To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic upd...To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic update mechanism of SI based on spectrum opportunity incentive is established, in which spectrum users are encouraged to actively assist the database to update SI in real time. Secondly, the information update contribution(IUC) of spectrum opportunity is defined to describe the cost of accessing spectrum opportunity for heterogeneous spectrum users, and the profit of SI update obtained by the database from spectrum allocation. The process that the database determines the IUC of spectrum opportunity and spectrum user selects spectrum opportunity is mapped to a Hotelling model. Thirdly, the process of determining the IUC of spectrum opportunities is further modelled as a Stackelberg game by establishing multiple virtual spectrum resource providers(VSRPs) in the database. It is proved that there is a Nash Equilibrium in the game of determining the IUC of spectrum opportunities by VSRPs. Finally, an algorithm of determining the IUC based on a genetic algorithm is designed to achieve the optimal IUC. The-oretical analysis and simulation results show that the proposed method can quickly find the optimal solution of the IUC, and ensure that the spectrum resource provider can obtain the optimal profit of SI update.展开更多
The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the a...The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.展开更多
To further enhance the overall service quality of China’s hospitals and improve the trust of the majority of patients in hospitals,this paper takes intelligent hospital management as the object of study,analyzes the ...To further enhance the overall service quality of China’s hospitals and improve the trust of the majority of patients in hospitals,this paper takes intelligent hospital management as the object of study,analyzes the importance of electronic information engineering technology applied in hospital management,and discusses the specific application methods of electronic information engineering in hospital management.This aims the existing problems in the current hospital management,such as insufficient degree of informatization,data sharing difficulties,lack of professionals,etc.Corresponding improvement measures are proposed,including strengthening the construction of informatization,promoting data sharing,and cultivating professionals.It is hoped that this study will enable the majority of hospital managers to make better use of electronic information engineering technology to effectively solve the current problems faced by hospitals and to continuously improve the comprehensive competitiveness of China’s hospitals.展开更多
Rail transit is considered one of the safest and most efficient modes of transportation.Ticketing,vehicle dispatching,and passenger flow control during rail transit operations in China have been improving over the yea...Rail transit is considered one of the safest and most efficient modes of transportation.Ticketing,vehicle dispatching,and passenger flow control during rail transit operations in China have been improving over the years.Smart city construction and intelligent management models has also been increasingly emphasized with the rapid development of information and internet technology.Therefore,it is essential to conduct relevant research and discussions to improve the overall efficiency and quality of urban rail transit operation and management.This article provides an overview of smart city rail transit operation and management informatization,the principles of construction,and the functions of smart city rail transit operation and management informatization.Additionally,it discusses the strategies for the construction of smart city rail transit operation and management information and its development prospects.展开更多
Increasing research has focused on semantic communication,the goal of which is to convey accurately the meaning instead of transmitting symbols from the sender to the receiver.In this paper,we design a novel encoding ...Increasing research has focused on semantic communication,the goal of which is to convey accurately the meaning instead of transmitting symbols from the sender to the receiver.In this paper,we design a novel encoding and decoding semantic communication framework,which adopts the semantic information and the contextual correlations between items to optimize the performance of a communication system over various channels.On the sender side,the average semantic loss caused by the wrong detection is defined,and a semantic source encoding strategy is developed to minimize the average semantic loss.To further improve communication reliability,a decoding strategy that utilizes the semantic and the context information to recover messages is proposed in the receiver.Extensive simulation results validate the superior performance of our strategies over state-of-the-art semantic coding and decoding policies on different communication channels.展开更多
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai...System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing.展开更多
