期刊文献+
共找到1,872篇文章
< 1 2 94 >
每页显示 20 50 100
Analysis of Internal Control Management Problems in Hospital Finance and Accounting
1
作者 Yan Wang 《Proceedings of Business and Economic Studies》 2024年第3期133-139,共7页
This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hos... This paper outlines the internal control management of hospital accounting and finance,introducing its concept,importance,and objectives.It then analyzes the problems existing in the internal control management of hospital accounting and finance,including an unsound management system,insufficient system implementation,inadequate risk assessment and control capabilities,poor information communication,weak internal supervision,and uneven personnel quality.The reasons for these problems are also analyzed,including outdated management concepts,irrational organizational structures,imperfect training and incentive mechanisms,low levels of information technology,and changes in the external environment.This paper proposes improvement measures for the internal control management of hospital accounting,including enhancing the management system,strengthening system implementation,improving risk assessment and control capabilities,enhancing the information communication mechanism,strengthening internal supervision,improving personnel quality,advancing information technology,and adapting to changes in the external environment. 展开更多
关键词 Hospital accounting Internal control management Medical system reform Financial security Operational efficiency
下载PDF
Research on "bridge" mode of mine security production management
2
作者 冯夕文 王以功 《Journal of Coal Science & Engineering(China)》 2007年第4期453-457,共5页
Realized new break-through on the basis of existing security management theory, tentatively and creatively carried out "realizing management theory of mine security production" and proposed "bridge" mode of realiz... Realized new break-through on the basis of existing security management theory, tentatively and creatively carried out "realizing management theory of mine security production" and proposed "bridge" mode of realizing green management theory. Green management theory has an integrated system structure. The green management system of mine security production includes three parts, the foundation of green system, the supervision system of green system operation and the safeguard system of green system. The key of "bridge" mode is to analyze the existing insecurity factors in the process of security production and establish corresponding regulations. 展开更多
关键词 "bridge mode mine security management theory green management
下载PDF
Closed-loop prevention and control research of coal mine safety management
3
作者 LI Xing-dong ZHAO Yun-xia +1 位作者 ZHAO Xing-qiang LU Ying 《Journal of Coal Science & Engineering(China)》 2009年第3期324-327,共4页
According to the current problems of safety management processes in coalmine enterprises,we introduced barrel theory to coal mine safety management,constructedthe closed-loop structure of a coal mine safety management... According to the current problems of safety management processes in coalmine enterprises,we introduced barrel theory to coal mine safety management,constructedthe closed-loop structure of a coal mine safety management system,andpointed out that efficient safety management lies in three factors:safety quality of all ofthe staff in coal mine enterprises,weak links in security management systems,and cooperationamong departments.After conducting detailed analysis of these three factors,we proposed concrete ways of preventing and controlling potential safety hazards duringthe process of coal mine production. 展开更多
