期刊文献+
共找到41篇文章
< 1 2 3 >
每页显示 20 50 100
.NET应用程序全动态系统管理的实现
1
作者 秦敬祥 《电脑开发与应用》 2009年第3期74-75,共2页
在.NET系统管理基础上,提出了一种可以完全动态设置系统管理功能的方法,在角色管理、用户管理、用户角色关系、功能管理、角色授权方面完全实现动态控制,方法具有广泛适用性,并在图书管理系统中得到应用。
关键词 系统管理 动态系统管理 角色授权
下载PDF
试论标准化在装备全系统寿命管理中的作用
2
作者 赵丹娅 《军用标准化》 2003年第4期17-18,共2页
阐述了标准化在装备全系统、全寿命管理中的作用,并通过图像对装备全系统的两个模式和全寿命各阶段的标准化工作作了分析与说明。
关键词 标准化 武器装备 全系统管理 寿命管理
下载PDF
浅谈河台金矿设备管理经验
3
作者 梁爱民 《黄金科学技术》 2004年第3期42-45,共4页
:广东高要河台金矿在15年的生产经营管理实践中,逐渐摸索并总结出一套适合矿山企业设备综合管理方面的实用经验,供广大同仁参考。
关键词 管理 全系统管理 效率管理
下载PDF
重新审视质量管理
4
作者 徐堂铭 《企业管理》 2022年第6期28-31,共4页
质量管理是企业的生命线。把质量管理作为企业管理的重中之重,已被大多数企业所认同。然而,很多企业的质量管理部门地位尴尬,其质量管理工作开展得并不顺畅。本专题的两篇文章,分别从咨询人员的外部视角和企业质量工作者的内部视角,重... 质量管理是企业的生命线。把质量管理作为企业管理的重中之重,已被大多数企业所认同。然而,很多企业的质量管理部门地位尴尬,其质量管理工作开展得并不顺畅。本专题的两篇文章,分别从咨询人员的外部视角和企业质量工作者的内部视角,重新审视质量管理及其定位。 展开更多
关键词 质量管理 定位 独立性 战略选择 全系统管理 流程管理
下载PDF
教育装备理论框架构建浅析 被引量:27
5
作者 殷常鸿 胡又农 艾伦 《中国教育技术装备》 2005年第11期1-5,共5页
本文在实践的基础上进行深入研究,提出了教育装备领域的研究对象、研究内容,并界定了相关概念,初步提出了教育装备理论体系框架的雏形,为教育装备的全面发展提供了理论参考.
关键词 全系统管理 寿命管理 系统工程 寿命费用
下载PDF
实施全程管理 全面提高军队国有资产管理水平
6
作者 王凌智 薛袁 《国有资产管理》 北大核心 2008年第8期18-20,共3页
为贯彻落实总后勤部《军队资产管理与预算管理相结合办法(试行)》(以下简称”办法”).不断提高军队国有资产的整体保障效益.必须转变思想观念、抓住关键环节、创新管理手段.实现军队国有资产全寿命、全过程、全系统管理。
关键词 军队国有资产 国有资产管理 管理 转变思想观念 全系统管理 保障效益 预算管理 总后勤部
原文传递
美军武器装备采办经验对我国大型企业物资采购的借鉴与启示
7
作者 苗濛 《河南工业大学学报(社会科学版)》 2013年第4期95-97,108,共4页
美军自20世纪90年代开始推进装备采办改革以来,通过全寿命全系统管理、优化采购与需求管理等措施,有效提高了采办效率和经费使用效益。就美军武器装备采办的主要经验进行了总结,就其经验对大型企业物资采购的借鉴与启示进行了探讨。
关键词 美军 装备采办 寿命全系统管理
下载PDF
发射台设备集中网管设计与应用
8
作者 郑又中 《广播与电视技术》 2019年第8期87-91,共5页
随着广电事业的飞速发展,发射台播出节目数量日益增多,台站配置设备数量、种类相应增加,各种各样操作软件、网管系统也大大增加了技术人员维护难度与值班人员值班难度。本文旨在介绍深圳电视塔统一设备运行监控管理平台设计思路,提出一... 随着广电事业的飞速发展,发射台播出节目数量日益增多,台站配置设备数量、种类相应增加,各种各样操作软件、网管系统也大大增加了技术人员维护难度与值班人员值班难度。本文旨在介绍深圳电视塔统一设备运行监控管理平台设计思路,提出一种提高工作效率、提升安全播出水平的集中网管方案。 展开更多
关键词 集中网管 全系统管理 模块化设计 移动设备
下载PDF
Dynamic management system of ore blending in an open pit mine based on GIS/GPS/GPRS 被引量:19
9
作者 GU Qinghua LU Caiwu +1 位作者 GUO Jinping JING Shigun 《Mining Science and Technology》 EI CAS 2010年第1期132-137,共6页
Using GIS, GPS and GPRS, a dynamic management system of ore blending in an open pit mine has been designed and developed. A linear program was established in a practical application. The system is very good at automat... Using GIS, GPS and GPRS, a dynamic management system of ore blending in an open pit mine has been designed and developed. A linear program was established in a practical application. The system is very good at automatically drawing up a daily production plan of ore blending and monitors and controls the process of mining production in real time. Experiments under real conditions show that the performance of this system is stable and can satisfy production standards of ore blending in open pit mines. 展开更多
关键词 GIS GPS GPRS linear programming ore blending open pit mine
下载PDF
Surface Mine System Simulation and Safety Risk Management 被引量:5
10
作者 ZHANG Rui-xin YU Dong-fang +2 位作者 LI Xin-wang YAO Xin-gang LIU Yu 《Journal of China University of Mining and Technology》 EI 2006年第4期413-415,共3页
Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference be... Modem surface mines, either mono-system or multi-systems, need a large fleet of equipment consisting of excavators, loaders, haulers and auxiliary machines. Presently, the complexity of the system, the interference between sub-systems and the lag in management skills has been a bottle neck for improving productivity of the system. Based on the fact that the traditional tools for safety analysis have been insufficient to evaluate systematically and dynamically the safety risks, this paper tries to create a virtual reality tool consisting of human, machine and mines, using Pro/E and the 3D MAX software in order to evaluate visually the operations of typical mining equipment, such as the bucket wheel excavator (BWE), the shovel, the truck and the dragline. Within this virtual world, the behavior of the system, such as interaction, interference and potential risk can be replayed and reviewed visually. The objective of the study is to identify the critical safety issues of the system and to provide a convenient and powerful tool for safety training and safety management. 展开更多
关键词 surface mine virtual reality mining system risk identification
下载PDF
Improved complex filter applied in enhancing EFT/B immunity at a coal mine monitoring substation 被引量:13
11