To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to imp...To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to improve its information management and increase the availability of accurate, real-time data for disaster and humanitarian response teams, significant gaps persist. There are inefficiencies in the emergency management of data at every stage of its lifecycle: collection, processing, analysis, distribution, storage, and retrieval. Disaster risk reduction and disaster risk management are the two main tenets of the United Nations’ worldwide plan for disaster management. Information systems are crucial because of the crucial roles they play in capturing, processing, and transmitting data. The management of information is seldom discussed in published works. The goal of this study is to employ qualitative research methods to provide insight by facilitating an expanded comprehension of relevant contexts, phenomena, and individual experiences. Humanitarian workers and OCHA staffers will take part in the research. The study subjects will be chosen using a random selection procedure. Online surveys with both closed- and open-ended questions will be used to compile the data. UN OCHA offers a structure for the handling of information via which all humanitarian actors may contribute to the overall response. This research will enable the UN Office for OCHA better gather, process, analyze, disseminate, store, and retrieve data in the event of a catastrophe or humanitarian crisis.展开更多
In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and qu...In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and quality of work by dealing with and constructing information-based methods,innovating administrative management models,and adopting more efficient and scientific methods to address various problems and shortcomings encountered in work.As an important part of university management,administrative management is a complex task.Establishing a standardized management model through information technology can further improve the comprehensive efficiency of administrative management.In this regard,the administrative standardization in universities under the background of information technology is analyzed and studied in this paper.展开更多
Expenditure on wells constitute a significant part of the operational costs for a petroleum enterprise, where most of the cost results from drilling. This has prompted drilling departments to continuously look for wa...Expenditure on wells constitute a significant part of the operational costs for a petroleum enterprise, where most of the cost results from drilling. This has prompted drilling departments to continuously look for ways to reduce their drilling costs and be as efficient as possible. A system called the Drilling Comprehensive Information Management and Application System (DCIMAS) is developed and presented here, with an aim at collecting, storing and making full use of the valuable well data and information relating to all drilling activities and operations. The DCIMAS comprises three main parts, including a data collection and transmission system, a data warehouse (DW) management system, and an integrated platform of core applications. With the support of the application platform, the DW management system is introduced, whereby the operation data are captured at well sites and transmitted electronically to a data warehouse via transmission equipment and ETL (extract, transformation and load) tools. With the high quality of the data guaranteed, our central task is to make the best use of the operation data and information for drilling analysis and to provide further information to guide later production stages. Applications have been developed and integrated on a uniform platform to interface directly with different layers of the multi-tier DW. Now, engineers in every department spend less time on data handling and more time on applying technology in their real work with the system.展开更多
BACKGROUND Nutritional support for patients hospitalized in the intensive care unit(ICU)is an important part of clinical treatment and care,but there are significant implementation difficulties.AIM To introduce a modi...BACKGROUND Nutritional support for patients hospitalized in the intensive care unit(ICU)is an important part of clinical treatment and care,but there are significant implementation difficulties.AIM To introduce a modified nutritional support management system for ICU patients based on closed-loop information management and psychological counseling.METHODS The division of functions,personnel training,system construction,development of an intelligent decision-making software system,quality control,and improvement of the whole process were carried out to systematically manage nutritional support for ICU patients.RESULTS Following the implementation of the whole process management system,the scores of ICU medical staff’s knowledge,attitudes/beliefs,and practices regarding nutritional support were comprehensively enhanced.The proportion of hospital bed-days of total enteral nutrition(EN)in ICU patients increased from 5.58%to 11.46%,and the proportion of EN plus parenteral nutrition increased from 42.71%to 47.07%.The rate of EN initiation within 48 h of ICU admission increased from 37.50%to 48.28%,and the EN compliance rate within 72 h elevated from 20.59%to 31.72%.After the implementation of the project,the Self-rating Anxiety Scale score decreased from 61.07±9.91 points to 52.03±9.02 points,the Self-rating Depression Scale score reduced from 62.47±10.50 points to 56.34±9.83 points,and the ICU stay decreased from 5.76±2.77 d to 5.10±2.12 d.CONCLUSION The nutritional support management system based on closed-loop information management and psychological counseling achieved remarkable results in clinical applications in ICU patients.展开更多
