution for this problem by using the Dijkstra’s shortest path algorithm. Finally we study the variation of the breach protection probability with the change of the parameters of the model. 展开更多
关键词 security system PROTECTION PROBABILITY security Network Breach PROTECTION PROBABILITY Breach Path
下载PDF
Design of Security System by Means of Sound Print
13
作者 Ismail Abdul-Jabbar Hasan 《World Journal of Engineering and Technology》 2018年第4期903-913,共11页
Sound Recognition becomes an important tool for intrusion detection or for the monitoring of public premises exposed to personal hostility. It could further identify different sounds. The main idea of the sound recogn... Sound Recognition becomes an important tool for intrusion detection or for the monitoring of public premises exposed to personal hostility. It could further identify different sounds. The main idea of the sound recognition process in a security system is to store samples of different sound signals in the memory of the computer as references,?and?to be analyzed with respect to their frequencies components. In this paper, the sound signal of an unknown source would be analyzed and compared with all the available reference samples,?and?then recognition is made according to the closest sample. The developed security system consists of two main parts: the spectrum analyzer that converts the sound signal to spectrograms. It is designed based on the real-time analyzes, and the recognizer which compares the spectrograms and gives the decision of the recognition by using a special criterion. Experimental results prove that the accuracy of the proposed system can be 98.33% for the selected sample of signals. 展开更多
关键词 security system SOUND Signal Spectrum ANALYZER SPECTROGRAM
下载PDF
The Social Assistance of Migrant Workers and the Urban Minimum Living Security System
14
作者 Bing Fei Dong 《International English Education Research》 2015年第7期57-59,共3页
关键词 MIGRANT worker social SALVATION system URBAN minimum LIVING security system
下载PDF
Design and Development of a House-Mobile Security System
15
作者 Ashraf Elfasakhany Jorge Hernández +2 位作者 Juan Carlos García Mario Reyes Francisco Martell 《Engineering(科研)》 2011年第12期1213-1224,共12页
The objective of this work is to design, develop and implement an alarm system that triggers the alarm and alerts the owner via a mobile text message if the house has been opened or an attempt has been made to open it... The objective of this work is to design, develop and implement an alarm system that triggers the alarm and alerts the owner via a mobile text message if the house has been opened or an attempt has been made to open it illegally. The system will also feature two different forms of activation/deactivation and will automatically open or close the door for the user. The advantages of this house-mobile security system (HMSS) are its high security level, robustness, low cost and ease of use (uncomplicated) and that there is no distance limitation for contact. The system integrates different sensors via a microcontroller, which is the brain of the system, in order to avoid the problem of false alarms sent by other alarm monitoring systems to ‘Alarm Receiving Centers’ or Police departments. The HMSS is useful in homes, small businesses, offices, warehouses, etc. 展开更多
关键词 Home security ALARM MOBILE Low Cost Design TEXT MESSAGE
下载PDF
Biometrics as a Matrix: The Short Distance between Crime and Security Systems, Prompting an Artificial Intelligence to Invent Electronic Biometrics ID!