作者 SUN Ji-ping MA Feng-ying LIChen 《Journal of China University of Mining and Technology》 EI 2008年第1期22-26,共5页
A monitoring system is an important guarantee of safety in a production mine. However, not all monitoring substations pass the electrical fast transient/burst (EFT/B) immunity test and the explosion-proof test simul... A monitoring system is an important guarantee of safety in a production mine. However, not all monitoring substations pass the electrical fast transient/burst (EFT/B) immunity test and the explosion-proof test simultaneously. To enhance the immunity, the values of capacitance and inductance should be increased, which are actually limited by coal mine explosion-proof standards. Hence, for the first time, an active filter was applied in an electromagnetic interference (EMI) output filter. As a result, the interference within 30 MHz clearly weakened, but the frequency spectrum had a wide range. An EMI input filter and ferrite beads were adopted to restrain higher frequency interference. An output interference spectrogram of the substation was obtained with an analyzer. The results indicate that the improved complex filtering markedly help to control interference. With the support of improved complex filtering and other enhancing immunity means about I/O ports, the substation managed to pass both the EFT/B immunity test and the explosion-proof test synchronously. We conclude that improved complex filtering is of vital importance in enhancing the electromagnetic compatibilitv (EMC) of the coal mine monitoring system. 展开更多
关键词 EFT/B coal mine monitoring substation IMMUNITY complex filter EMC
下载PDF
Building a highly available and intrusion tolerant database security and protection system ( DSPS) 被引量:2
12
作者 蔡亮 杨小虎 董金祥 《Journal of Zhejiang University Science》 EI CSCD 2003年第3期287-293,共7页
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the serv... Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications. 展开更多
关键词 Information warfare Proactive security Intrusion tolerant DSPS(Database Security and Protection System)
下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
13
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
下载PDF
Research on Systematic Analysis and Countermeasures of the Buildings Construction Safety Problems 被引量:2
14
作者 Shen Liangfeng Li Jie Fan Yeming 《Engineering Sciences》 EI 2008年第1期59-65,共7页
The buildings construction safety problems contain various safety-hidden dangers that caused by the human unsafe behaviors, the substance unsafe conditions, operation environment unsafe factors and management defects.... The buildings construction safety problems contain various safety-hidden dangers that caused by the human unsafe behaviors, the substance unsafe conditions, operation environment unsafe factors and management defects. The authors summarize comprehensively the problems of buildings construetion safety in China at present based on grasping the whole safety status of buildings construction, and the synthetic countermeasures including the systems about laws, management, technology and education civilization for buildings construction safety management are brought up based on the viewpoint of safety system theory. Then it is thought that huilding scientific management mechanisms and popularizing effective management methods and measures are the fundamental ways for improving further the level of safety management for buildings construction in China at present. 展开更多
关键词 building construction safety management PROBLEM COUNTERMEASURES
下载PDF
A Privilege Separation Method for Security Commercial Transactions 被引量:1
15
作者 Chen Yasha Hu Jun +1 位作者 Sun Yu Gai Xinmao 《China Communications》 SCIE CSCD 2010年第6期94-99,共6页
Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation me... Privilege user is needed to manage the commercial transactions, but a super-administrator may have monopolize power and cause serious security problem. Relied on trusted computing technology, a privilege separation method is proposed to satisfy the security management requirement for information systems. It authorizes the system privilege to three different managers, and none of it can be interfered by others. Process algebra Communication Sequential Processes is used to model the three powers mechanism, and safety effect is analyzed and compared. 展开更多