Applied ethics finds application in all spheres of social life,one of which is the field of library and information science.Ethics is an important pillar contributing to the systematic order of the library and its col...Applied ethics finds application in all spheres of social life,one of which is the field of library and information science.Ethics is an important pillar contributing to the systematic order of the library and its collection.Ethical principles are contained in key documents such as the Librarian’s Code of Ethics,partly in the Library(Lending)Regulations,and should therefore be adopted by every member of staff.The library profession consists not only of working with information,namely making it available,but also of setting up effective communication towards users(readers)in the form of defining optimal solutions eliminating the problems that arise.The aim of our efforts is to capture the most common problems that arise from misunderstandings between librarian and user(reader)and to make clear what specific role ethical values play in library and information practice.展开更多
In African countries,regulations on the management of WTE(Waste from Information Technology Equipment)are non-existent or sometimes insufficient,if they exist.This study shows how to mention waste from information tec...In African countries,regulations on the management of WTE(Waste from Information Technology Equipment)are non-existent or sometimes insufficient,if they exist.This study shows how to mention waste from information technology equipment in a country that does not have a regulatory legislative framework or organized management channels.A methodological approach based on documentary research and semi-directed interviews was adopted in this work.The results showed that 54.55%of institutional managers are unaware of the existence of regulations for the management of WTE,both at the national and international levels;72.72%of these managers do not have a specific implementing text for this management;72.73%of institutions have adopted an acquisition policy based on the needs of workers and 81.82%of institutions store WTE in warehouses.Relations with waste collection SMEs(Small and Midsize Enterprises),especially for IT equipment,are limited for 72.73%of institutions.In terms of improving the capacity to manage WEEE(Waste Electrical and Electronic Equipment),90.91%of institutions do not offer training or awareness raising.Overall,no significant indicators are in place to assess WEEE management in institutions,which reflects a lack of commitment and awareness among institutional managers.In addition,there are no financial means for ecological and sustainable management.Although 27.27%of managers are aware of the dangers to human health and the environment related to IT equipment,they are often unaware of the harmful consequences of abandoning it in nature.展开更多
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution...Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
How to construct integrative information management system for radiation oncology is a new practice in China based on new technical framework and the profile of integrating the healthcare enterprise in radiation oncol...How to construct integrative information management system for radiation oncology is a new practice in China based on new technical framework and the profile of integrating the healthcare enterprise in radiation oncology (IHE-RO). This paper presents the research progress for constructing the system in the department of the radiation oncology at Cancer Hospital of Chinese Academy of Medical Sciences, and its system diagram based on IHE-RO technical framework, digital imaging and communication in medicine with radiotherapy (DICOM RT) data flow standard, and emphasizes the importance of DICOM RT in constructing the system and describes the generation process of DICOM RT objects. Finally, the related international standards are suggested on RT devices adopted by China State Food and Drug Administration (SFDA) when the system is constructed.展开更多
Now, GISs are popular at most major cities along the coast in China. The lack of available digital geographic data is a serious bottleneck problem. This article first analyses the development characteristics of urban ...Now, GISs are popular at most major cities along the coast in China. The lack of available digital geographic data is a serious bottleneck problem. This article first analyses the development characteristics of urban planning and management information system in China, and proposes a method for establishing a planning and management information system for small town. By using GIS as core and integrating with microcomputer network, office automation (OA), computer aided design (CAD), and multimedia technology, a microcomputer information system (TownMIS) is implemented after 3 year design and development. It may be a first comprehensive system for the planning and management of small towns. Since the January of 1996, TownMIS has been actually used in Xiaolan Town, a coastal rich town in South China. This has provided perfect technical, managerial, operational and institutional references for resolving the contradiction of the fast growing installation of GIS sites and fewer actually running system.展开更多
Based on an analysis of the characteristics of the Forest Resources Management Information System of each development phase, and consideration of the technical trend in Geographic Information System (GIS) in the Inter...Based on an analysis of the characteristics of the Forest Resources Management Information System of each development phase, and consideration of the technical trend in Geographic Information System (GIS) in the Internet Age, this paper explores the importance and the feasibility of setting up Forest Resources Management Information System based on the WEBGIS. At the same time, based on the experience of our study, the paper explores the function, structure and method of developing the Forest Resources Management Information System based on WEBGIS. With the technology of WEBGIS, the Forest Resources Management Information System with data from Huoditang Farm was set up, which makes a great impact on forest resources management. So setting up the Forest Resources Management Information System based on WEBGIS is a trend of forest resources management. In the course of setting up this system, we must pay attention to following questions: 1) unify data standard and information encoding; 2) change mind.展开更多
