期刊文献+
共找到649篇文章
< 1 2 33 >
每页显示 20 50 100
An Application of a Multi-Tier Data Warehouse in Oil and Gas Drilling Information Management 被引量:2
1
作者 张宁生 王志伟 《Petroleum Science》 SCIE CAS CSCD 2004年第4期1-5,共5页
Expenditure on wells constitute a significant part of the operational costs for a petroleum enterprise, where most of the cost results from drilling. This has prompted drilling departments to continuously look for wa... Expenditure on wells constitute a significant part of the operational costs for a petroleum enterprise, where most of the cost results from drilling. This has prompted drilling departments to continuously look for ways to reduce their drilling costs and be as efficient as possible. A system called the Drilling Comprehensive Information Management and Application System (DCIMAS) is developed and presented here, with an aim at collecting, storing and making full use of the valuable well data and information relating to all drilling activities and operations. The DCIMAS comprises three main parts, including a data collection and transmission system, a data warehouse (DW) management system, and an integrated platform of core applications. With the support of the application platform, the DW management system is introduced, whereby the operation data are captured at well sites and transmitted electronically to a data warehouse via transmission equipment and ETL (extract, transformation and load) tools. With the high quality of the data guaranteed, our central task is to make the best use of the operation data and information for drilling analysis and to provide further information to guide later production stages. Applications have been developed and integrated on a uniform platform to interface directly with different layers of the multi-tier DW. Now, engineers in every department spend less time on data handling and more time on applying technology in their real work with the system. 展开更多
关键词 drilling information management multi-tier data warehouse information processing application system
下载PDF
What to Cache:Differentiated Caching Resource Allocation and Management in Information-Centric Networking 被引量:6
2
作者 Ru Huo Renchao Xie +2 位作者 Hengyang Zhang Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2016年第12期261-276,共16页
Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching metho... Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence. 展开更多
关键词 caching resource allocation management differentiation control process information-centric networking
下载PDF
Efficient Bayesian networks for slope safety evaluation with large quantity monitoring information 被引量:8
3
作者 Xueyou Li Limin Zhang Shuai Zhang 《Geoscience Frontiers》 SCIE CAS CSCD 2018年第6期1679-1687,共9页
New sensing and wireless technologies generate massive data. This paper proposes an efficient Bayesian network to evaluate the slope safety using large-quantity field monitoring information with underlying physical me... New sensing and wireless technologies generate massive data. This paper proposes an efficient Bayesian network to evaluate the slope safety using large-quantity field monitoring information with underlying physical mechanisms. A Bayesian network for a slope involving correlated material properties and dozens of observational points is constructed. 展开更多
关键词 SLOPE reliability Monitoring information BAYESIAN networks RISK management VALUE of information BIG data
下载PDF
Government Management Innovation in the Age of Big Data
4
作者 Que Tianshu 《Management Studies》 2016年第6期279-286,共8页
Both opportunities and challenges are currently faced by government management innovation in the age of "big data". Traditionally, relative studies view the management of governments as the effective means to improv... Both opportunities and challenges are currently faced by government management innovation in the age of "big data". Traditionally, relative studies view the management of governments as the effective means to improve governmental services, without really understanding the structural influence of big data and network technology on governmental mode of thinking. Against such backdrop, this paper tries to conduct critical analysis based upon traditional outcomes in this regard, trying to make full use of the function of big data technology. With these efforts, this paper contributes to the building of an interaction theory that could promote transparency of information and customization and segmentation of the policies. By constructing a mode in which management could be carried out based on the law of big data, by building an information management system in which balance could be achieved between responsibility and freedom, by promoting the rebalancing among public power, online civil society and civil rights, the innovation of governmental management would be achieved. 展开更多
关键词 big data government management data dictatorship information network society public power
下载PDF
Best Practices and Innovative Scenarios of Integrated Patient Data Management to Improve Continuity of Care and Scientific Research
5
《Computer Technology and Application》 2012年第4期337-346,共10页
Clinical data have strong features of complexity and multi-disciplinarity. Clinical data are generated both from the documentation of physicians' interactions with the patient and by diagnostic systems. During the ca... Clinical data have strong features of complexity and multi-disciplinarity. Clinical data are generated both from the documentation of physicians' interactions with the patient and by diagnostic systems. During the care process, a number of different actors and roles (physicians, specialists, nurses, etc.) have the need to access patient data and document clinical activities in different moments and settings. Thus, data sharing and flexible aggregation based on different users' needs have become more and more important for supporting continuity of care at home, at hospitals, at outpatient clinics. In this paper, the authors identify and describe needs and challenges for patient data management at provider level and regional- (or inter-organizational-) level, because nowadays sharing patient data is needed to improve continuity and quality of care. For each level, the authors describe state-of-the-art Information and Communication Technology solutions to collect, manage, aggregate and share patient data. For each level some examples of best practices and solution scenarios being implemented in the Italian Healthcare setting are described as well. 展开更多
关键词 Clinical data management healthcare information systems hospital information systems (HIS) electronic medical record (EMR) clinical repository electronic health record (EHR) pathology networks.