关键词 privilege separation fraud management security commercial transactions formal method
下载PDF
Safety and coping strategy for high dam under complex natural conditions 被引量:1
16
作者 Niu Xinqiang 《Engineering Sciences》 EI 2012年第2期29-34,共6页
In respect to current situation and new challenges for high dam construction in China, safety problems are an- alyzed for high dam construction under complex natural conditions such as high elevation, cold area, high ... In respect to current situation and new challenges for high dam construction in China, safety problems are an- alyzed for high dam construction under complex natural conditions such as high elevation, cold area, high seismic inten- sity, large-seale landslide and high dam and huge reservoirs with dam types such as concrete surface rock-fill, asphalt concrete core, roller compacted concrete (RCC) arch dam and so on. From several aspects, including risk response measures for high dam, strengthening safety awareness for high dam design and construction, improving high dam con- struetion technique, intelligent dam safety management system based on IT, developing dam rehabilitation and mainte- nance technologies, useful dam safety and coping strategy is proposed. 展开更多
关键词 high dam huge reservoir safety mad coping strategy
下载PDF
Tourist Behaviors in Wetland Park:A Preliminary Study in Xixi National Wetland Park,Hangzhou,China 被引量:5
17
作者 PAN Lili CUI Lijuan WU Ming 《Chinese Geographical Science》 SCIE CSCD 2010年第1期66-73,共8页
Public education as well as tourism and leisure are the two important functions of national wetland park, and tourist behaviors act as the guiding factor in the national wetland park construction and management.As the... Public education as well as tourism and leisure are the two important functions of national wetland park, and tourist behaviors act as the guiding factor in the national wetland park construction and management.As the first national wetland park in China, Xixi National Wetland Park, located in Hangzhou City, Zhejiang Province, will give constructive instructions to the construction and management of other wetland parks and ecotourism resorts.This paper analyzed the tourist behaviors in Xixi National Wetland Park.By the observation, in-depth interview and questionnaire, the results show that tourists in wetland parks are different from those in the other common destinations, and they are also different from those strict eco-tourists.In fact, the tourists in wetland park have unique characteristics, such as the intense perception to the functions of wetland ecosystem and the environment impact behaviors.Those tourists are preferred to natural landscapes in their motivations and expectations.Wetland landscapes are the main image to those tourists in the Xixi National Wetland Park.Tourist expectation, experience and satisfaction are all critical factors for the success of the planning and management in national wetland parks.Based on the results, some measures for the sustainable development of wetland parks, including to optimize wetland theme landscape and tourism products, to improve tourist facilities and services, to enhance quality of visitor experiences, and to implement total quality management based on tourist characteristics, are given to national wetland park ecotourism. 展开更多
关键词 tourist behavior ECOTOURISM Xixi National Wetland Park China
下载PDF
Web-based supplier relationship framework using agent systems 被引量:1
18
作者 Oboulhas Conrad Tsahat Onesime 徐晓飞 战德臣 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第1期54-59,共6页
In order to enable both manufacturers and suppliers to be profitable on today’s highly competitive markets, manufacturers and suppliers must be quick in selecting best partners establishing strategic relationship, an... In order to enable both manufacturers and suppliers to be profitable on today’s highly competitive markets, manufacturers and suppliers must be quick in selecting best partners establishing strategic relationship, and collaborating with each other so that they can satisfy the changing competitive manufacturing requirements. A web-based supplier relationships (SR) framework is therfore proposed using multi-agent systems and linear programming technique to reduce supply cost, increase flexibility and shorten response time. Web-based SR approach is an ideal platform for information exchange that helps buyers and suppliers to maintain the availability of materials in the right quantity, at the right place, and at the right time, and keep the customer-supplier relationship more transparent. A multi-agent system prototype was implemented by simulation, which shows the feasibility of the proposed architecture. 展开更多