In order to effectively address the issues of environmental pollution and food safety in food industry,the green supply chain management should be used in the food industry.However,information sharing is the basis of ...In order to effectively address the issues of environmental pollution and food safety in food industry,the green supply chain management should be used in the food industry.However,information sharing is the basis of supply chain management.For this purpose,on the basis of describing the connotation of food industry green supply chain management,the paper introduces the contents and the effects of information sharing mode in detail.It focuses on the barriers of the implementation of information-sharing mechanisms in the food industry green supply chain management and operation process and analyzes the necessity of using information sharing mechanism among the members of the food industry green supply chain management mode by game theory,so as to strengthen the competitiveness of enterprises through supply chain management.展开更多
Multi-sensor system is becoming increasingly important in a variety of military and civilian applications. In general, single sensor system can only provide partial information about environment while multi-sensor sys...Multi-sensor system is becoming increasingly important in a variety of military and civilian applications. In general, single sensor system can only provide partial information about environment while multi-sensor system provides a synergistic effect, which improves the quality and availability of information. Data fusion techniques can effectively combine this environmental information from similar and/or dissimilar sensors. Sensor management, aiming at improving data fusion performance by controlling sensor behavior, plays an important role in a data fusion process. This paper presents a method using fisher information gain based sensor effectiveness metric for sensor assignment in multi-sensor and multi-target tracking applications. The fisher information gain is computed for every sensor-target pairing on each scan. The advantage for this metric over other ones is that the fisher information gain for the target obtained by multi-sensors is equal to the sum of ones obtained by the individual sensor, so standard transportation problem formulation can be used to solve this problem without importing the concept of pseudo sensor. The simulation results show the effectiveness of the method.展开更多
An architecture and design of a maintenance information management system for distributed manufacture system is presented in this paper, and its related key technologies are studied and implemented also. A frame of th...An architecture and design of a maintenance information management system for distributed manufacture system is presented in this paper, and its related key technologies are studied and implemented also. A frame of the maintenance information management system oriented human-machine monitoring is designed, and using object-oriented method, a general maintenance information management system based on SQL server engineering database and adopted client/server/database three-layer mode can be established. Then, discussions on control technologies of maintenance information management system and remote distributed diagnostics and maintenance system are emphasized. The system is not only able to identify and diagnose faults of distributed manufacture system quickly, improve system stability, but also has intelligent maintenance functions.展开更多
文摘To solve the problem of delayed update of spectrum information(SI) in the database assisted dynamic spectrum management(DB-DSM), this paper studies a novel dynamic update scheme of SI in DB-DSM. Firstly, a dynamic update mechanism of SI based on spectrum opportunity incentive is established, in which spectrum users are encouraged to actively assist the database to update SI in real time. Secondly, the information update contribution(IUC) of spectrum opportunity is defined to describe the cost of accessing spectrum opportunity for heterogeneous spectrum users, and the profit of SI update obtained by the database from spectrum allocation. The process that the database determines the IUC of spectrum opportunity and spectrum user selects spectrum opportunity is mapped to a Hotelling model. Thirdly, the process of determining the IUC of spectrum opportunities is further modelled as a Stackelberg game by establishing multiple virtual spectrum resource providers(VSRPs) in the database. It is proved that there is a Nash Equilibrium in the game of determining the IUC of spectrum opportunities by VSRPs. Finally, an algorithm of determining the IUC based on a genetic algorithm is designed to achieve the optimal IUC. The-oretical analysis and simulation results show that the proposed method can quickly find the optimal solution of the IUC, and ensure that the spectrum resource provider can obtain the optimal profit of SI update.
文摘The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.
