期刊文献+
共找到784篇文章
< 1 2 40 >
每页显示 20 50 100
Reflections and Improvements on China’s Asset-Backed Securities Information Disclosure System
1
作者 Zhao Mingxin 《Contemporary Social Sciences》 2024年第1期122-136,共15页
Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional s... Asset-backed securities are developed through complex processes such as asset restructuring and credit enhancement.Therefore,the information asymmetry between issuers and investors is greater compared to traditional securities,which imposes higher requirements on information disclosure for asset-backed securities.Asset-backed securities have characteristics such as diversified disclosers,differentiated disclosure content,and specialized risk factors.China has already formulated a series of rules and regulations regarding information disclosure of asset-backed securities.It is imperative to develop specialized laws and regulations for asset-backed securities,encompass original equity holders and credit enhancement agencies as information disclosers,incorporate information such as underlying asset details,cash flow projections,and credit ratings and enhancements into the disclosure content,and improve the legal liability rules to effectively address false disclosures. 展开更多
关键词 asset-backed securities asset securitization information disclosure
下载PDF
A Framework for Systematic Classification of Assets for Security Testing 被引量:2
2
作者 Sadeeq Jan Omer Bin Tauqeer +5 位作者 Fazal Qudus Khan George Tsaramirsis Awais Ahmad Iftikhar Ahmad Imran Maqsood Niamat Ullah 《Computers, Materials & Continua》 SCIE EI 2021年第1期631-645,共15页
Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such... Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them. 展开更多
关键词 SECURITY security testing PRIVACY asset classification
下载PDF
Impacts of livelihood assets on livelihood security in drought-prone Gamo lowlands of southwest Ethiopia 被引量:1
3
作者 Thomas Toma Tora Degefa Tolossa Degaga Abera Uncha Utallo 《Geography and Sustainability》 2022年第1期58-67,共10页
Livelihood assets are a matter of high concern for secured survival.Drought-prone Gamo lowland households have differential access to livelihood resources which indicates the varying capacity of resisting to shocks.Th... Livelihood assets are a matter of high concern for secured survival.Drought-prone Gamo lowland households have differential access to livelihood resources which indicates the varying capacity of resisting to shocks.The main objective of this study is to explore the impacts of livelihood assets on livelihood security in the drought-prone Gamo lowlands.Multistage sampling procedures were employed to select the study sites and sample respondents.Primary data of households’capital assets and livelihood security status were produced from 285 survey households,agricultural experts,key informants,focus group discussants,and field observation through transect walks.Descriptive and inferential statistics were used to analyze quantitative data,whereas discussions and annotations were employed for analyzing qualitative data.The Sustainable Livelihoods Framework is used with modifications to schematize the study conceptually.The findings indicated that the study households possessed combinations of livelihood resources differentially.Financial and natural capitals were found to be the most deficient and better-accessed capitals,respectively.The study also showed that lowland residents’access to assets has significant indications of livelihood security.Households’poor access to assets such as financial,information,and social capital demands raised attention of the concerned stakeholders and policy debates in the drought-prone rural setup.Hence,it has been concluded that the more assets are accessed,the stronger the capacity of the households to resist shocks,and better the livelihood security.Accordingly,enhancing people’s access to multiple livelihood assets is suggested to sustainably secure livelihoods. 展开更多
