期刊文献+
共找到566,075篇文章
< 1 2 250 >
每页显示 20 50 100
气象观测场在汽车试验场中的应用研究
1
作者 陈海建 《时代汽车》 2024年第14期172-174,178,共4页
汽车试验场作为汽车开展道路测试的重要场所,用于验证汽车产品的品质以及可靠性。除了场地道路外,气象条件作为汽车道路测试的重要一环,在《GB/T12534-1990汽车道路试验方法通则》中也有明确要求,如:试验时应是无雨无雾天气,相对湿度小... 汽车试验场作为汽车开展道路测试的重要场所,用于验证汽车产品的品质以及可靠性。除了场地道路外,气象条件作为汽车道路测试的重要一环,在《GB/T12534-1990汽车道路试验方法通则》中也有明确要求,如:试验时应是无雨无雾天气,相对湿度小于95%,气温0-40℃,风速不大于3m/s。同时气象条件也作为试验场道路管控的重要依据,实时风速、雨量、能见度等信息为场地管理者发布限速、限行、封场等通知提供必要参考依据,直接影响道路测试安全管控的及时性。因此,文章从气象观测场的建设、气象服务、异常天气道路管控等方面开展气象观测场在汽车试验场中的应用研究。 展开更多
关键词 products. In addition to the SITE roads METEOROLOGICAL conditions are an important part of AUTOMOTIVE ROAD testing and there are also clear requirements in the GB/T12534-1990 General Rules for AUTOMOTIVE ROAD Test Methods. For example the test should be conducted in rain and fog free weather with a relative humidity of less than 95% a temperature of 0-40 and a wind SPEED of no more than 3m/s. At the same time METEOROLOGICAL conditions also serve as an important basis for ROAD control in the test site. Real time information such as wind SPEED rainfall and visibility provides necessary reference for SITE managers to issue notices on SPEED limits SITE closures and trac restrictions directly aecting the timeliness of ROAD testing safety control. Therefore this article conducts research on the application of METEOROLOGICAL observation SITES in AUTOMOTIVE testing SITES from the construction of METEOROLOGICAL observation SITES METEOROLOGICAL services and abnormal weather ROAD control.
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
2
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Intelligent Biometric Information Management
3
作者 Harry Wechsler 《Intelligent Information Management》 2010年第9期499-511,共13页
We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation,... We advance here a novel methodology for robust intelligent biometric information management with inferences and predictions made using randomness and complexity concepts. Intelligence refers to learning, adap- tation, and functionality, and robustness refers to the ability to handle incomplete and/or corrupt adversarial information, on one side, and image and or device variability, on the other side. The proposed methodology is model-free and non-parametric. It draws support from discriminative methods using likelihood ratios to link at the conceptual level biometrics and forensics. It further links, at the modeling and implementation level, the Bayesian framework, statistical learning theory (SLT) using transduction and semi-supervised lea- rning, and Information Theory (IY) using mutual information. The key concepts supporting the proposed methodology are a) local estimation to facilitate learning and prediction using both labeled and unlabeled data;b) similarity metrics using regularity of patterns, randomness deficiency, and Kolmogorov complexity (similar to MDL) using strangeness/typicality and ranking p-values;and c) the Cover – Hart theorem on the asymptotical performance of k-nearest neighbors approaching the optimal Bayes error. Several topics on biometric inference and prediction related to 1) multi-level and multi-layer data fusion including quality and multi-modal biometrics;2) score normalization and revision theory;3) face selection and tracking;and 4) identity management, are described here using an integrated approach that includes transduction and boosting for ranking and sequential fusion/aggregation, respectively, on one side, and active learning and change/ outlier/intrusion detection realized using information gain and martingale, respectively, on the other side. The methodology proposed can be mapped to additional types of information beyond biometrics. 展开更多
