期刊文献+
共找到11,248篇文章
< 1 2 250 >
每页显示 20 50 100
Endogenous Security-Aware Resource Management for Digital Twin and 6G Edge Intelligence Integrated Smart Park 被引量:3
1
作者 Sunxuan Zhang Zijia Yao +3 位作者 Haijun Liao Zhenyu Zhou Yilong Chen Zhaoyang You 《China Communications》 SCIE CSCD 2023年第2期46-60,共15页
The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cann... The integration of digital twin(DT)and 6G edge intelligence provides accurate forecasting for distributed resources control in smart park.However,the adverse impact of model poisoning attacks on DT model training cannot be ignored.To address this issue,we firstly construct the models of DT model training and model poisoning attacks.An optimization problem is formulated to minimize the weighted sum of the DT loss function and DT model training delay.Then,the problem is transformed and solved by the proposed Multi-timescAle endogenouS securiTy-aware DQN-based rEsouRce management algorithm(MASTER)based on DT-assisted state information evaluation and attack detection.MASTER adopts multi-timescale deep Q-learning(DQN)networks to jointly schedule local training epochs and devices.It actively adjusts resource management strategies based on estimated attack probability to achieve endogenous security awareness.Simulation results demonstrate that MASTER has excellent performances in DT model training accuracy and delay. 展开更多
关键词 smart park digital twin(DT) 6G edge intelligence resource management endogenous security awareness
下载PDF
Analysis of standardization of community security fund management-Taking practice of community security fund management in Wuhou district of Chengdu as an example
2
作者 Li Xiaowen Wen Jiahua +1 位作者 Wen Mengchuan Ren Yan 《China Standardization》 2024年第5期56-58,共3页
The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,su... The Chengdu community security funds refer to the special security funds for urban and rural community development and governance in Chengdu.At present,there are some problems in the use of community security funds,such as low participation of residents,and low efficiency of fund use.Taking the exploration of standardization of community security fund management in Wuhou district,Chengdu city,as an example,this paper suggests further strengthening the use and management of community security funds by means of standardization,ensuring the democratic,open,and transparent use of funds,and effectively enhancing the supporting role of community security funds in community governance. 展开更多
关键词 community security funds management STANDARDIZATION
下载PDF
Applications and Challenges of Smart Technologies in Supply Chain Management
3
作者 Xiaoyang Mao 《Management Studies》 2024年第5期323-326,共4页
The advent of intelligent technologies in supply chain management(SCM)through the use of artificial intelligence(AI),the Internet of Things(IoT),blockchain,big data analytics,and others is a game changer.These improve... The advent of intelligent technologies in supply chain management(SCM)through the use of artificial intelligence(AI),the Internet of Things(IoT),blockchain,big data analytics,and others is a game changer.These improvements increase clarity,effectiveness,and flexibility,allowing companies to quickly deal with market changes and interruptions.Nevertheless,adopting such technologies comes with difficulties,such as information security,compatibility,exorbitant prices,and employee opposition.The applications of intelligent technologies for SCM are examined in this article,as well as the importance of their implementation and solutions that provide a competitive advantage for businesses. 展开更多
关键词 supply chain management innovative technologies artificial intelligence blockchain Internet of Things big data analytics data security INTEROPERABILITY
下载PDF
Electronic Commerce Security and Risk Management: An Important Part of College Curriculum
4
作者 Yongchang Cai 《Journal of Educational Theory and Management》 2024年第1期18-22,共5页
With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk manag... With the rapid expansion of e-commerce,its security and risk management problems become increasingly prominent.In the current business environment,the ability to understand and apply e-commerce security and risk management has become an important criterion to measure a good person.Therefore,the importance of e-commerce security and risk management courses in college education is self-evident.This course can not only help students master the basic knowledge of e-commerce,but also enable them to understand how to deal with various risks in practical work and ensure the safe operation of e-commerce.At the same time,through the study of e-commerce security and risk management,students can better understand the operation mode and law of e-commerce,and lay a solid foundation for their future career.In general,e-commerce security and risk management occupy an important position in the curriculum of colleges and universities,and play a crucial role in cultivating e-commerce professionals with practical operation ability and innovative thinking. 展开更多
关键词 Electronic commerce SECURE Risk management College curriculum
下载PDF
Integrating AnyLogic Simulation in Emergency Evacuation Management for Enhanced Security
5
作者 Lina Liu Songyan Liu Xu Gong 《Journal of Electronic Research and Application》 2024年第3期213-220,共8页
This study introduces an innovative approach by integrating AnyLogic simulation into emergency evacuation strategies to enhance security protocols.The research focuses on leveraging advanced computational models to si... This study introduces an innovative approach by integrating AnyLogic simulation into emergency evacuation strategies to enhance security protocols.The research focuses on leveraging advanced computational models to simulate and optimize evacuation scenarios in various settings,including public venues,residential areas,and urban environments.By integrating real-world data and behavioral models,the simulation accurately represents human movements,decision-making processes,and traffic flow dynamics during evacuation scenarios.The study evaluates the effectiveness of various evacuation strategies,including route planning,crowd behavior,and emergency response coordination,using a scenario-driven approach within the AnyLogic simulation environment.Furthermore,this research contributes to the establishment of optimized emergency response protocols by systematically evaluating and refining evacuation plans.The research frameworks mentioned in the research imply the efficient use of the AnyLogic simulation model to be used in different sectors and fields to enhance the strategies for saving lives and implementing an efficient evacuation management system. 展开更多