下载PDF
Neighborhood-Based In-Network Caching for Information-Centric Networks
6
作者 Shou-Chih Lo Jhih-Sian Hu Varsha A. Kshirsagar 《International Journal of Communications, Network and System Sciences》 2017年第8期76-87,共12页
The current Internet is based on host-centric networking, and a user needs to know the host address before reaching a data target in the network. The new architecture of information-centric networking (ICN) facilitate... The current Internet is based on host-centric networking, and a user needs to know the host address before reaching a data target in the network. The new architecture of information-centric networking (ICN) facilitates users to locate data targets by giving their data names without any information about host addresses. In-network caching is one of the prominent features in ICN, which allows network routers to cache data contents. In this paper, we emphasize the management of in-network cache storage, and this includes the mechanisms of cache replacement and cache replication. A new cost function is then proposed to evaluate each cache content and the least valuable content is evicted when cache is full. To increase cache utilization, a cooperative caching policy among neighboring routers is proposed. The proper network locations to cache data contents are also discussed in the paper. Experimental results show the superiority of the proposed caching policy than some traditional caching polices. 展开更多
关键词 information-Centric networkING Named data networkING CACHE management COOPERATIVE CACHING
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
7
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
A Self-Organizing Memory Neural Network for Aerosol Concentration Prediction
8
作者 Qiang Liu Yanyun Zou Xiaodong Liu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第6期617-637,共21页
Haze-fog,which is an atmospheric aerosol caused by natural or man-made factors,seriously affects the physical and mental health of human beings.PM2.5(a particulate matter whose diameter is smaller than or equal to 2.5... Haze-fog,which is an atmospheric aerosol caused by natural or man-made factors,seriously affects the physical and mental health of human beings.PM2.5(a particulate matter whose diameter is smaller than or equal to 2.5 microns)is the chief culprit causing aerosol.To forecast the condition of PM2.5,this paper adopts the related the meteorological data and air pollutes data to predict the concentration of PM2.5.Since the meteorological data and