关键词 Authentication Biometrics Boosting Change DETECTION Complexity Cross-Matching Data Fusion Ensemble Methods Forensics Identity MANAGEMENT Imposters Inference INTELLIGENT Information MANAGEMENT Margin gain MDL Multi-Sensory Integration Outlier DETECTION P-VALUES Quality Randomness Ranking Score Normalization Semi-Supervised Learning Spectral Clustering STRANGENESS Surveillance Tracking TYPICALITY Transduction
下载PDF
谣言实现的社会机制及对信息的治理 被引量:31
4
作者 李国武 《社会》 北大核心 2005年第4期143-155,共13页
Rumors are a type of false information, a consequence of an asymmetrical informational structure. This paper focuses on the social mechanisms of rumor fulfilling. Rumors with important contents related to people’s pe... Rumors are a type of false information, a consequence of an asymmetrical informational structure. This paper focuses on the social mechanisms of rumor fulfilling. Rumors with important contents related to people’s personal interests win acceptance through changing people’s expected payoffs, misleading people to the belief that acceptance of the rumor would beneficially outperform rejection of it. Nevertheless, it is risky to believe rumors; therefore, people make their decision whether to believe a rumor or not by referring to other people’s choices. An analysis was performed first within a game model that incorporated the variables of an individual’s expectancy and other people’s impact to predict whether the individual would accept or reject a rumor. Another analysis followed to further examine the functions of some dynamic mechanisms in rumor fulfilling when group pressure and network effects were introduced. Finally, an exploratory discussion on how to prevent rumors and erase their effects via information management strategies was presented. 展开更多
关键词 WHETHER structure people ANOTHER further network WOULD impact that first model group and type This with make game some when to of are WIN how via on
下载PDF
Neural Network-Powered License Plate Recognition System Design
5
作者 Sakib Hasan Md Nagib Mahfuz Sunny +1 位作者 Abdullah Al Nahian Mohammad Yasin 《Engineering(科研)》 2024年第9期284-300,共17页
The development of scientific inquiry and research has yielded numerous benefits in the realm of intelligent traffic control systems, particularly in the realm of automatic license plate recognition for vehicles. The ... The development of scientific inquiry and research has yielded numerous benefits in the realm of intelligent traffic control systems, particularly in the realm of automatic license plate recognition for vehicles. The design of license plate recognition algorithms has undergone digitalization through the utilization of neural networks. In contemporary times, there is a growing demand for vehicle surveillance due to the need for efficient vehicle processing and traffic management. The design, development, and implementation of a license plate recognition system hold significant social, economic, and academic importance. The study aims to present contemporary methodologies and empirical findings pertaining to automated license plate recognition. The primary focus of the automatic license plate recognition algorithm was on image extraction, character segmentation, and recognition. The task of character segmentation has been identified as the most challenging function based on my observations. The license plate recognition project that we designed demonstrated the effectiveness of this method across various observed conditions. Particularly in low-light environments, such as during periods of limited illumination or inclement weather characterized by precipitation. The method has been subjected to testing using a sample size of fifty images, resulting in a 100% accuracy rate. The findings of this study demonstrate the project’s ability to effectively determine the optimal outcomes of simulations. 展开更多