关键词 web-based supplier relationship management supplier selection linear programming (LP) multi-agent system (MAS)
下载PDF
A Concurrent Security Monitoring Method for Virtualization Environments
19
作者 TIAN Donghai JIA Xiaoqi +1 位作者 CHEN Junhua HU Changzhen 《China Communications》 SCIE CSCD 2016年第1期113-123,共11页
Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechani... Recently,virtualization technologies have been widely used in industry.In order to monitor the security of target systems in virtualization environments,conventional methods usually put the security monitoring mechanism into the normal functionality of the target systems.However,these methods are either prone to be tempered by attackers or introduce considerable performance overhead for target systems.To address these problems,in this paper,we present a concurrent security monitoring method which decouples traditional serial mechanisms,including security event collector and analyzer,into two concurrent components.On one hand,we utilize the SIM framework to deploy the event collector into the target virtual machine.On the other hand,we combine the virtualization technology and multi-core technology to put the event analyzer into a trusted execution environment.To address the synchronization problem between these two concurrent components,we make use of Lamport's ring buffer algorithm.Based on the Xen hypervisor,we have implemented a prototype system named COMO.The experimental results show that COMO can monitor the security of the target virtual machine concurrently within a little performance overhead. 展开更多
关键词 security virtualization technology concurrent monitoring
下载PDF
Problems on the application of geographic information systems to urban environmental management
20
作者 何强 LONG +1 位作者 Tengrui 《Journal of Chongqing University》 CAS 2002年第2期50-53,共4页
Geographic information systems (GIS) are a widely used tool in urban planning and management. More and more cities and decision-makers require its attributes of promptness, precision and visualization. But the applica... Geographic information systems (GIS) are a widely used tool in urban planning and management. More and more cities and decision-makers require its attributes of promptness, precision and visualization. But the application of GIS in urban environmental management is still a new field and relevant researches are getting on tardily. As a subsystem of GIS, an urban environmental management geographic information system (UEMGIS) should be a complex multi-discipline and multi-objective tool to perform quantitative multi-dimension analysis and to transfer the results into an expression legible to an ordinary user. It should be a dynamic system of prompt functions based on upgradable databases, and be composed of many subsystems respectively specialized in items about water, air, waste and noise as well as relative standards and regulations. However, existing UEMGISs mostly rely on the basic GIS too much to design the actual requirements of applications and managements in themselves, and the unavailability of sufficient fundamental data has retarded their improvement. In the design of a UEMGIS, the standardization of data classification should be taken into consideration to make the data exchangeable and shareable among its subsystems and within every subsystem, and the applicable error limits for input data should be defined in accordance with the user抯 required precision of data out. Data acquisition can be easy and quick if remote sensing, global positioning system (GPS) and other technologies are combined with GIS. Rapidly progressing information technologies have been giving a bright prospect for the melioration of UEMGIS that will have great potential and wide application in environmental conservation. 展开更多
关键词 geographic information system urban environmental management global positioning system
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部