air pollutes data are typical time series data,it is reasonable to adopt a machine learning method called Single Hidden-Layer Long Short-Term Memory Neural Network(SSHL-LSTMNN)containing memory capability to implement the prediction.However,the number of neurons in the hidden layer is difficult to decide unless manual testing is operated.In order to decide the best structure of the neural network and improve the accuracy of prediction,this paper employs a self-organizing algorithm,which uses Information Processing Capability(IPC)to adjust the number of the hidden neurons automatically during a learning phase.In a word,to predict PM2.5 concentration accurately,this paper proposes the SSHL-LSTMNN to predict PM2.5 concentration.In the experiment,not only the hourly precise prediction but also the daily longer-term prediction is taken into account.At last,the experimental results reflect that SSHL-LSTMNN performs the best. 展开更多
关键词 Haze-fog PM2.5 forecasting time series data machine learning long shortterm MEMORY NEURAL network SELF-ORGANIZING algorithm information processing CAPABILITY
下载PDF
Application of Informatics for the Enhanced Management of Robotic Operations
9
作者 Jungwan Hong Yongjin Kwon 《Journal of Computer and Communications》 2015年第11期71-77,共7页
In the past, the proposed concept-the application of informatics for robot operations-was difficult to implement due to technological limitations. With the advancement of ICT technologies, the production robots can be... In the past, the proposed concept-the application of informatics for robot operations-was difficult to implement due to technological limitations. With the advancement of ICT technologies, the production robots can be integrated within the information network, and the critical data can be processed to reveal the very important information. From the information, better managerial decisions are expected that will ultimately contribute to the organizations’ efficiency and competitiveness. In this context, this study explains the merits of quality informatics in the domain of networked robots that are the essential tools for the global production companies. Even though this study merely presents the outcome of robot joint replacement period estimation, the foreseeable advantages of using the proposed method can be numerous. The future environment of global business will even push the boundaries of multinational, distributed production systems, and accelerate the implementation at a faster rate. Accordingly, the