关键词 closed-loop structure prevention and control security management wooden barrel theory
下载PDF
Prevention and Control Mode of Desertification in China's State Energy Group Shendong Mining Area with Annual Coal Output of 200 Million Tons
4
作者 Kang Shiyong 《Meteorological and Environmental Research》 CAS 2018年第2期23-29,33,共8页
According to the strategic goal of sustainable development,construction and management for the construction of Shendong mining area with ecological safety,the ecological restoration principle of " control protects de... According to the strategic goal of sustainable development,construction and management for the construction of Shendong mining area with ecological safety,the ecological restoration principle of " control protects development and development promotes control" for desertification prevention and control was adopted,and engineering measures,plant greening measures,and enclosure management and protection measures were taken to prevent and control desertification in the mining area based on careful detailed investigation and accurate planning and design in the early period. After 32 years,the desertification ecological landscape environment of the mining area has undergone a qualitative change,and the vegetation coverage has increased from 3%-8% to above 60% after the development. The former desertification land has become a modern green energy base that has produced 200 million tons of coal every year. The construction and management mode of an ecologically safe and modernized green coal mining area built by Shendong in the desertification region of northwestern China shows that taking appropriate comprehensive ecological restoration construction technology and management measures that integrate engineering,plants and enclosure management and protection is an effective technical and management paradigm for the construction of a modernized green large-scale coal mining area in China's arid and semi-arid regions. 展开更多
关键词 China Shendong coal mining area Ecological restoration project for desertification prevention and control Construction technologyand management mode
下载PDF
Digital Rights Management:Model,Technology and Application 被引量:7
5
作者 Zhaofeng Ma 《China Communications》 SCIE CSCD 2017年第6期156-167,共12页
with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced ... with rapid achievement of current information technology and computing ability and applications,much more digital content such as films,cartoons,design drawings,office documents and software source codes are produced in daily work,however to protect the content being copying,shared or deliberately stolen by inside or outside,digital rights management(DRM) became more and more important for digital content protection.In this paper,we studied various DRM model,technology and application,and first proposed DRM Security Infrastructure(DSI),in which we defined encryption,hash,signature algorithm,watermarking algorithms,authentication,usage control,trusted counter,conditional trace,secure payment,and based on the DSI we then proposed a whole classification approach and architecture of all kinds of DRMs,in which we proposed 6 typical classes of copyrights and content protection DRMs architecture:(1) Software-oriented DRM,(2) e Book-oriented DRM,(3) Video-oriented DRM,(4) Image-Oriented DRM(5) Unstructured data oriented DRM,(6) Text-oriented DRM.Based on the above DSI,we then proposed a dynamic DRM model selection method for various DRM application,which can be adapted dynamically for different technology of different applications,which can provide awhole solution for variant DRM development in a rapid and customized mode.The proposed DRM method,technology and application in this paper provided a common,flexible and extendable solution for variant DRM scenes,and can support rapid and customized development.Moreover,we proposed an opinion that the future life will enter into a new era that the content usage and consumption will not again adopt DRM technology rather than with law,liberty and morality. 展开更多
