In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of compute...In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful.展开更多
Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leak...Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.展开更多
As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of databa...As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of database security research is to prevent the database from being illegally used or destroyed. This paper introduces the main literature in the field of database security research in recent years. First of all, we classify these papers, the classification criteria </span><span style="font-size:12px;font-family:Verdana;">are</span><span style="font-size:12px;font-family:Verdana;"> the influencing factors of database security. Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand. Secondly, we find that the related research has achieved some gratifying results, but there are also some shortcomings, such as weak generalization, deviation from reality. Then, possible future work in this research is proposed. Finally, we summarize the main contribution.展开更多
In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and...In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model;cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed.展开更多
This paper proposes a quantitative security evaluation for software system from the vulnerability data consisting of discovery date, solution date and exploit publish date based on a stochastic model. More precisely, ...This paper proposes a quantitative security evaluation for software system from the vulnerability data consisting of discovery date, solution date and exploit publish date based on a stochastic model. More precisely, our model considers a vulnerability life-cycle model and represents the vulnerability discovery process as a non-homogeneous Poisson process. In a numerical example, we show the quantitative measures for contents management system of an open source project.展开更多
There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one...There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one ofthe greatest threats to ships and展开更多
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv...Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.展开更多
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering...This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.展开更多
The smart grid will be a power grid more “aware” of its operating state and having the ability to self-heal. These features may be incorporated into the grid by implementing a phasor measurement units based wide are...The smart grid will be a power grid more “aware” of its operating state and having the ability to self-heal. These features may be incorporated into the grid by implementing a phasor measurement units based wide area measurement system. Such a system will help in better real time monitoring and control of the grid. However, the wide area measurement system is subject to challenges with respect to its security. In this paper, a comprehensive analysis of security issues with a wide area measurement system is presented and the research efforts required to be taken are identified. Moreover, the effect of communication failure on a PMU installed system has been presented using integer linear programming.展开更多
Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environm...Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.展开更多
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens...With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel.展开更多
AIM To evaluate the effect of introducing a structured online follow-up system on the response rate.METHODS Since June 2015 we have set up an electronic followup system for prosthesis in orthopedic patients. This syst...AIM To evaluate the effect of introducing a structured online follow-up system on the response rate.METHODS Since June 2015 we have set up an electronic followup system for prosthesis in orthopedic patients. This system allows prospective data gathering using both online and paper questionnaires. In the past all patients received questionnaires on paper. This study includes only patients who received elbow arthroplasty. Response rates before and after introduction of the online database were compared. After the implementation,completeness of the questionnaires was compared between paper and digital versions. For both comparisons Fisher's Exact tests were used.RESULTS A total of 233 patients were included in the study. With the introduction of this online follow-up system,the overall response rate increased from 49.8% to 91.6%(P < 0.01). The response rate of 92.0% in the paper group was comparable to 90.7% in the online group(P > 0.05).Paper questionnaires had a completeness of 54.4%,which was lower compared to the online questionnaires where we reached full completeness(P < 0.01). Furthermore,non-responders proved to be younger with a mean age of 52 years compared to a mean age 62 years of responders(P < 0.05).CONCLUSION The use of a structured online follow-up system increased the response rate. Moreover,online questionnaires are more complete than paper questionnaires.展开更多
Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database ma...Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments.展开更多
Since land resource database development in 1987/1988, a large amount of digital data in spatial, tabular and metadata format has been collected and generated. There are some application softwares of soil database to ...Since land resource database development in 1987/1988, a large amount of digital data in spatial, tabular and metadata format has been collected and generated. There are some application softwares of soil database to manage such a large amount of data, i.e.: Side & Horizon (SHDE4), Soil Sample Analysis (SSA), and Land Unit in dbf file, while Site and Horizon is in DataEase formats. The database contains soil physics and chemical property data of each soil horizon from surface to effective soil depth, climate, land surface condi- tions, and other parameters required for soil classification. Currently, database management software for land resources is still based on DOS and is stand alone. The system is not efficient and effectively used as Agri- cultural Land Resource Information System. At present, as a key component of this system requires review and development of new database software is compatible with the development of information technology. This paper explains about development of interactive agricultural land resources information system for op- timizing land resources data utilization. Hopefully, the software can give contributions in national Agricul- tural Land Resources System Information development for supporting food security.展开更多
Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation inform...Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.展开更多
