期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Highly Secure Residents Life Event Management System Based on Blockchain by Hyperledger Fabric 被引量:1
1
作者 Ragouguelaba Agoda Koussema Hirohide Haga 《Journal of Computer and Communications》 2021年第9期38-55,共18页
This article describes the design and implementation of Residents Life Event Management System (hereinafter called as RLEMS) with high level reliability and security by blockchain technology. The data access environme... This article describes the design and implementation of Residents Life Event Management System (hereinafter called as RLEMS) with high level reliability and security by blockchain technology. The data access environment provided by blockchain is highly secure and trustworthy. In Blockchain system, some data fragments are grouped into one piece called as <i>blocks</i>, and all blocks are connected to create a chain of blocks in database. When blocks are connected, hash value is used to connect blocks properly. Blockchain technology enables highly secure and reliable data management system under relatively poor ICT environment. For example, developing countries such as African countries do not have sufficient ICT environment. Therefore adopting blockchain technology is suitable for such countries. Based on this consideration, we have started to build RLEMS on the blockchain system. In previous work, we used the MultiChain as a blockchain platform. However, as MultiChain platform is mainly for private blockchain system, it is not suitable for government-level data management system. Therefore, we tried to use another blockchain framework. We selected Hyperledger Fabric which was developed by Linux Foundation. It enables to implement all styles of blockchain system. This article describes the design and implementation of RLEMS by using Hyperledger Fabric. Furthermore, to provide the best user experience, we also built the web application interface with Java web application framework named PrimeFace. The implementation of a prototype revealed that the Hyperledger Fabric blockchain technology is more suitable than MultiChain. 展开更多
关键词 Blockchain Secure Database Life event management Web Application
下载PDF
A Creative Wedding Event Management for Sustaining Community-Based Eco-Tourism: A Case Study in Thailand
2
作者 Siyathorn Nakphin Chayapoj Lee-Anant +1 位作者 Jaree Phrommana Kessini Tripongpun 《Journal of Tourism and Hospitality Management》 2021年第4期248-258,共11页
The research aims to propose a proper model for organizing a creative wedding event to boost Community-Based Eco-Tourism(CBET)in rural areas.It is participatory research.Site observation and in-depth interviews are 10... The research aims to propose a proper model for organizing a creative wedding event to boost Community-Based Eco-Tourism(CBET)in rural areas.It is participatory research.Site observation and in-depth interviews are 10 stakeholders from various organization;local people,the district sheriff,the provincial culture,the national park,the district municipality,the community-based tourism group,the wedding organizers and the educators from a wedding event in themed“Carry Love Covering the Forest”organized in Wiang Sa,Suratthani,the southern part of Thailand were applied.Thematic analysis was applied to analyze the data.The results found that the managing model for organizing an event tourism in Community-Based Eco-Tourism composes of three stages being pre-event,during-event,and after-event.The research provides a comprehensive understanding management model of CBET.The research makes contribution to develop and manage a new creative event to enhance positive impacts of community-based tourism to sustain,especially in eco-tourism destination. 展开更多
关键词 event management Community-Based Eco-Tourism sustainable tourism
下载PDF
Better Management of Adverse Events Favors Sorafenib Treatment of HCC Patients and Impact on Survival
3
作者 Regiane S. S. M. Alencar Luciana Kikuchi +5 位作者 Cláudia M. Tani Aline L. Chagas Cinira C. Camargo Túlio E. F. Pfiffer Paulo M. G. Hoff Flair J. Carrilho 《Journal of Cancer Therapy》 2016年第4期275-284,共10页
Introduction: Sorafenib is an orally active multikinase inhibitor approved for the treatment of advanced hepatocellular carcinoma (HCC) and is the only systemic treatment associated with a survival benefit in advanced... Introduction: Sorafenib is an orally active multikinase inhibitor approved for the treatment of advanced hepatocellular carcinoma (HCC) and is the only systemic treatment associated with a survival benefit in advanced stage. The aims of this study were to evaluate the tolerance and survival of sorafenib-treated patients, and to identify potential prognostic factors of survival. Methods: A total of 88 HCC patients treated with sorafenib from June 2010 to January 2014 were retrospectively reviewed. Tumour stage, liver function and adverse events to sorafenib were analyzed. Univariate and multivariate analysis were carried out to identify predictors of survival in patients with advanced HCC treated with sorafenib. Results: There were 64 (73%) males included in this study, with a median age of 61.16 years. Eight (91%) patients had Child-Pugh class A cirrhosis. Most patients were classified as BCLC C (82%). Hepatitis C virus was the predominant cause of HCC (68%). Sorafenib was the initial treatment modality in 43%. Median time of sorafenib therapy was 8.23 months. Overall survival in 1 year was 57.3% and 36.7% in 2 years. The median survival was 16.3 months. In the univariate analysis of the OS based on Child-Pugh score did not demonstrate a significant difference in our study (p = 0.62). The presence of dermatologic adverse event predicted a better overall survival in the multivariate analysis. Better survival was also observed in patients with AFP level <100 ng/ml in the start of sorafenib therapy (p = 0.001). Patients that used Sorafenib for ≥6 months had shown better outcome. None of the patients discontinued sorafenib because of adverse effects. Conclusions: Advanced HCC patients treated with sorafenib who experienced dermatologic adverse event and low AFP level <100 ng/ml showed better overall survival. As expected, longer sorafenib therapy (≥6 months) was associated to better survival. Even in the presence of adverse events, the use of sorafenib should be continued because the longer usage time improves survival. 展开更多
关键词 management of Adverse event Hepatocellular Carcinoma Sorafenib Therapy Predictors of Overall Survival Dermatologic Adverse event
下载PDF
Sustainability Takes Centre Stage in Events Management
4
作者 BSI 《China Standardization》 2008年第4期10-15,共6页
ISO International Standards constitute a toolbox not only for the environmental integrity of the planet,but also for economic growthand social equity-in other words,for all three dimensions ofsustainable development.