关键词 digital rights management drm security infrastructure ENCRYPTION WATERMARK usage control drm-free
下载PDF
Sliding mode control for synchronization of chaotic systems with structure or parameters mismatching 被引量:3
6
作者 厉小润 赵辽英 赵光宙 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期571-576,共6页
This paper deals with the synchronization of chaotic systems with structure or parameters difference. Nonlinear differential geometry theory was applied to transform the chaotic discrepancy system into canonical form.... This paper deals with the synchronization of chaotic systems with structure or parameters difference. Nonlinear differential geometry theory was applied to transform the chaotic discrepancy system into canonical form. A feedback control for synchronizing two chaotic systems is proposed based on sliding mode control design. To make this controller physically realizable, an extended state observer is used to estimate the error between the transmitter and receiver. Two illustrative examples were carried out: (1) The Chua oscillator was used to show that synchronization was achieved and the message signal was recovered in spite of parametric variations; (2) Two second-order driven oscillators were presented to show that the synchronization can be achieved and that the message can be recovered in spite of the strictly different model. 展开更多
关键词 Chaos synchronization Sliding mode control Extended state observer Secure communication
下载PDF
The History, Trend, Types, and Mitigation of Distributed Denial of Service Attacks
7
作者 Richard Kabanda Bertrand Byera +1 位作者 Henrietta Emeka Khaja Taiyab Mohiuddin 《Journal of Information Security》 2023年第4期464-471,共8页
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor... Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat. 展开更多
关键词 DDoS (Distributed Denial of Service Attacks) and DoS (Denial of Service Attacks) DAC (DDoS Attack Coefficient) Flood SIEM (security Information and Event management) CISA (Cybersecurity and Infrastructure security Agency) NIST (National Institute of Standards and Technology) XDR (Extended Detection and Response) ACK-SYN (Synchronize Acknowledge Packet) ICMP (Internet control Message Protocol) Cyberwarfare
下载PDF
A Study of Grain Scale Management Mode in Hubei Province
8
作者 Jiahui HOU Junying WEI 《Asian Agricultural Research》 2016年第9期8-10,共3页
In order to better ensure the food security in China,this paper explores the grain scale management mode in Hubei Province. It analyzes the grain production situation in Hubei Province as well as the existing scale ma... In order to better ensure the food security in China,this paper explores the grain scale management mode in Hubei Province. It analyzes the grain production situation in Hubei Province as well as the existing scale management mode,and according to the main mode of grain scale management in Hubei Province and the main problems,it puts forward related recommendations to improve the productivity of grain and promote the development of Hubei's grain scale management. 展开更多
关键词 Scale management Food security mode
下载PDF