文摘To further enhance the overall service quality of China’s hospitals and improve the trust of the majority of patients in hospitals,this paper takes intelligent hospital management as the object of study,analyzes the importance of electronic information engineering technology applied in hospital management,and discusses the specific application methods of electronic information engineering in hospital management.This aims the existing problems in the current hospital management,such as insufficient degree of informatization,data sharing difficulties,lack of professionals,etc.Corresponding improvement measures are proposed,including strengthening the construction of informatization,promoting data sharing,and cultivating professionals.It is hoped that this study will enable the majority of hospital managers to make better use of electronic information engineering technology to effectively solve the current problems faced by hospitals and to continuously improve the comprehensive competitiveness of China’s hospitals.
文摘Rail transit is considered one of the safest and most efficient modes of transportation.Ticketing,vehicle dispatching,and passenger flow control during rail transit operations in China have been improving over the years.Smart city construction and intelligent management models has also been increasingly emphasized with the rapid development of information and internet technology.Therefore,it is essential to conduct relevant research and discussions to improve the overall efficiency and quality of urban rail transit operation and management.This article provides an overview of smart city rail transit operation and management informatization,the principles of construction,and the functions of smart city rail transit operation and management informatization.Additionally,it discusses the strategies for the construction of smart city rail transit operation and management information and its development prospects.
基金supported in part by the National Natural Science Foundation of China under Grant No.61931020,U19B2024,62171449,62001483in part by the science and technology innovation Program of Hunan Province under Grant No.2021JJ40690。
文摘Increasing research has focused on semantic communication,the goal of which is to convey accurately the meaning instead of transmitting symbols from the sender to the receiver.In this paper,we design a novel encoding and decoding semantic communication framework,which adopts the semantic information and the contextual correlations between items to optimize the performance of a communication system over various channels.On the sender side,the average semantic loss caused by the wrong detection is defined,and a semantic source encoding strategy is developed to minimize the average semantic loss.To further improve communication reliability,a decoding strategy that utilizes the semantic and the context information to recover messages is proposed in the receiver.Extensive simulation results validate the superior performance of our strategies over state-of-the-art semantic coding and decoding policies on different communication channels.
基金funded by the National Natural Science Foundation of China(62172418)the Joint Funds of the National Natural Science Foundation of China and the Civil Aviation Administration of China(U2133203)+1 种基金the Education Commission Scientific Research Project of Tianjin China(2022KJ081)the Open Fund of Key Laboratory of Civil Aircraft Airworthiness Technology(SH2021111907).
文摘System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing.
文摘To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to improve its information management and increase the availability of accurate, real-time data for disaster and humanitarian response teams, significant gaps persist. There are inefficiencies in the emergency management of data at every stage of its lifecycle: collection, processing, analysis, distribution, storage, and retrieval. Disaster risk reduction and disaster risk management are the two main tenets of the United Nations’ worldwide plan for disaster management. Information systems are crucial because of the crucial roles they play in capturing, processing, and transmitting data. The management of information is seldom discussed in published works. The goal of this study is to employ qualitative research methods to provide insight by facilitating an expanded comprehension of relevant contexts, phenomena, and individual experiences. Humanitarian workers and OCHA staffers will take part in the research. The study subjects will be chosen using a random selection procedure. Online surveys with both closed- and open-ended questions will be used to compile the data. UN OCHA offers a structure for the handling of information via which all humanitarian actors may contribute to the overall response. This research will enable the UN Office for OCHA better gather, process, analyze, disseminate, store, and retrieve data in the event of a catastrophe or humanitarian crisis.
文摘In the development of the information age,universities should recognize the significant impact of information technology on their own development.In practice,it is possible to effectively improve the efficiency and quality of work by dealing with and constructing information-based methods,innovating administrative management models,and adopting more efficient and scientific methods to address various problems and shortcomings encountered in work.As an important part of university management,administrative management is a complex task.Establishing a standardized management model through information technology can further improve the comprehensive efficiency of administrative management.In this regard,the administrative standardization in universities under the background of information technology is analyzed and studied in this paper.