This paper reviews the essential biometrics and develops a way to combine them with the Computer and User Information, giving us an Electronic Bio</span><span style="font-family:Verdana;">metrics...This paper reviews the essential biometrics and develops a way to combine them with the Computer and User Information, giving us an Electronic Bio</span><span style="font-family:Verdana;">metrics ID. This way, distributed databases contain imperative data from</span></span><span style="font-family:""> </span><span style="font-family:Verdana;">much helpful information that </span><span style="font-family:Verdana;">supports</span><span style="font-family:Verdana;"> more security. We reviewed examples of what these databases would look like, which any responsible party could design to be global. As will be mentioned later, we obtain common international databases whose data </span><span style="font-family:Verdana;">are</span><span style="font-family:""><span style="font-family:Verdana;"> modified according to factors such as </span><span style="font-family:Verdana;">the owner of the device, the location of the device, and so on. This is very</span><span style="font-family:Verdana;"> useful for tracking, and it combines biometrics with data set to give us a comprehensive electronic identification.展开更多
Meteorological conditions have a very important impact on the development of construction projects.In order to assist project site managers to quickly and accurately deal with the engineering risks brought by meteorol...Meteorological conditions have a very important impact on the development of construction projects.In order to assist project site managers to quickly and accurately deal with the engineering risks brought by meteorological conditions,meteorological risk assessment indicators for civil construction are established based on the actual impact of different meteorological conditions on each sub-project of civil engineering.A meteorological intelligent management system is created,and it will select reasonable countermeasures from the integrated existing database and push them to on-site construction managers based on meteorological risk assessment indicators.Through the pre-set construction log module,the managers can give feedback on the application effect of the pushed measures,and achieve the effect of construction data collection,correction and expansion of the existing database.展开更多
Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. O...Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. On the basis of a comprehensive grasp of the concepts and principles, combined with the actual applications, the students will understand the development trend, and unceasingly enhance the level of the database knowledge, which has great benefits for training the comprehensive talents. In this paper, by analyzing the problems existing in the database courses, the author of this paper put forward the ideas and measures for the reform of the relevant curriculums.展开更多
Through the method of literature analysis,this paper analyzes the present situation of the"non-grain conversion"of cultivated land in the transfer of agricultural land in China,summarizes the influencing fac...Through the method of literature analysis,this paper analyzes the present situation of the"non-grain conversion"of cultivated land in the transfer of agricultural land in China,summarizes the influencing factors and consequences of the phenomenon of"non-grain conversion"of cultivated land in the transfer of agricultural land,and finally puts forward some measures.The study found that costs and benefits are the fundamental factors affecting the"non-grain conversion"of cultivated land in agricultural land transfer,and other main factors include government and policy guidance,industrial and commercial capital to the countryside,labor transfer and so on.The"non-grain conversion"of cultivated land in the transfer of agricultural land is a serious threat to China s food security,leading to the decline of the quality of agricultural land and the destruction of the ecological environment,as well as the risk of breach of contract in"industrial and commercial capital to the countryside".Based on the understanding of the influencing factors of non-grain conversion,this paper puts forward the following measures:strengthening the control of the use of cultivated land in agricultural land transfer;implementing accurate subsidies for grain cultivation and ensuring the benefit of grain growers;adopting grain planting incentive mechanism to increase grain enthusiasm;strengthening media publicity and education to enhance food security awareness.The improvement of the current situation of the"non-grain conversion"of cultivated land in the transfer of agricultural land will be of great significance to the protection of agricultural land and food security in China.展开更多
Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. O...Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. On the basis of a comprehensive grasp of the concepts and principles, combined with the actual applications, the students will understand the development trend, and unceasingly enhance the level of the database knowledge, which has great benefits for training the comprehensive talents. In this paper, by analyzing the problems existing in the database courses, the author of this paper put forward the ideas and measures for the reform of the relevant curriculums.展开更多
文摘In the paper, we conduct research on the office automation system development and practice based on database optimization and security enhancement technology. Office automation is with the rapid development of computer technology and puts forward a new concept, the abbreviation for OA, refers to the enterprise through the use of advanced science and technology, the allocation of the information resources in a reasonable manner, so as to improve the work efficiency and quality of staff, auxiliary management to make decisions, to obtain more economic benefits and main including images, text, audio, data and other information collection, and processing and storage. Among them, the office automation is based on the staff as the main body, with advanced scientific technology by combining with computer technology and form comprehensive office mode. Our proposed method serves as the novel paradigm for the development of the office automation which is meaningful.
文摘Platforms facilitate information exchange,streamline resources,and reduce production and management costs for companies.However,some viral information may invade and steal company resources,or lead to information leakage.For this reason,this paper discusses the standards for cybersecurity protection,examines the current state of cybersecurity management and the risks faced by cloud platforms,expands the time and space for training on cloud platforms,and provides recommendations for measuring the level of cybersecurity protection within cloud platforms in order to build a solid foundation for them.