Security,Controllability,Manageability and Survivability in Trustworthy Network
9
作者 Wang Sheng, Yu Hongfang, Xu Du (School of Communication and Information Engineering ,University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China) 《ZTE Communications》 2008年第1期33-38,共6页
The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming m... The Internet plays increasingly important roles in everyone's life; however, the existence of a mismatch between the basic architectural idea beneath the Internet and the emerging requirements for it is becoming more and more obvious. Although the Internet community came up with a consensus that the future network should be trustworthy, the concept of 'trustworthy networks' and the ways leading us to a trustworthy network are not yet clear. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy network. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed. The network trustworthiness could and should be eventually achieved. 展开更多
关键词 security controllability Manageability and Survivability in Trustworthy Network NET
下载PDF
Study and Application Techniques on Web System Security Based on B/S Mode
10
作者 Xinbo Qi Qingliang Li Xueguang Chen 《通讯和计算机(中英文版)》 2006年第5期82-85,102,共5页
关键词 网络安全 软件开发 WEB系统 B/S模式
下载PDF
Robust Finite-time Synchronization of Non-identical Fractional-order Hyperchaotic Systems and Its Application in Secure Communication 被引量:5
11
作者 Hadi Delavari Milad Mohadeszadeh 《IEEE/CAA Journal of Automatica Sinica》 EI CSCD 2019年第1期228-235,共8页
This paper proposes a novel adaptive sliding mode control(SMC) method for synchronization of non-identical fractional-order(FO) chaotic and hyper-chaotic systems. Under the existence of system uncertainties and extern... This paper proposes a novel adaptive sliding mode control(SMC) method for synchronization of non-identical fractional-order(FO) chaotic and hyper-chaotic systems. Under the existence of system uncertainties and external disturbances,finite-time synchronization between two FO chaotic and hyperchaotic systems is achieved by introducing a novel adaptive sliding mode controller(ASMC). Here in this paper, a fractional sliding surface is proposed. A stability criterion for FO nonlinear dynamic systems is introduced. Sufficient conditions to guarantee stable synchronization are given in the sense of the Lyapunov stability theorem. To tackle the uncertainties and external disturbances, appropriate adaptation laws are introduced. Particle swarm optimization(PSO) is used for estimating the controller parameters. Finally, finite-time synchronization of the FO chaotic and hyper-chaotic systems is applied to secure communication. 展开更多
关键词 Adaptive SLIDING mode control (ASMC) CHAOS synchronization FRACTIONAL order (FO) hyper-chaotic system LYAPUNOV THEOREM SECURE communication
下载PDF
Finite-time sliding mode synchronization of chaotic systems
12
作者 倪骏康 刘崇新 +1 位作者 刘凯 刘凌 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第10期80-86,共7页
A new finite-time sliding mode control approach is presented for synchronizing two different topological structure chaotic systems. With the help of the Lyapunov method, the convergence property of the proposed contro... A new finite-time sliding mode control approach is presented for synchronizing two different topological structure chaotic systems. With the help of the Lyapunov method, the convergence property of the proposed control strategy is discussed in a rigorous manner. Furthermore, it is mathematically proved that our control strategy has a faster convergence speed than the conventional finite-time sliding mode control scheme. In addition, the proposed control strategy can ensure the finite-time synchronization between the master and the slave chaotic systems under internal uncertainties and external disturbances. Simulation results are provided to show the speediness and robustness of the proposed scheme. It is worth noticing that the proposed control scheme is applicable for secure communications. 展开更多