关键词 Asset hexagon Gamo lowlands Livelihood security Sustainable livelihoods framework
下载PDF
Study the Effectiveness of ISO 27001 to Mitigate the Cyber Security Threats in the Egyptian Downstream Oil and Gas Industry
4
作者 Mohamed Shohoud 《Journal of Information Security》 2023年第2期152-180,共29页
As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could h... As Egyptian oil and gas downstream information technology has grown digitally over the past decade, security breaches against these digitally connected systems have also increased. These cyber security threats could have devastating effects on the operations and reputation of these companies. Preventing such cyberattacks is crucial. Especially, with the significance of the Egyptian oil and gas downstream sector to the local economy and the fact that many of these connected systems are sometimes managed remotely. This paper examines the value of the ISO 27001 standard in mitigating the effect of cyber threat and seeks to inspire decision-makers to the importance of the proactive measures to strengthen their organization’s cybersecurity posture and protect information critical assets. The study stresses the importance of improving the local educational system to bridge the gap between supply and demand for cybersecurity specialists by implementing a structured approach that emphasizes behavior modification to get a high return on investment in cybersecurity awareness. 展开更多
关键词 DOWNSTREAM Cyberattack Cyber Security Mitigate Decision-Makers Proac-tive Measure Critical assets Behavior Modification
下载PDF
Empirical analysis on risk of security investment
5
作者 AN Peng LI Sheng-hong 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2009年第2期127-134,共8页
The paper analyzes the theory and application of Markowitz Mean-Variance Model and CAPM model. Firstly, it explains the development process and standpoints of two models and deduces the whole process in detail. Then 3... The paper analyzes the theory and application of Markowitz Mean-Variance Model and CAPM model. Firstly, it explains the development process and standpoints of two models and deduces the whole process in detail. Then 30 stocks are choosen from Shangzheng 50 stocks and are testified whether the prices of Shanghai stocks conform to the two models. With the technique of time series and panel data analysis, the research on the stock risk and effective portfolio by ORIGIN and MATLAB software is conducted. The result shows that Shanghai stock market conforms to Markowitz Mean-Variance Model to a certain extent and can give investors reliable suggestion to gain higher return, but there is no positive relation between system risk and profit ratio and CAPM doesn't function well in China's security market. 展开更多
关键词 Markowitz Mean-Variance Model Capital Asset Pricing Model time series analysis regressive analysis securities market
下载PDF
Dis-NDVW: Distributed Network Asset Detection and Vulnerability Warning Platform
6
作者 Leilei Li Yansong Wang +5 位作者 Dongjie Zhu Xiaofang Li Haiwen Du Yixuan Lu Rongning Qu Russell Higgs 《Computers, Materials & Continua》 SCIE EI 2023年第7期771-791,共21页