文摘Expenditure on wells constitute a significant part of the operational costs for a petroleum enterprise, where most of the cost results from drilling. This has prompted drilling departments to continuously look for ways to reduce their drilling costs and be as efficient as possible. A system called the Drilling Comprehensive Information Management and Application System (DCIMAS) is developed and presented here, with an aim at collecting, storing and making full use of the valuable well data and information relating to all drilling activities and operations. The DCIMAS comprises three main parts, including a data collection and transmission system, a data warehouse (DW) management system, and an integrated platform of core applications. With the support of the application platform, the DW management system is introduced, whereby the operation data are captured at well sites and transmitted electronically to a data warehouse via transmission equipment and ETL (extract, transformation and load) tools. With the high quality of the data guaranteed, our central task is to make the best use of the operation data and information for drilling analysis and to provide further information to guide later production stages. Applications have been developed and integrated on a uniform platform to interface directly with different layers of the multi-tier DW. Now, engineers in every department spend less time on data handling and more time on applying technology in their real work with the system.
基金Supported by Research Project of Zhejiang Provincial Department of Education,No.Y202045115.
文摘BACKGROUND Nutritional support for patients hospitalized in the intensive care unit(ICU)is an important part of clinical treatment and care,but there are significant implementation difficulties.AIM To introduce a modified nutritional support management system for ICU patients based on closed-loop information management and psychological counseling.METHODS The division of functions,personnel training,system construction,development of an intelligent decision-making software system,quality control,and improvement of the whole process were carried out to systematically manage nutritional support for ICU patients.RESULTS Following the implementation of the whole process management system,the scores of ICU medical staff’s knowledge,attitudes/beliefs,and practices regarding nutritional support were comprehensively enhanced.The proportion of hospital bed-days of total enteral nutrition(EN)in ICU patients increased from 5.58%to 11.46%,and the proportion of EN plus parenteral nutrition increased from 42.71%to 47.07%.The rate of EN initiation within 48 h of ICU admission increased from 37.50%to 48.28%,and the EN compliance rate within 72 h elevated from 20.59%to 31.72%.After the implementation of the project,the Self-rating Anxiety Scale score decreased from 61.07±9.91 points to 52.03±9.02 points,the Self-rating Depression Scale score reduced from 62.47±10.50 points to 56.34±9.83 points,and the ICU stay decreased from 5.76±2.77 d to 5.10±2.12 d.CONCLUSION The nutritional support management system based on closed-loop information management and psychological counseling achieved remarkable results in clinical applications in ICU patients.
文摘Applied ethics finds application in all spheres of social life,one of which is the field of library and information science.Ethics is an important pillar contributing to the systematic order of the library and its collection.Ethical principles are contained in key documents such as the Librarian’s Code of Ethics,partly in the Library(Lending)Regulations,and should therefore be adopted by every member of staff.The library profession consists not only of working with information,namely making it available,but also of setting up effective communication towards users(readers)in the form of defining optimal solutions eliminating the problems that arise.The aim of our efforts is to capture the most common problems that arise from misunderstandings between librarian and user(reader)and to make clear what specific role ethical values play in library and information practice.
文摘In African countries,regulations on the management of WTE(Waste from Information Technology Equipment)are non-existent or sometimes insufficient,if they exist.This study shows how to mention waste from information technology equipment in a country that does not have a regulatory legislative framework or organized management channels.A methodological approach based on documentary research and semi-directed interviews was adopted in this work.The results showed that 54.55%of institutional managers are unaware of the existence of regulations for the management of WTE,both at the national and international levels;72.72%of these managers do not have a specific implementing text for this management;72.73%of institutions have adopted an acquisition policy based on the needs of workers and 81.82%of institutions store WTE in warehouses.Relations with waste collection SMEs(Small and Midsize Enterprises),especially for IT equipment,are limited for 72.73%of institutions.In terms of improving the capacity to manage WEEE(Waste Electrical and Electronic Equipment),90.91%of institutions do not offer training or awareness raising.Overall,no significant indicators are in place to assess WEEE management in institutions,which reflects a lack of commitment and awareness among institutional managers.In addition,there are no financial means for ecological and sustainable management.Although 27.27%of managers are aware of the dangers to human health and the environment related to IT equipment,they are often unaware of the harmful consequences of abandoning it in nature.