关键词 Intelligent Traffic Control Systems Automatic License Plate Recognition (ALPR) Neural Networks Vehicle Surveillance Traffic Management License Plate Recognition Algorithms Image Extraction Character Segmentation Character Recognition Low-Light Environments Inclement Weather Empirical Findings Algorithm Accuracy Simulation Outcomes DIGITALIZATION
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
6
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) Key Risk Indicator (KRI) Layered Defense Lockheed Martin Kill Chain Proactive Defense Redundancy Risk Management Threat Intelligence
下载PDF
高校人力资源管理信息系统的设计 被引量:26
7
作者 姜真杰 程军 《浙江林学院学报》 CAS CSCD 北大核心 2003年第1期98-101,共4页
传统的人事管理系统存在开放性差、维护量大、信息量小和缺乏人性化等问题 ,难以适应新的管理模式。文章首先对高校开发人力资源管理信息系统的必要性和相应条件进行了阐述 ,文章结合实际提出了一种借鉴人力资源管理、利用ODBC技术、基... 传统的人事管理系统存在开放性差、维护量大、信息量小和缺乏人性化等问题 ,难以适应新的管理模式。文章首先对高校开发人力资源管理信息系统的必要性和相应条件进行了阐述 ,文章结合实际提出了一种借鉴人力资源管理、利用ODBC技术、基于C/S和B/S混合结构 ,充分利用校园网络环境的高校人力资源管理信息系统运行模式。该系统在实现信息共享、数据集中管理、安全性、扩充性和易用性方面得到了有效改善。文章结合图示对相应模块的功能及新系统的优势进行了分析。图 2参 展开更多
关键词 ODBC B/S C/S
下载PDF
Performance of a Horizontal Flow Constructed Reed Bed Filter for Municipal Wastewater Treatment: The Case Study of the Prototype Installed at Gaston Berger University, Saint-Louis, Senegal
8
作者 Abdou Khafor Ndiaye Falilou Coundoul +2 位作者 Abdoulaye Deme Antonina Torrens Armengol Abdoulaye Senghor 《Natural Resources》 2024年第1期1-16,共16页
In Saint-Louis, Senegal, a constructed wetland with horizontal flow reed beds (FHa and FHb) has demonstrated significant efficacy in treating municipal wastewater. Analyzing various treatment stages, the system showed... In Saint-Louis, Senegal, a constructed wetland with horizontal flow reed beds (FHa and FHb) has demonstrated significant efficacy in treating municipal wastewater. Analyzing various treatment stages, the system showed only a slight temperature variation, from an influent average of 26.3°C to an effluent of 24.7°C. Electrical conductivity decreased from 1331 mS/cm to 974.5 mS/cm post-primary treatment, with suspended solids (SS) dramatically reduced from 718.9 mg/L to 5.7 mg/L in the final effluent. Biochemical oxygen demand (BOD5) and chemical oxygen demand (COD) saw a notable decrease, from initial levels of 655.6 mg/L and 1240 mg/L to 2.3 mg/L and 71.3 mg/L, respectively. Nitrogenous compounds (N-TN) and phosphates () also decreased significantly, indicating the system’s nutrient removal capacity. Microbiological analysis revealed a reduction in fecal coliforms from 7.5 Ulog/100ml to 1.8 Ulog/100ml and a complete elimination of helminth eggs. The presence of Phragmites and Typha was instrumental in enhancing these reductions. The system’s compliance with the Senegalese standards for disposal into natural environments, WHO recommendations for unrestricted water reuse in irrigation, and the European legislation for water reuse was established. The effluent quality met the stringent criteria for various classes of agricultural reuse, illustrating the system’s potential for sustainable water management. This wetland model presents a robust solution for water-stressed regions, ensuring environmental protection while supporting agricultural needs. The study calls for ongoing research to further refine the system for optimal, reliable wastewater treatment and water resource sustainability. 展开更多
关键词 Constructed Wetlands Horizontal Flow Reed Beds Wastewater Treatment Phragmites and Typha Plants Physicochemical Pollutant Removal Microbiological Indicators Fecal Coliforms and Helminth Eggs Water Quality Improvement Senegal Water Reuse Standards Sustainable Water Management Agricultural Irrigation Reuse Nutrient Removal Efficiency Environmental Engineering Ecological Sanitation Systems
下载PDF
Information Management in Disaster and Humanitarian Response: A Case in United Nations Office for the Coordination of Humanitarian Affairs