With the rapid development of Internet technology,the issues of network asset detection and vulnerability warning have become hot topics of concern in the industry.However,most existing detection tools operate in a si... With the rapid development of Internet technology,the issues of network asset detection and vulnerability warning have become hot topics of concern in the industry.However,most existing detection tools operate in a single-node mode and cannot parallelly process large-scale tasks,which cannot meet the current needs of the industry.To address the above issues,this paper proposes a distributed network asset detection and vulnerability warning platform(Dis-NDVW)based on distributed systems and multiple detection tools.Specifically,this paper proposes a distributed message sub-scription and publication system based on Zookeeper and Kafka,which endows Dis-NDVW with the ability to parallelly process large-scale tasks.Meanwhile,Dis-NDVW combines the RangeAssignor,RoundRobinAssignor,and StickyAssignor algorithms to achieve load balancing of task nodes in a distributed detection cluster.In terms of a large-scale task processing strategy,this paper proposes a task partitioning method based on First-In-First-Out(FIFO)queue.This method realizes the parallel operation of task producers and task consumers by dividing pending tasks into different queues according to task types.To ensure the data reliability of the task cluster,Dis-NDVW provides a redundant storage strategy for master-slave partition replicas.In terms of distributed storage,Dis-NDVW utilizes a distributed elastic storage service based on ElasticSearch to achieve distributed storage and efficient retrieval of big data.Experimental verification shows that Dis-NDVW can better meet the basic requirements of ultra-large-scale detection tasks. 展开更多
关键词 Distributed network security network asset detection vulnerability warning
下载PDF
A Conceptual Framework for Threat Assessment Based on Organization’s Information Security Policy
7
作者 Joseph Elias Mbowe Irina Zlotnikova +1 位作者 Simon S. Msanjila George S. Oreku 《Journal of Information Security》 2014年第4期166-177,共12页
The security breaches of sensitive information have remained difficult to solve due to increased malware programs and unauthorized access to data stored in critical assets. As risk appetite differ from one organizatio... The security breaches of sensitive information have remained difficult to solve due to increased malware programs and unauthorized access to data stored in critical assets. As risk appetite differ from one organization to another, it prompts the threat analysis tools be integrated with organization’s information security policy so as to ensure security controls at local settings. However, it has been noted that the current tools for threat assessment processes have not encompassed information security policy for effective security management (i.e.?confidentiality, integrity and availability) based on organization’s risk appetite and culture. The information security policy serves as a tool to provide guidance on how to manage and secure all business operations including critical assets, infrastructure and people in the organization. This guidance (e.g. usage and controls) facilitates the provisions for threat assessment and compliance based on local context. The lack of effective threat assessment frameworks at local context have promoted the exposure of critical assets such as database servers, mails servers, web servers and user smart-devices at the hand of attackers and thus increase risks and probability to compromise the assets. In this paper we have proposed a conceptual framework for security threat assessment based on organization’s information security policy. Furthermore, the study proposed the policy automation canvas for provision of a methodology to alert the security managers what possible threats found in their organizations for quick security mitigation without depending on security expertise. 展开更多