关键词 AnyLogic simulation model Evacuation management security system simulation model
下载PDF
Technical Analysis of Security Management in Terms of Crowd Energy and Smart Living
6
作者 MD Shahrukh Adnan Khan Muhammad Ahad Rahman Miah +4 位作者 Shaikh Rashedur Rahman Mirza Mursalin Iqbal Aseef Iqbal Aravind CV Chua Kein Huat 《Journal of Electronic Science and Technology》 CAS CSCD 2018年第4期367-378,共12页
In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept an... In this paper, a technical and statistical analysis of security system and security management is provided for crowd energy and smart living. At the same time, a clear understanding is made for crowd energy concept and next generation smart living. Various case examples have been studied and a brief summary has been provided.Furthermore, a statistical analysis has been provided in terms of security management in smart living where it is found that young technocrats give the highest importance to security management in smart living. Last but not the least, current limitation, constraints, and future scope of security implementation have been discussed in terms of crowd energy clustered with next generation smart living. 展开更多
关键词 Crowd energy security management smart living statistical analysis
下载PDF
The Role of Information Security Development (ISD) in Effective Information Security Management (ISM) Implementation in the Banks: A Nigerian Case
7
作者 Dorcas Adebola Babatunde Mohamad Hisyam Selamat Ramat Titilayo Salman 《Journal of Modern Accounting and Auditing》 2014年第5期614-619,共6页
This research discusses the role of information security development (ISD) using organizational factors such as information security plans, information security awareness, perceived quality training programs, inform... This research discusses the role of information security development (ISD) using organizational factors such as information security plans, information security awareness, perceived quality training programs, information security policies and procedures, and organizational culture in effective information security management (ISM) implementation in the banks (a Nigerian case). This paper explores the existing literature and a proposed framework that consists of ISD such as information security plans, information security awareness, perceived quality training programs, information security policies and procedures, and organizational culture in ISM implementation. ISD factors are found to be statistically significant, because it motivates an organization to implement effective ISM in the banks. Hence, it could be said that the role of ISD practices in an effective implementation of ISM among banks in Nigeria will be of great value. 展开更多
关键词 information security management (Ism information security plans perceived quality training programs organizational culture Nigeria
下载PDF
Research on the Management Mechanism of Teachers in Public Security Colleges and Universities Based on Psychological Contract
8
作者 SONG Liqu 《International English Education Research》 2017年第4期24-25,共2页
In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, bu... In today's management of the teaching staff of public security colleges and universities, the research on the Psychological Contract problem is not only beneficial to the management and estimation of the teachers, but also has an important role in the coordination and stability of the whole system of public security colleges and universities. Based on the theory of Psychological Contract, this paper expounds the basic understanding and research value of Psychological Contract, and puts forward the measures to cultivate teachers' good character and understanding, and as well as coordinate teachers' needs, effectively change teachers' attitude and actively promote the establishment of good interpersonal relationship to explain the research on the Management Mechanism of Teachers in Public Security Colleges and Universities from the Perspective of Psychological Contract. 展开更多
关键词 Psychological Contract public security colleges and universities teacher management mechanism
下载PDF
Research about Online Security Warning and Risk Assessment of Power Grid Based on Energy Management System
9
作者 Hanyun Wang Kangyuan Wang +2 位作者 Yunxiao Zhang Guoqiang Mei Mingming Wu 《Journal of Energy and Power Engineering》 2012年第3期485-487,共3页
In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and ... In this paper, online security warning and risk assessment of power grid are proposed, based on data from EMS (Energy Management System), combined with information of real-time operation state, component status and external operating environment. It combines the two factors, contingency likelihood and severity, that determine system reliability, into risk indices on different loads and operation modes, which provide precise evaluation of the power grid's security performance. According to these indices, it can know the vulnerable area of the system and whether the normal operating mode or repair mode is over-limited or not, and provide decision-making support for dispatchers. Common cause outages and equipment-aging are considered in terms of the establishment of outage model. Multiple risk indices are defined in order to reflect the risk level of the power grid more comprehensively. 展开更多
关键词 EMS (energy management system) online security warning risk assessment.