9
作者 Solomon M. Zewde 《Intelligent Information Management》 2023年第2期47-65,共19页
To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to imp... To guarantee a unified response to disasters, humanitarian organizations work together via the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Although the OCHA has made great strides to improve its information management and increase the availability of accurate, real-time data for disaster and humanitarian response teams, significant gaps persist. There are inefficiencies in the emergency management of data at every stage of its lifecycle: collection, processing, analysis, distribution, storage, and retrieval. Disaster risk reduction and disaster risk management are the two main tenets of the United Nations’ worldwide plan for disaster management. Information systems are crucial because of the crucial roles they play in capturing, processing, and transmitting data. The management of information is seldom discussed in published works. The goal of this study is to employ qualitative research methods to provide insight by facilitating an expanded comprehension of relevant contexts, phenomena, and individual experiences. Humanitarian workers and OCHA staffers will take part in the research. The study subjects will be chosen using a random selection procedure. Online surveys with both closed- and open-ended questions will be used to compile the data. UN OCHA offers a structure for the handling of information via which all humanitarian actors may contribute to the overall response. This research will enable the UN Office for OCHA better gather, process, analyze, disseminate, store, and retrieve data in the event of a catastrophe or humanitarian crisis. 展开更多
关键词 Information Systems Management Information Management UNOCHA (United Nations Office for Coordination of Humanitarian affairs) Humanitarian Emergency Actors DISASTER Risk Reduction RESPONSE Emer-gency Management
下载PDF
The Role of Library and Information Science Education in the Development of Community Health Information Services for People Living with HIV/AIDS: Perspectives of Directors and Managers of Public Libraries 被引量:2
10
作者 Bharat Mehra Adrienne Dessel 《World Journal of AIDS》 2011年第3期78-87,共10页
This article identifies the role of library and information science (LIS) education in the development of community health information services for people living with HIV/AIDS (PLWHA). Preliminary findings are present... This article identifies the role of library and information science (LIS) education in the development of community health information services for people living with HIV/AIDS (PLWHA). Preliminary findings are presented from semi- structured qualitative interviews that were conducted with eleven directors and managers of local branches in the Knox County Public Library (KCPL) System that is located in the East Tennessee region in the United States. Select feedback reported by research participants is summarized in the article about strategies in LIS education that can help local public librarians and others in their efforts to become more responsive information providers to PLWHA. Research findings help better understand the issues and concerns regarding the development of digital and non-digital health information services for PLWHA in local public library institutions. 展开更多
关键词 People LIVING with HIV/AIDS PLWHA PUBLIC LIBRARY Directors and managerS Community Health Information Services
下载PDF
基于WebGIS的灌区水资源管理信息化方法与实现 被引量:7
11
作者 马乐平 易善桢 +1 位作者 严冬 黄波 《水电能源科学》 北大核心 2010年第8期137-139,共3页
以西北干旱地区疏勒河灌区为例,提出了将WebGIS应用于灌区水资源管理,构建和设计了系统结构、功能,并对灌区渠系水资源管理数据进行分类,分析了动态访问数据库技术,实现了灌区所需信息的采集、传输、处理与分析的现代化与自动化。
关键词 WEBGIS Area Implementation Management Information System 西 访
下载PDF