关键词 CRITICAL ASSET informATION SECURITY informATION SECURITY POLICY THREAT Analysis THREAT Assessment SECURITY THREAT Visualization
下载PDF
Human Security, Poverty Pattern and Social Order in Igbo Rural Communities of Contemporary Nigeria
8
作者 Iwundu Anthony Onyekwere 《Journalism and Mass Communication》 2017年第8期472-479,共8页
The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty,... The Igbo have their homeland in seven states of Nigeria mainly Imo, Abia, Anambra, Ebonyi, Delta and Rivers. They are receptible to new ideas and adapt easily to change. The ramifications of human insecurity, poverty, social disorder, poor coherence and poor integration appear to haunt them and the gravity is felt more in the rural communities. The factors are traceable to many pathetic issues. The pathological consequences do affect Igbo stability and navigation in the Nigerian socio-economic environment. The causality constitutes the physical, human, natural, financial and social assets. It is recommended, among others, that the people should return to core values and norms, stick to their own noble identities, have a framework for tackling insecurity and hunger, target the youth in poverty reduction measures and tackle the herdsmen menace. Equally, the abused philosophies used to support dangerous and strange behavior should be tackled. 展开更多
关键词 human security poverty pattern social order rural community assets integration
下载PDF
统一Windows窗体和ASP.NET安全
9
作者 张硕 宋景平 《宁波职业技术学院学报》 2012年第5期46-49,73,共5页
.NET为ASP.NET应用程序提供了自定义凭证管理。本文拟提出解决方案架构,使基于Windows窗体的Intranet应用程序能够方便地使用ASP.NET管理基础架构,这样基于Windows窗体的Intranet应用程序和ASP.NET应用程序将使用统一的凭证存储,并具有... .NET为ASP.NET应用程序提供了自定义凭证管理。本文拟提出解决方案架构,使基于Windows窗体的Intranet应用程序能够方便地使用ASP.NET管理基础架构,这样基于Windows窗体的Intranet应用程序和ASP.NET应用程序将使用统一的凭证存储,并具有同样高的开发效率。 展开更多
关键词 ASP.NET 安全凭证管理 WinDOWS窗体 ASP.NET应用程序
下载PDF
A Systematic Approach for Cyber Security in Vehicular Networks 被引量:1
10
作者 Farhan Ahmad Asma Adnane Virginia N. L. Franqueira 《Journal of Computer and Communications》 2016年第16期38-62,共26页
Vehicular Networks (VANET) are the largest real-life paradigm of ad hoc networks which aim to ensure road safety and enhance drivers’ comfort. In VANET, the vehicles communicate or collaborate with each other and wit... Vehicular Networks (VANET) are the largest real-life paradigm of ad hoc networks which aim to ensure road safety and enhance drivers’ comfort. In VANET, the vehicles communicate or collaborate with each other and with adjacent infrastructure by exchanging significant messages, such as road accident warnings, steep-curve ahead warnings or traffic jam warnings. However, this communication and other assets involved are subject to major threats and provide numerous opportunities for attackers to launch several attacks and compromise security and privacy of vehicular users. This paper reviews the cyber security in VANET and proposes an asset-based approach for VANET security. Firstly, it identifies relevant assets in VANET. Secondly, it provides a detailed taxonomy of vulnerabilities and threats on these assets, and, lastly, it classifies the possible attacks in VANET and critically evaluates them. 展开更多
关键词 Vehicular Networks Ad Hoc Networks Cyber Security PRIVACY VULNERABILITIES Threats assets Smart City
下载PDF
Probabilistic Teleportation of an Unknown Two-Particle State with a Four-Particle Pure Entangled State and Positive Operator Valued Measure 被引量:18
11
作者 闫凤利 丁贺伟 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第1期17-20,共4页