文摘As an information-rich collective, there are always some people who choose to take risks for some ulterior purpose and others are committed to finding ways to deal with database security threats. The purpose of database security research is to prevent the database from being illegally used or destroyed. This paper introduces the main literature in the field of database security research in recent years. First of all, we classify these papers, the classification criteria </span><span style="font-size:12px;font-family:Verdana;">are</span><span style="font-size:12px;font-family:Verdana;"> the influencing factors of database security. Compared with the traditional and machine learning (ML) methods, some explanations of concepts are interspersed to make these methods easier to understand. Secondly, we find that the related research has achieved some gratifying results, but there are also some shortcomings, such as weak generalization, deviation from reality. Then, possible future work in this research is proposed. Finally, we summarize the main contribution.
文摘In the last years, increasing smartphones’ capabilities have caused a paradigm shift in the way of users’ view and using mobile devices. Although researchers have started to focus on behavioral models to explain and predict human behavior, there is limited empirical research about the influence of smartphone users’ individual differences on the usage of security measures. The aim of this study is to examine the influence of individual differences on cognitive determinants of behavioral intention to use security measures. Individual differences are measured by the Five-Factor Model;cognitive determinants of behavioral intention are adapted from the validated behavioral models theory of planned behavior and technology acceptance model. An explorative, quantitative survey of 435 smartphone users is served as data basis. The results suggest that multiple facets of smartphone user’s personalities significantly affect the cognitive determinants, which indicate the behavioral intention to use security measures. From these findings, practical and theoretical implications for companies, organizations, and researchers are derived and discussed.
文摘This paper proposes a quantitative security evaluation for software system from the vulnerability data consisting of discovery date, solution date and exploit publish date based on a stochastic model. More precisely, our model considers a vulnerability life-cycle model and represents the vulnerability discovery process as a non-homogeneous Poisson process. In a numerical example, we show the quantitative measures for contents management system of an open source project.
文摘There are many reasons whymerchant ships make desirable targetsfor pirates and terrorists as well as aconvenient means of transport for thestowaway. Criminal activity in the form ofsuch threats is quickly becoming one ofthe greatest threats to ships and
文摘Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
文摘This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective.
文摘The smart grid will be a power grid more “aware” of its operating state and having the ability to self-heal. These features may be incorporated into the grid by implementing a phasor measurement units based wide area measurement system. Such a system will help in better real time monitoring and control of the grid. However, the wide area measurement system is subject to challenges with respect to its security. In this paper, a comprehensive analysis of security issues with a wide area measurement system is presented and the research efforts required to be taken are identified. Moreover, the effect of communication failure on a PMU installed system has been presented using integer linear programming.
文摘Database security protection, database backup and disaster recovery are important tasks for all colleges and universities to ensure the safe and stable operation of information systems. Based on the operating environment of the Oracle production database in China University of Geosciences (Beijing), combined with the practical operation and maintenance experience, this paper provides a design and implementation case of Oracle database security protection system and disaster recovery architecture. The network security protection architecture of the three-layer firewall and fortress machine, the detection and repair of security vulnerabilities, the management of system accounts and permissions, data encryption and database audit constitute the security protection system of the database. Oracle RAC (Real Application Clusters), Oracle DataGuard, redundant backup management and backup recovery constitute the disaster recovery architecture of the database. The case has practical significance for database operation and maintenance management in other colleges and universities.
文摘With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel.
文摘AIM To evaluate the effect of introducing a structured online follow-up system on the response rate.METHODS Since June 2015 we have set up an electronic followup system for prosthesis in orthopedic patients. This system allows prospective data gathering using both online and paper questionnaires. In the past all patients received questionnaires on paper. This study includes only patients who received elbow arthroplasty. Response rates before and after introduction of the online database were compared. After the implementation,completeness of the questionnaires was compared between paper and digital versions. For both comparisons Fisher's Exact tests were used.RESULTS A total of 233 patients were included in the study. With the introduction of this online follow-up system,the overall response rate increased from 49.8% to 91.6%(P < 0.01). The response rate of 92.0% in the paper group was comparable to 90.7% in the online group(P > 0.05).Paper questionnaires had a completeness of 54.4%,which was lower compared to the online questionnaires where we reached full completeness(P < 0.01). Furthermore,non-responders proved to be younger with a mean age of 52 years compared to a mean age 62 years of responders(P < 0.05).CONCLUSION The use of a structured online follow-up system increased the response rate. Moreover,online questionnaires are more complete than paper questionnaires.
文摘Engine engineering database system is an oriented C AD applied database management system that has the capability managing distributed data. The paper discusses the security issue of the engine engineering database management system (EDBMS). Through studying and analyzing the database security, to draw a series of securi ty rules, which reach B1, level security standard. Which includes discretionary access control (DAC), mandatory access control (MAC) and audit. The EDBMS implem ents functions of DAC, MAC and multigranularity audit. DAC solves the problems o f role inheritance, right contain, authorization identify and cascade revoke, et c; MAC includes subject and object security setup rule, security modify rule and multilevel relation access operation rule, etc; Audit allows making the sub ject, object or operation type as different audit object to implement flexible a nd multigranularity audit method. The model is designed act as a security agent to access daemon database. At present, the model is implemented which runs on th e Windows 2000 environments.