关键词 Nation Sustainability Takes Centre Stage in events management BSI
全文增补中
Technology as Spectacle: Understanding the Burgeoning Role of Social Media in Special Events 被引量:1
5
作者 Lisa Hanslip 《Journalism and Mass Communication》 2013年第7期422-430,共9页
This paper investigates how social media can be used as a communication tool throughout the event management process, how online social networking interfaces can allow consumers to become more engaged with special eve... This paper investigates how social media can be used as a communication tool throughout the event management process, how online social networking interfaces can allow consumers to become more engaged with special events, and how social media can be used to help gauge the social and cultural impact of special events. By synthesizing prominent literature that is peripherally related, this paper establishes both a base of knowledge for this new realm of inquiry, as well as identifying a platform for further research. The paper also adds to the knowledge based by creating a theoretical framework which brings together practice theory with situationist theory to present a new lens through which to examine this issue. From a theoretical standpoint, technology is said to be a reflection of society. If technology can be linked to society and society in turn can be equated with the spectacle then it is a natural progression to examine technology as spectacle. Therefore, using the two theories in tandem provides a very suitable lens to frame an investigation of technology as spectacle, and the viability of social media as a communication tool for special events. 展开更多
关键词 social media special event management situationist theory practice theory
下载PDF
Monitoring and Measuring Event Decision-Making Process Using Key Performance Indicators: Evidence From Italian Cruise Terminals
6
作者 Assunta Di Vaio Luisa Varriale 《Chinese Business Review》 2017年第8期382-390,共9页
This paper investigates the control systems and coordination mechanisms applied in the relationships between cruise line companies and terminal concessionaires in the cruise events management when the ships are stoppi... This paper investigates the control systems and coordination mechanisms applied in the relationships between cruise line companies and terminal concessionaires in the cruise events management when the ships are stopping on the quay. Using a case study methodology and focusing on the Italian context, this exploratory study, through a qualitative approach, interviewed two main cruise terminal concessionaires and indirectly observed events planned by cruise companies in sea ports selected for outlining the role of control systems, coordination, and knowledge sharing between the players in cruise events decision-making processes. The first results show that the cruise event management processes on ship berthing and on terminal are separated. The cruise companies don't involve terminal concessionaires in the event organization considering them only service suppliers Also, the concessionaires conceive the events planned in the cruise infrastructures as a business unit to optimize the space use, without any forms of coordination or control with cruise companies. Knowledge sharing, coordination, and control among the two players could support the planning, and management of "new cruise events" in which the visitors may be led from the infrastructure to the ships stopped on the quay. This study offers a set of key performance indicators to support the management, control, and coordination of each inter-organizational relationship identified. Managerial implications and suggestions for improving cruise events management have been provided. 展开更多
关键词 cruise event management cruise line companies cruise terminal concessionaires key performance indicator performance measurement and control coordination and collaboration
下载PDF
Event Normalization Through Dynamic Log Format Detection
7
作者 Amir Azodi David Jaeger +1 位作者 Feng Cheng Christoph Meinel 《ZTE Communications》 2014年第3期62-66,共5页
The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they rece... The analytical and monitoring capabilities of central event re-positories, such as log servers and intrusion detection sys-tems, are limited by the amount of structured information ex-tracted from the events they receive. Diverse networks and ap-plications log their events in many different formats, and this makes it difficult to identify the type of logs being received by the central repository. The way events are logged by IT systems is problematic for developers of host-based intrusion-detection systems (specifically, host-based systems), develop-ers of security-information systems, and developers of event-management systems. These problems preclude the develop-ment of more accurate, intrusive security solutions that obtain results from data included in the logs being processed. We propose a new method for dynamically normalizing events into a unified super-event that is loosely based on the Common Event Expression standard developed by Mitre Corporation. We explain how our solution can normalize seemingly unrelat-ed events into a single, unified format. 展开更多
关键词 event normalization: intrusion detection event stream processing knowledge base security information and event management
下载PDF
High Efficiency Predictive Control Strategy Applied to a Fower Factor Correction System
8
作者 Fernando Parillo 《Journal of Energy and Power Engineering》 2012年第11期1809-1815,共7页
This work explores the feasibility of a novel predictive control strategy on a power factor correction system. The proposed control strategy allows a significant reduction of the power losses respect to a classical pr... This work explores the feasibility of a novel predictive control strategy on a power factor correction system. The proposed control strategy allows a significant reduction of the power losses respect to a classical predictive control strategy working with a fixed execution time Ts. The proposed control strategy operates with a variable execution time T~, and it has been implemented using a low cost hardware platform based on TI~ TMS320F2812 DSP. The chosen platform is capable to execute a control strategy code with a variable execution time T,. This operation can be performed by setting in proper manner, the timer registers of one of two event manager A/B blocks present on the mentioned DSP (digital signal processor). 展开更多
关键词 DSP event manager A/B PFC variable execution time T system efficiency.