战略性、渐进性动态均衡与次优制度创新——高校人事管理改革理念、任务、思路、路径 被引量:9
12
作者 周志成 《复旦教育论坛》 2005年第3期32-35,39,共5页
高校人事管理改革面临深层的结构性问题,需要理念的创新。战略性人才资源管理的基本理念是:战略化、社会化、国际化、市场化、分散化、整体化。其基本任务是:重点突破,整体推进,通过序列改革,逐步建立以岗位管理为核心的简洁、高效、内... 高校人事管理改革面临深层的结构性问题,需要理念的创新。战略性人才资源管理的基本理念是:战略化、社会化、国际化、市场化、分散化、整体化。其基本任务是:重点突破,整体推进,通过序列改革,逐步建立以岗位管理为核心的简洁、高效、内在统一的人事管理新体系。改革以制度保障为前提,次优改革是唯一可行的有效制度改革选择,渐进化动态均衡改革是提高制度创新效率的必由之路。 展开更多
关键词
下载PDF
零售型企业的供应商分类管理研究 被引量:11
13
作者 刘汉进 倪沈冰 张莉娜 《南开管理评论》 CSSCI 2005年第2期72-77,共6页
供应链管理是企业在当前日益激烈的竞争环境中为提高核心竞争力而形成发展起来的管理方法。供应商的选择与管理是供应链管理中的研究热点,尤其是在零售领域。一个零售商往往拥有众多的供应商,对这些供应商进行分类管理是降低运营成本、... 供应链管理是企业在当前日益激烈的竞争环境中为提高核心竞争力而形成发展起来的管理方法。供应商的选择与管理是供应链管理中的研究热点,尤其是在零售领域。一个零售商往往拥有众多的供应商,对这些供应商进行分类管理是降低运营成本、提高管理水平的重要途径。此外,对供应商进行分类管理还能够促进双方在更深层面上的战略性合作,通过互动交流提高整体运作绩效。本文通过对不同类型供应商的比较分析指出,将供应商按产品优势和服务优势进行二元分类最能体现供应商间的本质性区别,并且也是管理成本相对最低的分类方法,我们以其各自的突出优势点将供应商分为产品型供应商与服务型供应商两类。本文根据零售型企业的供应商特点给出了供应商分类的指标集,并利用判别分析给出了相应的定量化分类方法及应用实例。 展开更多
关键词
下载PDF
Corroborative Activities and Recognition Between Community Comprehensive Care Unit’s Nurses and Care Managers in Supporting Discharge of Elderly from Hospital - A Secondary Publication
14
作者 Yukie Sakamoto Shizuko Omote +2 位作者 Rie Okamoto Yutaro Takahashi Satomi Ikeuchi 《Journal of Clinical and Nursing Research》 2024年第4期381-392,共12页
Objective: The purpose of this study was to clarify the collaborative activities and mutual recognition between community comprehensive care unit nurses (Ns) and care managers (CM) in supporting the discharge of the e... Objective: The purpose of this study was to clarify the collaborative activities and mutual recognition between community comprehensive care unit nurses (Ns) and care managers (CM) in supporting the discharge of the elderly from the hospital. Methods: A total of 300 nurses working in community comprehensive care wards and 360 care managers working in B City in A Prefecture were surveyed using an anonymous self-administered questionnaire. Results: The highest percentage of responses regarding necessary collaborative activities with multiple professions in supporting hospital discharge were the same for Ns and CMs. The items regarding practice with the highest percentages were “relationship as a team” for Ns, and “user-centered awareness” for CM. While these professionals were willing to share information about their patients’ lives after discharge, the percentage of those explaining their expertise was low. It is thought that collaborative activities focusing on these aspects would lead to more appropriate discharge support. 展开更多
关键词 Discharge support Community comprehensive care ward Ward nurses Care managers Collaborative activities
下载PDF
全程电子病历质量管理的实施 被引量:4
15
作者 王淑平 《中国卫生质量管理》 2005年第2期61-62,60,共3页
目的随着CPR应用的不断深入,其管理和使用过程中的有关问题逐步暴露出来,如何确保CPR信息准确、安全,保持其原始性、真实性,是电子病历开发、使用者和医院管理者高度重视的课题。在电子病力使用过程中存在的主要问题是程序和电子病历模... 目的随着CPR应用的不断深入,其管理和使用过程中的有关问题逐步暴露出来,如何确保CPR信息准确、安全,保持其原始性、真实性,是电子病历开发、使用者和医院管理者高度重视的课题。在电子病力使用过程中存在的主要问题是程序和电子病历模板设计不完善、智能化程度低、病历内涵和外在质量问题较多(病历的客观真实性受到挑战,病历内容的雷同化现象,存在严重的质量缺陷,病案首页信息不规范,打印质量问题,His网上数据欠准确)、保密设置功能不完善、医-护之间的脱节现象、病历的存储和流通格式有待规范。方法为此需要采取如下措施:不断完善电子病历源程序;建立智能化平台;建立网络模式下新的病案监控手段和管理方式、加强HIS网上数据监控、开发电子病历质量监控软件、健全电子病历的安全防范措施等。结果电子病历质量明显提高。 展开更多
关键词 使 CPR 使 His
下载PDF
Factors Promoting and Hindering Performance of Unit Nurse Managers at Kamuzu and Queen Elizabeth Central Hospitals in Malawi
16
作者 Caroline Chitsulo Mercy Pindani +1 位作者 Idesi Chilinda Alfred Maluwa 《Open Journal of Nursing》 2014年第13期928-938,共11页