brand value of the product is expected to be greater than the country of the manufacturing. The survival of the company will be dependent on the optimized quality level that is encompassing the entire distributed production systems located throughout the whole. Under such circumstances, it can be foreseeable that the innovative ideas and the smart application of advanced technologies should be the priority. 展开更多
关键词 Informatics for ROBOTICS Process information VISIBILITY data processing ROBOT management
下载PDF
Methods for the Efficient Energy Management in a Smart Mini Greenhouse
10
作者 Vasyl Teslyuk Ivan Tsmots +2 位作者 Michal Gregus ml. Taras Teslyuk Iryna Kazymyra 《Computers, Materials & Continua》 SCIE EI 2022年第2期3169-3187,共19页
To solve the problem of energy efficiency of modern enterprise it is necessary to reduce energy consumption.One of the possible ways is proposed in this research.A multi-level hierarchical system for energy efficiency... To solve the problem of energy efficiency of modern enterprise it is necessary to reduce energy consumption.One of the possible ways is proposed in this research.A multi-level hierarchical system for energy efficiency management of the enterprise is designed,it is based on the modular principle providing rapid modernization.The novelty of the work is the development of new and improvement of the existing methods and models,in particular:1)models for dynamic analysis of IT tools for data acquisition and processing(DAAP)in multilevel energy management systems,which are based on Petri nets;2)method of synthesis of DAAP tools in energy efficiency management information systems(EEMIS)of the enterprise which provides a reduction in hardware and time costs from 10%to 40%;3)method of conflict-free data exchange determining the minimum memory speed for the synthesis of realtime exchanges,it reduces the cost and energy consumption;4)method of calculating the signal of postsynaptic excitation of neural elements decreases the processing time of technological data two or more times.The proposed methods,models and tools have been tested while implementing the EEMIS of the intelligent mini-greenhouse,as a result,energy efficiency has increased by 12%-25%(depending on season and peculiarities of growing plants). 展开更多
关键词 Energy efficiency management information system(EEMIS) data acquisition and processing(DAAP) industry 4.0 Petri nets smart mini greenhouse
下载PDF
信息化测震数据管理平台的设计与实现 被引量:2
11
作者 邹立晔 梁姗姗 +9 位作者 刘艳琼 任枭 李杰飞 李旭茂 徐长文 刘敬光 张琪 徐志国 朱洪 舒国旭 《中国地震》 北大核心 2024年第1期160-172,共13页