下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
9
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (Security Information and event management) CISA (Cybersecurity and Infrastructure Security Agency) NIST (National Institute of Standards and Technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet Control Message Protocol) Cyberwarfare
下载PDF
Digitalization of mine operations:Scenarios to benefit in real-time truck dispatching 被引量:5
10
作者 Patarawan Chaowasakoo Heikki Seppala +1 位作者 Heikki Koivo Quan Zhou 《International Journal of Mining Science and Technology》 SCIE EI CSCD 2017年第2期229-236,共8页
One of the key factors in a profitable open-pit mine is the efficiency of the waste disposal system. Using GPS-technology, the truck-dispatching decisions can be made in real-time but the chosen strategy has a crucial... One of the key factors in a profitable open-pit mine is the efficiency of the waste disposal system. Using GPS-technology, the truck-dispatching decisions can be made in real-time but the chosen strategy has a crucial role. Therefore, finding the optimal dispatching strategy for truck-shovel operations is extremely important. Dispatching strategies have been reported in the literature, but the comparison of these strategies is still missing. This paper illustrates the differences between the strategies by conducting a stochastic simulation study based on the data gathered from an actual mine. The findings underline the importance of the global vision in dispatching decisions. 展开更多
关键词 Discrete event simulation GPS Truck dispatching Cycle time Fleet management
下载PDF
Human-as-a-security-sensor for harvesting threat intelligence 被引量:1
11
作者 Manfred Vielberth Florian Menges Günther Pernul 《Cybersecurity》 CSCD 2019年第1期349-363,共15页
Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the tar... Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the target of successful attacks.Existing approaches,however,do not tap the full potential that can be gained through these campaigns.On the one hand,human perception offers an additional source of contextual information for detected incidents,on the other hand it serves as information source for incidents that may not be detectable by automated procedures.These approaches only allow a text-based reporting of basic incident information.A structured recording of human delivered information that also provides compatibility with existing SIEM systems is still missing.In this work,we propose an approach,which allows humans to systematically report perceived anomalies or incidents in a structured way.Our approach furthermore supports the integration of such reports into analytics systems.Thereby,we identify connecting points to SIEM systems,develop a taxonomy for structuring elements reportable by humans acting as a security sensor and develop a structured data format to record data delivered by humans.A prototypical human-as-a-security-sensor wizard applied to a real-world use-case shows our proof of concept. 展开更多
关键词 Cyber threat intelligence Human awareness Human-as-a-security-sensor Security information and event management(SIEM)
原文传递
Human-as-a-security-sensor for harvesting threat intelligence
12
作者 Manfred Vielberth Florian Menges Gunther Pernul 《Cybersecurity》 2018年第1期652-666,共15页
Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the tar... Humans are commonly seen as the weakest link in corporate information security.This led to a lot of effort being put into security training and awareness campaigns,which resulted in employees being less likely the target of successful attacks.Existing approaches,however,do not tap the full potential that can be gained through these campaigns.On the one hand,human perception offers an additional source of contextual information for detected incidents,on the other hand it serves as information source for incidents that may not be detectable by automated procedures.These approaches only allow a text-based reporting of basic incident information.A structured recording of human delivered information that also provides compatibility with existing SIEM systems is still missing.In this work,we propose an approach,which allows humans to systematically report perceived anomalies or incidents in a structured way.Our approach furthermore supports the integration of such reports into analytics systems.Thereby,we identify connecting points to SIEM systems,develop a taxonomy for structuring elements reportable by humans acting as a security sensor and develop a structured data format to record data delivered by humans.A prototypical human-as-a-security-sensor wizard applied to a real-world use-case shows our proof of concept. 展开更多
关键词 Cyber threat intelligence Human awareness Human-as-a-security-sensor Security information and event management(SIEM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部