Unit nurse managers in Malawi experience many challenges in the course of performing their roles. This affects their performance and service delivery including the quality of nursing care to patients. This study was c... Unit nurse managers in Malawi experience many challenges in the course of performing their roles. This affects their performance and service delivery including the quality of nursing care to patients. This study was conducted to determine the factors that hindered performance of unit managers in relation to expected quality of nursing services at two referral facilities (Kamuzu and Queen Elizabeth Central hospitals) in Malawi. These two central hospitals have the same structural settings and both offer specialized tertiary health services. A quantitative descriptive design was used to guide the planning and implementation of the study. Purposive sampling was used to select the two major hospitals in Malawi and all available 37 unit nurse managers during the time of the study at the two hospitals participated in the study. Data were collected using semi-structured questionnaires after seeking consent from the participants and were analyzed using SPSS version 16.0. The major roles identified by the unit managers were supervision (75.6%, n = 28) and coordination (70.3%, n = 26). Other roles such as team leader, liaison officer, research allocator, monitor and facilitator were rated by very few participants. Findings of the study showed that performance of unit nurse managers was affected by inadequate material (86.4%, n = 32) and human resources (94.5%, n = 35) and lack of managerial skills (5.4%, n = 2). In addition, the unit managers perceived their role to be stressful (38.9%, n = 14) and challenging (47.2%, n = 17). Therefore, there is a need to provide adequate material and human resources to the wards of the two central hospitals to enable the unit managers perform their duties efficiently. 展开更多
关键词 UNIT NURSE manager Quality of Nursing Care managerial Skills Level of PERFORMANCE Role of NURSE managerS Effective PERFORMANCE
下载PDF
智能电网中低压一体化配用电监控管理系统 被引量:8
17
作者 陈丁剑 《低压电器》 北大核心 2010年第22期22-24,共3页
针对配电网供电可靠性、电能质量、分布式电源的接入和需求侧响应等问题,提出了"智能电网中低压一体化配用电监控管理系统",为智能电网的配电和用户侧的智能化提供切实可行的解决方案。系统面向智能配电和智能用电2个环节,覆... 针对配电网供电可靠性、电能质量、分布式电源的接入和需求侧响应等问题,提出了"智能电网中低压一体化配用电监控管理系统",为智能电网的配电和用户侧的智能化提供切实可行的解决方案。系统面向智能配电和智能用电2个环节,覆盖20/10/0.4 kV中低压配用电,实现基于GIS的配网自动化、配电管理、设备管理、负荷管理、远程抄表、分布式电源和微型电网接入等功能,以提高电力系统的运行可靠性和自动化程度。 展开更多
关键词 Grid Smart Management System Power Distribution
下载PDF
Factors Influencing the Successful Adoption of Human Resource Information System: The Content of Aqaba Special Economic Zone Authority
18
作者 Hisham Al-Mobaideen Sattam Allahawiah Eman Basioni 《Intelligent Information Management》 2013年第1期1-9,共9页
This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the p... This study examines the key factors that have impact on the successful adoption of Human Resource Information System (HRIS) within the Aqaba Special Economic Zone Authority (ASEZA)/Jordan. In order to accomplish the purpose of the study four critical factors are inquired. So, four critical factors are inquired: First, TAM Model (Perceived Ease of Use (PEOU) and Perceived Usefulness (PU)). Second, Information Technology Infrastructure (ITI). Third, Top Management Support (TMS). Finally, Individual Experience with Computer (IEC). The research model was applied to collect data from the questionnaires answered by 45 users of HRIS as a source of primary data, based on a convenience sample the response rate was about 91%. In addition, the results were analyzed by utilizing the Statistical Package for Social Software (SPSS). Furthermore, the findings were analyzed;multiple Regression analysis indicated that all research variables have significant relationship on successful adoption of HRIS. The findings indicated IT infrastructures have a positive and significant effect on the successful adoption of HRIS. But there is no significant of PU, PEOU, TMS, and IEC on the successful adoption of HRIS. Finally, the results indicated that no significant statistical differences of demographic characteristics on HRIS adoption. Depending on the research’s findings;the researchers proposed a set of recommendations for better adoption of HRIS in SEZA. 展开更多