依托公共安全信息化工程,测震台网数据管理平台在数据资源池环境下,采用分层架构和模块化开发,实现了实时流波形接入和存储、站网基础信息管理、常规数据产品产出、针对特定地震的产品产出、波形数据质量分析等测震台网核心业务的信息... 依托公共安全信息化工程,测震台网数据管理平台在数据资源池环境下,采用分层架构和模块化开发,实现了实时流波形接入和存储、站网基础信息管理、常规数据产品产出、针对特定地震的产品产出、波形数据质量分析等测震台网核心业务的信息化。通过平台的接口和界面,事件波形处理与服务、数据质量分析、震源参数基础数据库建设等测震台网业务取得了长足进步。该平台具有业务集成性、功能实用性、资源共享性和技术先进性等特点,有效提升了测震台网信息化水平,为测震台网现代化发展发挥了积极作用。 展开更多
关键词 信息化 测震台网 数据管理与服务 数据处理
下载PDF
基于知识与AW-ESN融合的烧结过程FeO含量预测 被引量:1
12
作者 方怡静 蒋朝辉 +2 位作者 黄良 桂卫华 潘冬 《自动化学报》 EI CAS CSCD 北大核心 2024年第2期282-294,共13页
氧化亚铁(FeO)含量是衡量烧结矿强度和还原性的重要指标,烧结过程FeO含量的实时准确预测对于提升烧结质量、优化烧结工艺具有重要意义.然而烧结过程热状态参数缺失、过程参数波动频繁给FeO含量的高精度预测带来巨大的挑战,为此,提出一... 氧化亚铁(FeO)含量是衡量烧结矿强度和还原性的重要指标,烧结过程FeO含量的实时准确预测对于提升烧结质量、优化烧结工艺具有重要意义.然而烧结过程热状态参数缺失、过程参数波动频繁给FeO含量的高精度预测带来巨大的挑战,为此,提出一种基于知识与变权重回声状态网络融合(Fusion of data-knowledge and adaptive weight echo state network, DK-AWESN)的烧结过程FeO含量预测方法.首先,针对烧结过程热状态参数缺失的问题,建立烧结料层最高温度分布模型,实现基于料层温度分布特征的FeO含量等级划分;其次,针对烧结过程参数波动频繁的问题,提出基于核函数高维映射的多尺度数据配准方法,有效抑制离群点的影响,提升建模数据的质量;最后,针对烧结过程数据驱动模型缺乏机理认知致使模型预测精度不高的问题,将过程数据中提取得到的FeO含量等级知识与AW-ESN (Adaptive weight echo state network)结合,建立DK-AWESN模型,有效提升复杂工况下FeO含量的预测精度.现场工业数据试验表明,所提方法能实时准确地预测烧结过程FeO含量,为烧结过程的智能化调控提供实时有效的FeO含量反馈信息. 展开更多
关键词 FeO含量预测 烧结过程 数据知识 变权重回声状态网络 信息融合
下载PDF
人工神经网络在实现猪精准饲养模式中的应用研究进展 被引量:1
13
作者 扣泽华 宋志锋 +3 位作者 范越蠡 刘博 车东升 韩蕊 《黑龙江畜牧兽医》 CAS 北大核心 2024年第4期29-35,42,共8页
目前,对集约化猪养殖中产生的大量生产数据的高效分析与合理运用是推动我国生猪产业精准化和智能化发展的关键步骤。人工神经网络(artificial neural network,ANN)的自学习、联想存储、高速寻找优化解等特征在进行大数据信息处理时具有... 目前,对集约化猪养殖中产生的大量生产数据的高效分析与合理运用是推动我国生猪产业精准化和智能化发展的关键步骤。人工神经网络(artificial neural network,ANN)的自学习、联想存储、高速寻找优化解等特征在进行大数据信息处理时具有显著优势,在猪生产领域具有极高的应用潜力。笔者以具有单隐藏层的三层误差反向传播前馈人工神经网络(back propagation-aritificial neural network BP-ANN)为代表,对ANN的结构特点及其在猪行为与健康监测、胴体性状与肉品质估测和猪生长速率调控与日粮原料营养价值预测等方面的应用成果进行综述,从生产管理和营养调控两方面展望ANN在未来猪精准饲养模式中的应用前景,为实现科学化、智能化和数字化管理模式下的猪精准养殖业提供理论参考。 展开更多
关键词 人工神经网络 猪精准饲养 信息处理 应用 生产管理 营养调控
下载PDF
量子模糊信息管理数学模型研究 被引量:1
14
作者 张仕斌 黄晨猗 +4 位作者 李晓瑜 郑方聪 李闯 刘兆林 杨咏熹 《电子科技大学学报》 EI CAS CSCD 北大核心 2024年第2期284-290,共7页
为了高效处理大数据所具有的复杂性和不确定问题,将“不确定性问题+直觉模糊集理论+量子计算”交叉融合,构建基于直觉模糊集理论的量子模糊信息管理数学模型。为了验证该模型的可行性、合理性和有效性,设计了不确定性环境下基于参数化... 为了高效处理大数据所具有的复杂性和不确定问题,将“不确定性问题+直觉模糊集理论+量子计算”交叉融合,构建基于直觉模糊集理论的量子模糊信息管理数学模型。为了验证该模型的可行性、合理性和有效性,设计了不确定性环境下基于参数化量子线路的量子模糊神经网络仿真实验。实验结果表明,基于该模型的量子模糊神经网络模型能更客观、准确、全面地反映不确定性问题中各对象所蕴含的知识信息,从而提高算法处理大数据的准确性。 展开更多
关键词 大数据 量子计算 直觉模糊集理论 量子模型信息管理 量子模糊神经网络
下载PDF
多平台融合管控一体化系统设计
15
作者 李琴 杜向党 +2 位作者 王烁阳 朱浩楠 白爱春 《自动化仪表》 CAS 2024年第12期62-66,共5页