We propose a scheme for probabilistic teleportation of an unknown two-particle state with a four-particle pure entangled state and positive operator valued measure (POVM). In this scheme the teleportation of an unkn... We propose a scheme for probabilistic teleportation of an unknown two-particle state with a four-particle pure entangled state and positive operator valued measure (POVM). In this scheme the teleportation of an unknown two-particle state can be realized with certain probability by performing two Bell state measurements, a proper POVM and a unitary transformation. 展开更多
关键词 SECURE DIRECT COMMUNICATION SWAPPinG QUANTUM ENTANGLEMENT PODOLSKY-ROSEN CHANNELS PARTICLE STATE LOGIC-NETWORKS GENERAL-form EPR PAIRS SCHEME
下载PDF
论网络平台企业面临的法律问题及解决对策——以淘宝和OFO为例 被引量:1
12
作者 马维维 《广西经济管理干部学院学报》 2018年第2期90-96,共7页
在推进网络强国建设政策和网信技术发展的多重作用下,网络平台企业迅猛扩张,呈现出以网络平台为中心,弱化所有权重视使用权,资产专用性低,交易效率高的特点,很多传统企业因此纷纷转型,但由于缺乏一套完整的规范体系,网络交易主体间法律... 在推进网络强国建设政策和网信技术发展的多重作用下,网络平台企业迅猛扩张,呈现出以网络平台为中心,弱化所有权重视使用权,资产专用性低,交易效率高的特点,很多传统企业因此纷纷转型,但由于缺乏一套完整的规范体系,网络交易主体间法律关系不明确引发了多方侵权行为,大数据信息收集也派生出与个人隐私保护之间的矛盾。因此,针对网络平台制定针对性和可操作性强的法律规范,提高用户防范意识,加大信息数据使用者违法成本,厘清网络平台企业相关主体间法律关系,细化责任追究标准。 展开更多
关键词 商业模式 网络平台 所有权 资产专用性 数据安全
下载PDF
A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic
13
作者 Yea-Sul Kim Ye-Eun Kim Hwankuk Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1125-1147,共23页
With the commercialization of 5th-generation mobile communications(5G)networks,a large-scale internet of things(IoT)environment is being built.Security is becoming increasingly crucial in 5G network environments due t... With the commercialization of 5th-generation mobile communications(5G)networks,a large-scale internet of things(IoT)environment is being built.Security is becoming increasingly crucial in 5G network environments due to the growing risk of various distributed denial of service(DDoS)attacks across vast IoT devices.Recently,research on automated intrusion detection using machine learning(ML)for 5G environments has been actively conducted.However,5G traffic has insufficient data due to privacy protection problems and imbalance problems with significantly fewer attack data.If this data is used to train an ML model,it will likely suffer from generalization errors due to not training enough different features on the attack data.Therefore,this paper aims to study a training method to mitigate the generalization error problem of the ML model that classifies IoT DDoS attacks even under conditions of insufficient and imbalanced 5G traffic.We built a 5G testbed to construct a 5G dataset for training to solve the problem of insufficient data.To solve the imbalance problem,synthetic minority oversampling technique(SMOTE)and generative adversarial network(GAN)-based conditional tabular GAN(CTGAN)of data augmentation were used.The performance of the trained ML models was compared and meaningfully analyzed regarding the generalization error problem.The experimental results showed that CTGAN decreased the accuracy and f1-score compared to the Baseline.Still,regarding the generalization error,the difference between the validation and test results was reduced by at least 1.7 and up to 22.88 times,indicating an improvement in the problem.This result suggests that the ML model training method that utilizes CTGANs to augment attack data for training data in the 5G environment mitigates the generalization error problem. 展开更多
关键词 5G core traffic machine learning SMOTE GAN-CTGAN IoT DDoS detection tabular form cyber security B5G mobile network security
下载PDF
Windows NT的体系结构
14
作者 樊德久 王建 刘建军 《科技情报开发与经济》 2004年第10期232-233,共2页
WindowsNT是面向工作站、网络服务器及大型计算机的网络操作系统,也可用作PC操作系统,同时由于其鲜明的技术特点,支撑WindowsNT在市场上经久不衰。通过对WindowsNT的特点、WindowsNT操作系统的组成部分、WindowsNT环境子系统和用户模式... WindowsNT是面向工作站、网络服务器及大型计算机的网络操作系统,也可用作PC操作系统,同时由于其鲜明的技术特点,支撑WindowsNT在市场上经久不衰。通过对WindowsNT的特点、WindowsNT操作系统的组成部分、WindowsNT环境子系统和用户模式程序的分析,论述了WindowsNT的体系结构。 展开更多