文摘Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
基金Supported by the Foundation for the Cancer Hospital of Chinese Academy of Medical Sciences~~
文摘How to construct integrative information management system for radiation oncology is a new practice in China based on new technical framework and the profile of integrating the healthcare enterprise in radiation oncology (IHE-RO). This paper presents the research progress for constructing the system in the department of the radiation oncology at Cancer Hospital of Chinese Academy of Medical Sciences, and its system diagram based on IHE-RO technical framework, digital imaging and communication in medicine with radiotherapy (DICOM RT) data flow standard, and emphasizes the importance of DICOM RT in constructing the system and describes the generation process of DICOM RT objects. Finally, the related international standards are suggested on RT devices adopted by China State Food and Drug Administration (SFDA) when the system is constructed.
文摘Now, GISs are popular at most major cities along the coast in China. The lack of available digital geographic data is a serious bottleneck problem. This article first analyses the development characteristics of urban planning and management information system in China, and proposes a method for establishing a planning and management information system for small town. By using GIS as core and integrating with microcomputer network, office automation (OA), computer aided design (CAD), and multimedia technology, a microcomputer information system (TownMIS) is implemented after 3 year design and development. It may be a first comprehensive system for the planning and management of small towns. Since the January of 1996, TownMIS has been actually used in Xiaolan Town, a coastal rich town in South China. This has provided perfect technical, managerial, operational and institutional references for resolving the contradiction of the fast growing installation of GIS sites and fewer actually running system.
文摘Based on an analysis of the characteristics of the Forest Resources Management Information System of each development phase, and consideration of the technical trend in Geographic Information System (GIS) in the Internet Age, this paper explores the importance and the feasibility of setting up Forest Resources Management Information System based on the WEBGIS. At the same time, based on the experience of our study, the paper explores the function, structure and method of developing the Forest Resources Management Information System based on WEBGIS. With the technology of WEBGIS, the Forest Resources Management Information System with data from Huoditang Farm was set up, which makes a great impact on forest resources management. So setting up the Forest Resources Management Information System based on WEBGIS is a trend of forest resources management. In the course of setting up this system, we must pay attention to following questions: 1) unify data standard and information encoding; 2) change mind.
文摘In order to effectively address the issues of environmental pollution and food safety in food industry,the green supply chain management should be used in the food industry.However,information sharing is the basis of supply chain management.For this purpose,on the basis of describing the connotation of food industry green supply chain management,the paper introduces the contents and the effects of information sharing mode in detail.It focuses on the barriers of the implementation of information-sharing mechanisms in the food industry green supply chain management and operation process and analyzes the necessity of using information sharing mechanism among the members of the food industry green supply chain management mode by game theory,so as to strengthen the competitiveness of enterprises through supply chain management.
文摘Multi-sensor system is becoming increasingly important in a variety of military and civilian applications. In general, single sensor system can only provide partial information about environment while multi-sensor system provides a synergistic effect, which improves the quality and availability of information. Data fusion techniques can effectively combine this environmental information from similar and/or dissimilar sensors. Sensor management, aiming at improving data fusion performance by controlling sensor behavior, plays an important role in a data fusion process. This paper presents a method using fisher information gain based sensor effectiveness metric for sensor assignment in multi-sensor and multi-target tracking applications. The fisher information gain is computed for every sensor-target pairing on each scan. The advantage for this metric over other ones is that the fisher information gain for the target obtained by multi-sensors is equal to the sum of ones obtained by the individual sensor, so standard transportation problem formulation can be used to solve this problem without importing the concept of pseudo sensor. The simulation results show the effectiveness of the method.
文摘An architecture and design of a maintenance information management system for distributed manufacture system is presented in this paper, and its related key technologies are studied and implemented also. A frame of the maintenance information management system oriented human-machine monitoring is designed, and using object-oriented method, a general maintenance information management system based on SQL server engineering database and adopted client/server/database three-layer mode can be established. Then, discussions on control technologies of maintenance information management system and remote distributed diagnostics and maintenance system are emphasized. The system is not only able to identify and diagnose faults of distributed manufacture system quickly, improve system stability, but also has intelligent maintenance functions.