关键词 Human Resource INFORMATION System (HRIS) Aqaba Special Economic Zone AUTHORITY (ASEZA) PERCEIVED USEFULNESS (PU) INFORMATION Technology Infrastructure (ITI) Top Management Support (TMS) and Individual Experience with Computer (IEC)
下载PDF
Building a Business and Strategic Intelligence Policy as a Strategy for Promoting Congolese Business Progress and Healthy Economic Development in Eastern DRC
19
作者 Innocent Bora Uzima 《Intelligent Information Management》 2024年第2期77-103,共27页
The aim of this study was to verify the existence of business and strategic intelligence policies at the level of Congolese companies and at the state level, likely to foster progress and healthy development in the ea... The aim of this study was to verify the existence of business and strategic intelligence policies at the level of Congolese companies and at the state level, likely to foster progress and healthy development in the east of the DRC. The study was based on a mixed perspective consisting of objective analysis of quantitative data and interpretative analysis of qualitative data. The results showed that business and strategic intelligence policies have not been established at either company or state level, as this is an area of activity that is not known to the players in companies and public departments, and there are no units or offices in their organizational structures responsible for managing strategic information for competitiveness on the international market. In addition, there is a real need to establish strategic information management units within companies, upstream, and to set up a national strategic information management department or agency to help local companies compete in the marketplace, downstream. This reflects the importance and timeliness of building business and strategic intelligence policies to ensure economic progress and development in the eastern DRC. Business and strategic intelligence provides companies with an appropriate tool for researching, collecting, processing and disseminating information useful for decision-making among stakeholders, in order to cope with a crisis or competitive situation. The study suggests a number of key recommendations based on its findings. To the government, it is recommended to establish the national policy of business and strategic intelligence by setting up a national agency of strategic intelligence in favor of local companies;and to companies to establish business intelligence units in their organizational structures in favor of stakeholders to foster advantageous decision-making in the competitive market and achieve progress. Finally, the study suggests that studies be carried out to fully understand the opportunities and impact of business and strategic intelligence in African countries, particularly in the DRC. 展开更多
关键词 Business and Strategic Intelligence Strategic Information Congolese Companies Public Departments Decision-Making Information Management Business and Strategic Intelligence Policies PROGRESS Healthy Development Mining and Agriculture Sectors International Market Eastern DRC
下载PDF
治理对政府投资项目管理绩效作用机理的实证研究——以企业型代建项目为例 被引量:13
20
作者 杜亚灵 尹贻林 《软科学》 CSSCI 北大核心 2010年第12期1-6,18,共7页
首先通过文献综述归纳出政府投资项目管理绩效的两大类可控影响因素——治理和管理;然后,借鉴产业组织理论的SCP范式得出政府投资项目的GMP分析框架,并以此构建实证模型;最后,以60个企业型代建项目为样本,运用结构方程模型的方法进行模... 首先通过文献综述归纳出政府投资项目管理绩效的两大类可控影响因素——治理和管理;然后,借鉴产业组织理论的SCP范式得出政府投资项目的GMP分析框架,并以此构建实证模型;最后,以60个企业型代建项目为样本,运用结构方程模型的方法进行模型拟合。研究结果揭示了政府投资项目G→M→P具体路径,并显示代建单位的选聘和绩效考评、代建项目中各利益相关者的权责利配置对政府投资项目管理绩效的作用最为显著,可以作为政府投资项目治理的重要着力点。 展开更多
关键词 Investment Project Government Performance Management Research
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部