针对电网防汛装备、重点部位、防汛预案等信息线下填报无法保证防汛相关信息准确性、共享性,无法满足电网企业防汛工作需要的现状,提出基于实物“ID”(电网资产统一身份编码,以下简称实物“ID”)的电网防汛重点部位调控系统及方法研究,...针对电网防汛装备、重点部位、防汛预案等信息线下填报无法保证防汛相关信息准确性、共享性,无法满足电网企业防汛工作需要的现状,提出基于实物“ID”(电网资产统一身份编码,以下简称实物“ID”)的电网防汛重点部位调控系统及方法研究,以实物“ID”作为信息索引,依托智能传感、图形识别、射频识别技术(radio frequency identification,RFID)等物联网技术实现重点部位维护、影像传输、防汛物资和装备现场盘点、预案预览等功能,实现防汛重点部位影像资料实时共享、数据填报规范、信息共享及时,提高了电网企业防汛的抢修能力。展开更多
目的:通过信息化手段提高医院考勤管理质量,提高员工满意度。方法:采用Client/MiddMeware/Server体系结构,PowerBuilder10、ViSua1 Studio 2010编程工具以及SQL,SERVER 2008数据库技术,开发了医院智能考勤管理系统并加以应用。结果:实...目的:通过信息化手段提高医院考勤管理质量,提高员工满意度。方法:采用Client/MiddMeware/Server体系结构,PowerBuilder10、ViSua1 Studio 2010编程工具以及SQL,SERVER 2008数据库技术,开发了医院智能考勤管理系统并加以应用。结果:实现了员工考勤信息采集和统计的规范化、系统化;实现了员工考勤信息手机短信及时告之功能;实现了考勤信息与员工奖金发放软件和人力资源系统的对接。结论:系统的成功实施,保证了医院考勤管理的客观、公正,提高了员工出勤质量,得到了医院领导员工的一致好评。展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Que...A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.展开更多
文摘针对电网防汛装备、重点部位、防汛预案等信息线下填报无法保证防汛相关信息准确性、共享性,无法满足电网企业防汛工作需要的现状,提出基于实物“ID”(电网资产统一身份编码,以下简称实物“ID”)的电网防汛重点部位调控系统及方法研究,以实物“ID”作为信息索引,依托智能传感、图形识别、射频识别技术(radio frequency identification,RFID)等物联网技术实现重点部位维护、影像传输、防汛物资和装备现场盘点、预案预览等功能,实现防汛重点部位影像资料实时共享、数据填报规范、信息共享及时,提高了电网企业防汛的抢修能力。
文摘目的:通过信息化手段提高医院考勤管理质量,提高员工满意度。方法:采用Client/MiddMeware/Server体系结构,PowerBuilder10、ViSua1 Studio 2010编程工具以及SQL,SERVER 2008数据库技术,开发了医院智能考勤管理系统并加以应用。结果:实现了员工考勤信息采集和统计的规范化、系统化;实现了员工考勤信息手机短信及时告之功能;实现了考勤信息与员工奖金发放软件和人力资源系统的对接。结论:系统的成功实施,保证了医院考勤管理的客观、公正,提高了员工出勤质量,得到了医院领导员工的一致好评。
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
文摘A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.