关键词 finite-time control sliding mode control chaos synchronization secure communication
下载PDF
A multi-layered policy generation and management engine for semantic policy mapping in clouds
13
作者 Faraz Fatemi Moghaddam Philipp Wieder Ramin Yahyapour 《Digital Communications and Networks》 SCIE 2020年第1期38-50,共13页
The long awaited cloud computing concept is a reality now due to the transformation of computer generations.However,security challenges have become the biggest obstacles for the advancement of this emerging technology... The long awaited cloud computing concept is a reality now due to the transformation of computer generations.However,security challenges have become the biggest obstacles for the advancement of this emerging technology.A well-established policy framework is defined in this paper to generate security policies which are compliant to requirements and capabilities.Moreover,a federated policy management schema is introduced based on the policy definition framework and a multi-level policy application to create and manage virtual clusters with identical or common security levels.The proposed model consists in the design of a well-established ontology according to security mechanisms,a procedure which classifies nodes with common policies into virtual clusters,a policy engine to enhance the process of mapping requests to a specific node as well as an associated cluster and matchmaker engine to eliminate inessential mapping processes.The suggested model has been evaluated according to performance and security parameters to prove the efficiency and reliability of this multilayered engine in cloud computing environments during policy definition,application and mapping procedures. 展开更多
关键词 Cloud computing security security management Policy management Access control Policy mapping
下载PDF
Data Integrity and Risk
14
作者 Sasidhar Duggineni 《Open Journal of Optimization》 2023年第2期25-33,共9页
Data Integrity is a critical component of Data lifecycle management. Its importance increases even more in a complex and dynamic landscape. Actions like unauthorized access, unauthorized modifications, data manipulati... Data Integrity is a critical component of Data lifecycle management. Its importance increases even more in a complex and dynamic landscape. Actions like unauthorized access, unauthorized modifications, data manipulations, audit tampering, data backdating, data falsification, phishing and spoofing are no longer restricted to rogue individuals but in fact also prevalent in systematic organizations and states as well. Therefore, data security requires strong data integrity measures and associated technical controls in place. Without proper customized framework in place, organizations are prone to high risk of financial, reputational, revenue losses, bankruptcies, and legal penalties which we shall discuss further throughout this paper. We will also explore some of the improvised and innovative techniques in product development to better tackle the challenges and requirements of data security and integrity. 展开更多
关键词 Data Governance Data Integrity Data management Data security Technical controls REGULATIONS
下载PDF
医用耗材SPD管理模式在某三级公立医院的应用实践与成效 被引量:4
15
作者 马宪礼 徐道亮 +6 位作者 郑瑞强 仲辉 张勤 高小坤 成定胜 李真 蔡滨 《中国医疗设备》 2024年第1期114-118,124,共6页