16
作者 Ahmed Laarfi 《International Journal of Intelligence Science》 2022年第1期1-8,共8页
This paper reviews the essential biometrics and develops a way to combine them with the Computer and User Information, giving us an Electronic Bio</span><span style="font-family:Verdana;">metrics... This paper reviews the essential biometrics and develops a way to combine them with the Computer and User Information, giving us an Electronic Bio</span><span style="font-family:Verdana;">metrics ID. This way, distributed databases contain imperative data from</span></span><span style="font-family:""> </span><span style="font-family:Verdana;">much helpful information that </span><span style="font-family:Verdana;">supports</span><span style="font-family:Verdana;"> more security. We reviewed examples of what these databases would look like, which any responsible party could design to be global. As will be mentioned later, we obtain common international databases whose data </span><span style="font-family:Verdana;">are</span><span style="font-family:""><span style="font-family:Verdana;"> modified according to factors such as </span><span style="font-family:Verdana;">the owner of the device, the location of the device, and so on. This is very</span><span style="font-family:Verdana;"> useful for tracking, and it combines biometrics with data set to give us a comprehensive electronic identification. 展开更多
关键词 BIOMETRICS security PRIVACY Distributed system DATABASES
下载PDF
Perimeter Security System Based on Ultra-Weak Fiber Bragg Grating Array
17
作者 Zhihui Luo Hao Xiang +1 位作者 Yu Zhang Bing Xu 《Optics and Photonics Journal》 2022年第6期156-169,共14页
A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed ba... A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed based on field programmable gate array (FPGA) platform. The principle of ultra-weak fiber Bragg grating high-speed demodulation and signal recognition method were analyzed theoretically, and the Support Vector Machine model was introduced to optimize the event recognition accuracy of the system. A perimeter security experimental system containing 1000 ultra-weak fiber Bragg gratings, ultra-weak fiber Bragg grating sense optical cables with a diameter of 2.0 mm and a reflectivity of 0.01%, steel space frames and demodulation equipments was built to recognize four typical events such as knocking, shaking, wind blowing and rainfall. The experimental resulted show that the system has a spatial resolution of 1m and an acquisition frequency of 200 Hz. The joint time-frequency domain detection method is used to achieve 99.2% alarm accuracy, and 98% recognition accuracy of two intrusion events, which has good anti-interference performance. 展开更多
关键词 Perimeter security Ultra-Weak Fiber Bragg Grating Vibration Sensor Pattern Recognition
下载PDF
Several issues in reform and development of China’s old-age security system
18
作者 王延中 《China Economist》 2010年第1期13-21,共9页
Since China’s reform and opening to the outside world,especially since the mid-1990s,China's social security system has undergone a number of reforms and adjustments.We can say that the basic framework of social ... Since China’s reform and opening to the outside world,especially since the mid-1990s,China's social security system has undergone a number of reforms and adjustments.We can say that the basic framework of social insurance system had been established,but it is still facing many difficulties such as small coverage,high payment rates,"empty" individual accounts,etc.The question is whether China will choose the proper way from so many suggestions inside and outside China to solve the above issues.I will analyze some important issues on pension reform and old age security system construction and give my own view in this paper. 展开更多
关键词 PENSION REFORM OLD age security system problems and solutions
全文增补中
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
19
作者 Dahyeon Kim Namgi Kim Junho Ahn 《Computers, Materials & Continua》 SCIE EI 2024年第3期3867-3889,共23页
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof... This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules. 展开更多
关键词 FRAMEWORK AUTOMATION vulnerability analysis security GUIDELINES
下载PDF
A Review on the Security of the Ethereum-Based DeFi Ecosystem
20
作者 Yue Xue Dunqiu Fan +4 位作者 Shen Su Jialu Fu Ning Hu Wenmao Liu Zhihong Tian 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期69-101,共33页
Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary ... Decentralized finance(DeFi)is a general term for a series of financial products and services.It is based on blockchain technology and has attracted people’s attention because of its open,transparent,and intermediary free.Among them,the DeFi ecosystem based on Ethereum-based blockchains attracts the most attention.However,the current decentralized financial system built on the Ethereum architecture has been exposed to many smart contract vulnerabilities during the last few years.Herein,we believe it is time to improve the understanding of the prevailing Ethereum-based DeFi ecosystem security issues.To that end,we investigate the Ethereum-based DeFi security issues:1)inherited from the real-world financial system,which can be solved by macro-control;2)induced by the problems of blockchain architecture,which require a better blockchain platform;3)caused by DeFi invented applications,which should be focused on during the project development.Based on that,we further discuss the current solutions and potential directions ofDeFi security.According to our research,we could provide a comprehensive vision to the research community for the improvement of Ethereum-basedDeFi ecosystem security. 展开更多
关键词 Blockchain smart contract decentralized finance DeFi security
下载PDF
上一页 1 2 232 下一页 到第
使用帮助 返回顶部