关键词 WinDOWSNT 分页管理 优先级 多处理器平台 IRPs 安全监视器
下载PDF
“权利束”视角下数据资产的刑法保护 被引量:2
15
作者 姚万勤 赵小勇 《法治研究》 CSSCI 北大核心 2024年第1期88-100,共13页
数据的刑法保护不只是指保护个人数据、个人信息权利,还需要保护大数据产业链中处于处理、经营状态下的数据资产利益。在数据确权问题存在巨大争议的背景下,数据资产刑法法益的确定应“搁置确权争议”,遵循“权利束”确权逻辑及路径,承... 数据的刑法保护不只是指保护个人数据、个人信息权利,还需要保护大数据产业链中处于处理、经营状态下的数据资产利益。在数据确权问题存在巨大争议的背景下,数据资产刑法法益的确定应“搁置确权争议”,遵循“权利束”确权逻辑及路径,承认数据资产上存在“个人信息利益”“数据处理者、经营者经济财产利益”“社会公共秩序及国家安全利益”多元法益,这些法益的比例和形态在数据的采集、处理分析及交易交换等不同场景下有着阶段性的变化。构建数据资产刑法保护规范体系,应顺应保护数据经营利用价值的需求,对侵犯公民个人信息罪、非法经营罪、财产犯罪、知识产权犯罪及计算机信息系统犯罪进行解释性改造,以实现对数据资产中的个人信息利益、正当竞争利益、财产性利益、衍生数据知识产权利益及社会公共秩序等复杂法益的保护。 展开更多
关键词 数据资产 权利束 财产犯罪 衍生数据 数据安全
下载PDF
国有资产收益全民分享与共同养老金制度设计 被引量:1
16
作者 杨斌 黎涵 《厦门大学学报(哲学社会科学版)》 CSSCI 北大核心 2024年第2期121-129,共9页
落实以全民所有制为根基的社会主义制度,必须建立现实具体的国有资产收益全民分享机制,让全体人民分享归他们所有的国有资产收益。将部分国有资产收益用于建立共同养老金制度,平等地为达到一定年龄(依据国家一般退休年龄确定)的全体老... 落实以全民所有制为根基的社会主义制度,必须建立现实具体的国有资产收益全民分享机制,让全体人民分享归他们所有的国有资产收益。将部分国有资产收益用于建立共同养老金制度,平等地为达到一定年龄(依据国家一般退休年龄确定)的全体老年人发放一份社会主义性质的共同养老金,是社会主义初级阶段国有资产收益全民分享的可行方式。以国有资产收益建立的共同养老金制度具有国有企业产品消费倾向增长效应,不仅为老年人提供可持续、均等和稳定的基本生活保障,还能促进国有资产保值增值,保证其自身的可持续性。并且,与直接动用国有资本补充城镇职工基本养老保险相比,建立共同养老金制度能够有效缓解基本养老保险的给付差距问题。这为构建中国特色社会主义市场经济混合养老保障体系,即共同养老金和基本养老保险相辅相成的新型养老制度,提出新思路。 展开更多
关键词 国有资产收益全民分享 共同养老金 基本养老保险 混合养老保障体系
下载PDF
《民法典》动产与权利担保制度的商法属性解释论 被引量:1
17
作者 汪振江 贺中正 《南都学坛(南阳师范学院人文社会科学学报)》 2024年第1期78-88,共11页
《民法典》第388条对功能主义担保立法模式的引入,使动产和权利统一担保体系具有了较为鲜明的商法属性。但囿于民商合一的立法体例,其商事元素大多隐藏在民事规范之下,不得彰显。现行担保体系对商事担保的特殊性及商事交易实践需求不能... 《民法典》第388条对功能主义担保立法模式的引入,使动产和权利统一担保体系具有了较为鲜明的商法属性。但囿于民商合一的立法体例,其商事元素大多隐藏在民事规范之下,不得彰显。现行担保体系对商事担保的特殊性及商事交易实践需求不能及时作出回应,对商事交易实践造成影响。故而民商合一的立法体例需通过法律适用在实质上实现一般化一体规制,特殊化区分规制的立场。对此,商法视角的引入极为必要。商事担保以效益优先为价值理念,以功能主义为底层逻辑,在制度设计上具有更多的商事元素。利用区分原则,对担保体系中的民商事担保规范进行区分、整合,以形成担保体系“形式民商合一,实质统分结合”的体例。同时,商法思维的适用应兼顾商事规范的个性及民事规范的稳定,从而对动产和权利统一担保体系的商法属性作出回应,以期促进商事金融的发展创新。 展开更多
关键词 《民法典》 动产与权利担保 商事担保 商法属性
下载PDF
某三级甲等公立医院API接口安全监测实践与思考
18
作者 孙保峰 葛晓伟 +1 位作者 杨扬 李郁鸿 《中国数字医学》 2024年第7期115-120,共6页
目的:建立医院API接口资产台账,实现API接口的统一集中管理,并对API接口的运行状态进行实时监控,及时发现接口安全风险并整改,提升医院信息安全防护水平。方法:以某三级甲等公立医院为例,通过人工和系统识别相结合的方式,梳理医院API接... 目的:建立医院API接口资产台账,实现API接口的统一集中管理,并对API接口的运行状态进行实时监控,及时发现接口安全风险并整改,提升医院信息安全防护水平。方法:以某三级甲等公立医院为例,通过人工和系统识别相结合的方式,梳理医院API接口,建立台账,利用API接口监测设备对网络流量实时监测,识别安全风险并整改、加固。结果:实现了全院API接口的集中统一管理,提升了医院信息安全防护水平,保障医疗数据在信息系统间的安全共享和流通。结论:对API接口进行安全监测,有助于发现医疗机构应用系统安全风险,提升医疗机构网络安全防护能力,保障医疗数据安全。 展开更多
关键词 API接口 安全监测 资产梳理 API接口监测 风险处置
下载PDF
全媒体赋能网络意识形态安全治理创新路径探析
19
作者 杨志超 余航 《实事求是》 2024年第6期70-80,共11页
随着网络信息技术和现代传媒的飞速发展,现代传播体系和传播模式不断变革,人们获取信息的手段和对于生活的空间需求得以再塑,网络意识形态随之产生新的演变趋向,全媒体时代由此到来。全媒体从传播样态升级、宣传模式转变、多元主体参与... 随着网络信息技术和现代传媒的飞速发展,现代传播体系和传播模式不断变革,人们获取信息的手段和对于生活的空间需求得以再塑,网络意识形态随之产生新的演变趋向,全媒体时代由此到来。全媒体从传播样态升级、宣传模式转变、多元主体参与等方面悄然形塑着网络意识形态新态势,成为当前网络意识形态安全治理面临的全新境遇。在这一背景下,必须全面分析全媒体传播技术的“四全”特征为网络意识形态安全治理带来的机遇,从而在实践中更好地以全媒体赋能网络意识形态安全治理,从强化导向功能、创新传播手段、汇聚协同合力、增进传播实效等方面下好功夫,有效助力国家安全治理体系和治理能力现代化。 展开更多
关键词 全媒体 传播技术 网络意识形态安全 安全治理
下载PDF
电网的分散负荷安全域及其应用(二):线路静态失稳的边界-本质-形态及负荷安全域的稳定裕度
20
作者 竺炜 肖魏 +2 位作者 罗贤超 于瀚翔 郑超 《中国电机工程学报》 EI CSCD 北大核心 2024年第5期1737-1749,I0006,共14页
交流线路承载的静态稳定边界问题一直悬而未决。负荷安全域可约束线路压差、维持多级电网电压安全水平,但稳定裕度未知。传统静态功角稳定与电压稳定的概念、机理及分析方法都不相同。研究发现,针对线路两种静态稳定可形成统一的概念、... 交流线路承载的静态稳定边界问题一直悬而未决。负荷安全域可约束线路压差、维持多级电网电压安全水平,但稳定裕度未知。传统静态功角稳定与电压稳定的概念、机理及分析方法都不相同。研究发现,针对线路两种静态稳定可形成统一的概念、机理,而全网静态稳定的充要条件是每条支路都满足静态稳定。基于线路的复变量状态方程,得到末端的复功率-电压(即P_(j)-Q_(j)-U_(j))、复功率-功角(即P_(j)-Q_(j)-θ_(ij))的独立方程;通过可解条件分析、偏导证明,得到唯一的P_(j)-Q_(j)稳定边界及其特征,证明两种失稳的同质性;通过解析几何分析,推导U_(j)和θ_(ij)的稳定边界及其特征,得到符合实际情况的失稳形态解释。基于P_(j)-Q_(j)稳定边界,提出线路负荷安全域的稳定裕度指标以及电压安全水平的修正方法。理论验证基于首端参考系线路模型分析的可行性,提出电网上下级拓扑的稳定域匹配方法。最后,基于状态可观性判据、方程独立性以及平衡点生成原理,分析线路功-角特性的局限性。算例表明,所提的稳定边界、稳定域匹配方法都与PSASP程序收敛性结果吻合。在新能源大量接入导致线路潮流波动性大的背景下,该研究更具理论价值及现实意义。 展开更多
关键词 线路静态稳定 稳定边界 失稳形态 线路负荷安全域 稳定裕度
下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部