目的 通过构建SPD供应链管理模式下医用耗材精细化管理模式,并在某三级公立医院予以实践应用,探讨其应用实践与具体成效。方法 基于SPD模式的构建,从单台手术耗材消耗量、中心库盘点时间、临床科室耗材领用与盘点时间、高值耗材计费异... 目的 通过构建SPD供应链管理模式下医用耗材精细化管理模式,并在某三级公立医院予以实践应用,探讨其应用实践与具体成效。方法 基于SPD模式的构建,从单台手术耗材消耗量、中心库盘点时间、临床科室耗材领用与盘点时间、高值耗材计费异常情况等方面分析模式应用前后的效果。结果 某三级公立医院应用SPD模式后,单台手术耗材消耗均值从(13520.83±1182.14)元下降至(12328.91±1366.50)元,单台手术成本降低,且结果具有统计学意义(t=5.661,P=0.030);中心库盘点时间大大减少,临床科室耗材库存周转天数从平均10天/次下降至2天/次,耗材领用与盘点用时减少,工作效率得到提升(P<0.05);应用SPD模式后,高值耗材计费异常情况得到显著改善(P<0.001)。结论 SPD模式是一种契合科技、医改政策以及医院高质量发展的高效管理模式,可有效提升公立医院医用耗材精细化管理水平。 展开更多
关键词 SPD 医用耗材 管理模式 成本管控
下载PDF
基于措施优先级的失效模式和效应分析在结直肠术手术部位感染防控中的应用
16
作者 吴红曼 赖静敏 +7 位作者 陈乐陶 付陈超 汤紫媛 周凤 曾翠 曾烂漫 任南 黄勋 《中国感染控制杂志》 CAS CSCD 北大核心 2024年第7期881-888,共8页
目的评估结直肠手术后手术部位感染(SSI)防控措施执行的过程风险,探讨基于措施优先级的失效模式和效应分析(FMEA)的应用效果。方法应用基于措施优先级的FMEA评估结直肠手术后SSI防控措施执行的整个流程,对是否采取优化措施进行优先级排... 目的评估结直肠手术后手术部位感染(SSI)防控措施执行的过程风险,探讨基于措施优先级的失效模式和效应分析(FMEA)的应用效果。方法应用基于措施优先级的FMEA评估结直肠手术后SSI防控措施执行的整个流程,对是否采取优化措施进行优先级排序,比较FMEA实施前后结直肠手术SSI防控措施依从项达标率、SSI发病率。结果评估后SSI高优先级防控措施7项,中优先级22项,对中优先级措施加强控制,重点对高优先级措施制定进一步的预防和可探测措施。改进后再评价结果显示,7项高优先级措施降至中优先级;16项中优先级措施降至低优先级。SSI防控措施执行达标率由77.15%(2566/3326)提高至92.47%(3096/3348),SSI发病率由6.04%(58/960)降至2.54%(60/2364)。结论运用基于措施优先级的FMEA可对结直肠手术SSI防控过程进行有效风险评估,并结合现状针对性采用预防性风险控制措施,可降低结直肠手术SSI发病率。 展开更多
关键词 手术部位感染 感染预防与控制 措施优先级 失效模式和效应分析 风险管理
下载PDF
基于HRP系统的医用耗材精细化管理模式实践探索
17
作者 张娜 蔚娟 张新庆 《中国医疗设备》 2024年第5期107-114,147,共9页
目的在医用耗材零加成、疾病诊断相关分组付费改革的实施背景下,探索医用耗材精细化管理模式,为公立医院高质量发展提供保障。方法以北京市某公立三级综合医院为研究对象,基于医院资源规划(Hospital Resource Planning,HRP)系统物资管... 目的在医用耗材零加成、疾病诊断相关分组付费改革的实施背景下,探索医用耗材精细化管理模式,为公立医院高质量发展提供保障。方法以北京市某公立三级综合医院为研究对象,基于医院资源规划(Hospital Resource Planning,HRP)系统物资管理模块信息联通形成的数据,以规范临床用耗行为为导向,探索在医院运营管理委员会、医用耗材管理委员会领导下,以物资管理部门为主导,与医务、护理、医保、绩效等管理部门协同联动,以“精细管理、控制成本、优化结构”的理念为主线,对医用耗材目录、医用耗材申领、医用耗材消耗以及医用耗材监测进行精细化管理的模式。比较2023年2-7月与2021年同期的耗材成本、收入结构,来检验基于HRP系统的精细化管理模式的实践成效。结果经实践,该院医用耗材管理相关人员的精细化管理意识提升;2023年2-7月百元医疗收入消耗卫生材料(不含药品收入)相较2021年同期明显降低,差异有统计学意义(P<0.001),耗材成本控制初见成效;2023年2-7月医院耗占比相较2021年同期明显降低,医疗服务收入占比相较2021年同期明显升高,差异均有统计学意义(均P<0.001),收入结构有所改善。结论基于HRP系统的医用耗材精细化管理模式,可有效控制成本,促进收入结构优化,降低管理风险,可为公立医院耗材控制提供参考。 展开更多
关键词 公立医院 医用耗材 精细化管理模式 HRP 控制成本 优化结构
下载PDF
基于分区操作系统的文件系统设计
18
作者 杨琼 王冬 +1 位作者 张鹏 王济乾 《航空计算技术》 2024年第4期80-83,共4页
研究涉及一种基于分区操作系统的文件系统设计方法,解决分区操作系统下文件的安全访问问题。分区操作系统资源、空间彼此隔离,文件系统用于管理分区数据,不能违背数据资源的隔离需求。为此,通过将文件系统部署在分区操作系统的分区;分... 研究涉及一种基于分区操作系统的文件系统设计方法,解决分区操作系统下文件的安全访问问题。分区操作系统资源、空间彼此隔离,文件系统用于管理分区数据,不能违背数据资源的隔离需求。为此,通过将文件系统部署在分区操作系统的分区;分区内和分区外采用两层分区安全访问控制;采用快照管理实现文件系统自身对并行文件访问需求,实现文件系统设计。通过测试表明,该方法能够在满足分区操作系统设计约束下,实现文件的安全访问。 展开更多
关键词 分区操作系统 文件系统 安全访问控制 并行文件访问 快照管理
下载PDF
质量控制小组管理模式在护理质量管理中的应用价值
19
作者 吴立燕 祝览铭 +1 位作者 彭靖 秦璐翠 《浙江临床医学》 2024年第8期1245-1247,共3页
目的探讨质量控制小组管理模式在呼吸与危重症医学科临床护理质量管理工作中的应用价值。方法选取2021年1月至2022年6月实施质控小组管理模式工作后的呼吸危重症患者50例为观察组,2020年1月至2020年12月质控小组实施前的呼吸危重症患者5... 目的探讨质量控制小组管理模式在呼吸与危重症医学科临床护理质量管理工作中的应用价值。方法选取2021年1月至2022年6月实施质控小组管理模式工作后的呼吸危重症患者50例为观察组,2020年1月至2020年12月质控小组实施前的呼吸危重症患者50例为对照组,观察两组患者对护理工作满意度以及实施期间总护理不良事件发生情况,评估实施质控管理小组前后护理人员护理质量。结果观察组总护理不良事件发生率低于对照组,差异有统计意义(P<0.05);观察组患者护理总满意度高于对照组,差异有统计意义(P<0.05);实施质量控制小组管理模式前护理人员的基础护理质量评价、护理病历书写质量评价、健康教育宣教质量评价、应急专科能力质量评价、护理操作质量评价、消毒隔离质量评价均低于实施后,差异有统计意义(P<0.05)。结论质量控制小组管理的工作模式不仅能有效提高呼吸危重症患者对护理人员工作的满意度,减少临床工作中护理不良事件发生,还能提高护理人员护理工作质量。 展开更多
关键词 质量控制小组管理模式 呼吸与危重症医学科 护理管理 护理质量
下载PDF
医院日间手术中心及其建设标准的发展
20
作者 沈晋明 刘燕敏 《中国医院建筑与装备》 2024年第1期17-21,共5页
回顾了国内外日间手术中心及其建设标准的发展历程。结合我国日间手术中心的特点,参照国外的相关标准以及我国多年来日间手术室建设的经验教训,阐述了我国颁布的《日间手术中心设施建设标准》中的新成果、新措施,详细介绍了日间手术中... 回顾了国内外日间手术中心及其建设标准的发展历程。结合我国日间手术中心的特点,参照国外的相关标准以及我国多年来日间手术室建设的经验教训,阐述了我国颁布的《日间手术中心设施建设标准》中的新成果、新措施,详细介绍了日间手术中心的管理模式、医疗流程与布局以及医疗环境控制。 展开更多
关键词 日间手术室 发展历程 建设标准 管理模式 平面布局 医疗环境控制
下载PDF
上一页 1 2 94 下一页 到第
使用帮助 返回顶部