为了实现中小企业生产层和管理层之间的信息共享、提高企业生产效率,提出适用于中小企业的管控一体化设计思想。以某中小型污水处理企业为例,调查企业背景、分析企业生产现状,并明确企业对生产管理、水质检测和现场控制的需求。借鉴制... 为了实现中小企业生产层和管理层之间的信息共享、提高企业生产效率,提出适用于中小企业的管控一体化设计思想。以某中小型污水处理企业为例,调查企业背景、分析企业生产现状,并明确企业对生产管理、水质检测和现场控制的需求。借鉴制造执行系统(MES)的思想提出系统框架。基于网络通信和数据管理技术,设计系统架构。结合多种软件平台定制化设计,开发了一套管控一体化系统。该系统对原本孤立的管理平台、检测平台和处理平台进行融合,实现污废生产调度任务和工艺参数、第三方的独立水质监测数据、全生产过程测控数据的联通和共享。该系统自投入运行以来,显著提高了企业管理效率和自动化水平。该系统的设计为中小企业结合生产实际,开发基于异构平台的数据集成融合系统以实现管控一体化探索了新的开发模式。 展开更多
关键词 中小企业 信息共享 管控一体化 制造执行系统 网络通信 数据管理 定制化设计
下载PDF
基于大数据分析的网络信息安全态势预测方法 被引量:2
16
作者 何永亚 《电脑与信息技术》 2024年第3期71-74,共4页
网络中存在着各种恶意攻击,会导致用户个人信息的泄露,威胁用户的网络安全。为此,提出基于大数据分析的网络信息安全态势预测方法。采集网络安全数据信息,通过关联分析对其进行归一化处理,以此计算每项安全措施的风险值。在网络安全事... 网络中存在着各种恶意攻击,会导致用户个人信息的泄露,威胁用户的网络安全。为此,提出基于大数据分析的网络信息安全态势预测方法。采集网络安全数据信息,通过关联分析对其进行归一化处理,以此计算每项安全措施的风险值。在网络安全事件风险值的基础上,结合大数据分析计算网络安全态势的预测值,从而实现基于大数据分析的网络信息安全态势预测。实验结果表明,所提方法的平均网络信息安全态势预测时间仅为22.117 s,说明所提方法能够提高网络信息安全态势预测效率。 展开更多
关键词 大数据分析 网络信息安全 态势预测 模糊分割 归一化处理
下载PDF
计算机信息管理技术在维护网络安全中的应用路径
17
作者 塔丽 杨思齐 《信息与电脑》 2024年第16期66-68,共3页
随着互联网技术的迅速发展,网络安全问题愈发严重,计算机信息管理技术是保护网络安全的重要手段。本文探讨了计算机信息管理技术在维护网络安全中的有效路径,着重分析了数据加密、防火墙构建、身份认证等技术在维护网络安全中的应用方法... 随着互联网技术的迅速发展,网络安全问题愈发严重,计算机信息管理技术是保护网络安全的重要手段。本文探讨了计算机信息管理技术在维护网络安全中的有效路径,着重分析了数据加密、防火墙构建、身份认证等技术在维护网络安全中的应用方法,为提高网络安全防护能力提供了理论支持和实践指导。 展开更多
关键词 计算机信息管理技术 网络安全 数据加密 防火墙 身份认证
下载PDF
计算机应用信息技术与网络安全管理 被引量:1
18
作者 徐颖 《移动信息》 2024年第5期164-166,共3页
文中对计算机应用信息技术与网络安全管理展开了研究,介绍了计算机应用信息技术的发展概况,包括数据加密解密技术、计算机网络结构和通信协议、虚拟化技术在信息技术中的应用等,以讨论网络安全管理的重要性和面临的挑战。另外,分析了访... 文中对计算机应用信息技术与网络安全管理展开了研究,介绍了计算机应用信息技术的发展概况,包括数据加密解密技术、计算机网络结构和通信协议、虚拟化技术在信息技术中的应用等,以讨论网络安全管理的重要性和面临的挑战。另外,分析了访问控制与身份验证技术、漏洞扫描与安全漏洞修复、日志监测与事件响应等涉及网络安全管理的内容和方法。 展开更多
关键词 计算机应用信息技术 网络安全管理 数据加密 访问控制
下载PDF
基于大数据分析的网络安全威胁检测与防范研究
19
作者 白进东 《科学与信息化》 2024年第16期22-24,共3页
本文探讨了基于大数据分析的网络安全威胁检测与防范方法,通过分析基于大数据分析的信息安全技术的原理和优缺点,阐述网络安全威胁检测与防范的关键技术,提出利用大数据分析技术提升网络安全威胁检测和防范能力的策略,从数据采集与处理... 本文探讨了基于大数据分析的网络安全威胁检测与防范方法,通过分析基于大数据分析的信息安全技术的原理和优缺点,阐述网络安全威胁检测与防范的关键技术,提出利用大数据分析技术提升网络安全威胁检测和防范能力的策略,从数据采集与处理、特征提取与选取、模型构建与培训、威胁探测与预防4个方面,对大数据环境下的网络安全威胁进行了研究,总结了基于大数据分析的网络安全威胁检测与防范的有效手段。本研究旨在为网络安全管理提供更加高效、智能的解决方案,应对不断演变的网络威胁。 展开更多
关键词 网络安全 大数据分析 威胁检测 数据处理 特征提取 模型训练 安全管理 技术应用
下载PDF
大数据时代计算机网络安全技术探讨
20
作者 顾永仁 《科技创新与应用》 2024年第20期193-196,共4页
进入大数据时代,信息数据已经成为重要的战略性资源,不仅关系着社会生产经济的提升,同时也影响着公民个人的隐私安全。网络开放的环境在带来便利的同时,也存在着巨大的隐患。为保证信息数据的安全性,必须要不断加强对计算机网络安全技... 进入大数据时代,信息数据已经成为重要的战略性资源,不仅关系着社会生产经济的提升,同时也影响着公民个人的隐私安全。网络开放的环境在带来便利的同时,也存在着巨大的隐患。为保证信息数据的安全性,必须要不断加强对计算机网络安全技术的研究,不断对技术手段进行更新,提高对外部非法攻击的抵抗力,减少甚至避免信息丢失、损坏等问题的发生,将信息数据的作用更好地发挥出来。该文从大数据时代的特征出发,对计算机网络安全技术的发展以及应用进行探讨。 展开更多
关键词 大数据时代 计算机网络 安全技术 信息数据 网络资源管理
下载PDF
上一页 1 2 33 下一页 到第
使用帮助 返回顶部