文摘Since land resource database development in 1987/1988, a large amount of digital data in spatial, tabular and metadata format has been collected and generated. There are some application softwares of soil database to manage such a large amount of data, i.e.: Side & Horizon (SHDE4), Soil Sample Analysis (SSA), and Land Unit in dbf file, while Site and Horizon is in DataEase formats. The database contains soil physics and chemical property data of each soil horizon from surface to effective soil depth, climate, land surface condi- tions, and other parameters required for soil classification. Currently, database management software for land resources is still based on DOS and is stand alone. The system is not efficient and effectively used as Agri- cultural Land Resource Information System. At present, as a key component of this system requires review and development of new database software is compatible with the development of information technology. This paper explains about development of interactive agricultural land resources information system for op- timizing land resources data utilization. Hopefully, the software can give contributions in national Agricul- tural Land Resources System Information development for supporting food security.
文摘Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better.
文摘This paper reviews the essential biometrics and develops a way to combine them with the Computer and User Information, giving us an Electronic Bio</span><span style="font-family:Verdana;">metrics ID. This way, distributed databases contain imperative data from</span></span><span style="font-family:""> </span><span style="font-family:Verdana;">much helpful information that </span><span style="font-family:Verdana;">supports</span><span style="font-family:Verdana;"> more security. We reviewed examples of what these databases would look like, which any responsible party could design to be global. As will be mentioned later, we obtain common international databases whose data </span><span style="font-family:Verdana;">are</span><span style="font-family:""><span style="font-family:Verdana;"> modified according to factors such as </span><span style="font-family:Verdana;">the owner of the device, the location of the device, and so on. This is very</span><span style="font-family:Verdana;"> useful for tracking, and it combines biometrics with data set to give us a comprehensive electronic identification.
基金Supported by the Scientific Research Project of Shanghai Scientific and Technological Commission(19DZ1201403)Rising-Star Program of"Science and Technology Innovation Action Plan"of Shanghai City in 2021(21QB1403200).
文摘Meteorological conditions have a very important impact on the development of construction projects.In order to assist project site managers to quickly and accurately deal with the engineering risks brought by meteorological conditions,meteorological risk assessment indicators for civil construction are established based on the actual impact of different meteorological conditions on each sub-project of civil engineering.A meteorological intelligent management system is created,and it will select reasonable countermeasures from the integrated existing database and push them to on-site construction managers based on meteorological risk assessment indicators.Through the pre-set construction log module,the managers can give feedback on the application effect of the pushed measures,and achieve the effect of construction data collection,correction and expansion of the existing database.
文摘Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. On the basis of a comprehensive grasp of the concepts and principles, combined with the actual applications, the students will understand the development trend, and unceasingly enhance the level of the database knowledge, which has great benefits for training the comprehensive talents. In this paper, by analyzing the problems existing in the database courses, the author of this paper put forward the ideas and measures for the reform of the relevant curriculums.
文摘Through the method of literature analysis,this paper analyzes the present situation of the"non-grain conversion"of cultivated land in the transfer of agricultural land in China,summarizes the influencing factors and consequences of the phenomenon of"non-grain conversion"of cultivated land in the transfer of agricultural land,and finally puts forward some measures.The study found that costs and benefits are the fundamental factors affecting the"non-grain conversion"of cultivated land in agricultural land transfer,and other main factors include government and policy guidance,industrial and commercial capital to the countryside,labor transfer and so on.The"non-grain conversion"of cultivated land in the transfer of agricultural land is a serious threat to China s food security,leading to the decline of the quality of agricultural land and the destruction of the ecological environment,as well as the risk of breach of contract in"industrial and commercial capital to the countryside".Based on the understanding of the influencing factors of non-grain conversion,this paper puts forward the following measures:strengthening the control of the use of cultivated land in agricultural land transfer;implementing accurate subsidies for grain cultivation and ensuring the benefit of grain growers;adopting grain planting incentive mechanism to increase grain enthusiasm;strengthening media publicity and education to enhance food security awareness.The improvement of the current situation of the"non-grain conversion"of cultivated land in the transfer of agricultural land will be of great significance to the protection of agricultural land and food security in China.
文摘Along with the wide application and the rapid development of the database technology, the teaching of the database principle will focus on developing the students' innovative abilities and their application skills. On the basis of a comprehensive grasp of the concepts and principles, combined with the actual applications, the students will understand the development trend, and unceasingly enhance the level of the database knowledge, which has great benefits for training the comprehensive talents. In this paper, by analyzing the problems existing in the database courses, the author of this paper put forward the ideas and measures for the reform of the relevant curriculums.