下载PDF
Design and Implementation of an Open Network Security Management Platform 被引量:2
10
作者 曹元大 王勇 《Journal of Beijing Institute of Technology》 EI CAS 2002年第3期316-320,共5页
In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasib... In order to manage all kinds of network security devices and software systems efficiently, and make them collaborate with each other, the model for an open network security management platform is presented. The feasibility and key implementing technology of the model are expatiated. A prototype system is implemented to validate it. 展开更多
关键词 network security management open platform XML RPC SNMP
下载PDF
On Development of Platform for Organization Security Threat Analytics and Management (POSTAM) Using Rule-Based Approach 被引量:2
11
作者 Joseph E. Mbowe Simon S. Msanjila +1 位作者 George S. Oreku Khamisi Kalegele 《Journal of Software Engineering and Applications》 2016年第12期601-623,共23页
The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define ... The integration of organisation’s information security policy into threat modeling enhances effectiveness of security strategies for information security management. These security policies are the ones which define the sets of security issues, controls and organisation’s commitment for seamless integration with knowledge based platforms in order to protect critical assets and data. Such platforms are needed to evaluate and share violations which can create security loop-hole. The lack of rules-based approaches for discovering potential threats at organisation’s context, poses a challenge for many organisations in safeguarding their critical assets. To address the challenge, this paper introduces a Platform for Organisation Security Threat Analytic and Management (POSTAM) using rule-based approach. The platform enhances strategies for combating information security threats and thus improves organisations’ commitment in protecting their critical assets. R scripting language for data visualization and java-based scripts were used to develop a prototype to run on web protocol. MySQL database management system was used as back-end for data storage during threat analytic processes. 展开更多
关键词 security Threats Analytic Threat Visualization security management Automated security Policies
下载PDF
Application of the PKPM-BIM construction management platform in project security management 被引量:1
12
作者 Liu Chen Wang Jing 《Computer Aided Drafting,Design and Manufacturing》 2017年第1期58-62,共5页
This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contr... This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contractors to implement the BIM-aided construction management. Application of BIM technology would bring many beneficial changes to the security management in construction. 展开更多
关键词 PKPM-BIM construction management platform security management BIM technology CONSTRUCTION CONTRACTOR
下载PDF
SMS Notifying Design in Intra-Day Scheduling Security Check System
13
作者 Cui-Hui Yan Licheng Sha +1 位作者 Sai Dai Hai-Dong Zhao 《Energy and Power Engineering》 2017年第4期535-543,共9页
In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into o... In order to master the future operation and stability of power grid exactly, and gasp the weak point accurately, the requirement of power data quality become strict, and the data timeliness of power gird change into outstandingly more and more, because of this, in this paper propose the SMS notifying method of intra-day scheduling data based on safely data principle. The principle is mainly complied with the data source existed or not, the data is coincident to the power grid model, the data is unbroken or not and it is reasonable with the physical reality, then it can obtain better convergence and reasonable intra-day check power data. In order to accelerate the information and network pace of the power grid, the SMS notifying can monitoring data quality without time delay. It dredge the vast path for the future power market into use with the wide range, then, can more effective to ensure the convergence and accuracy of safe check calculation, it provides an effective guarantee with the safe and stable operation of the power grid, in the same way, it is also an efficient method to provides effective guarantee for power grid safe operation from the data source. 展开更多
关键词 security CHECKING Intra-Day SCHEDULING smS Notifying
下载PDF
Design of Security Management System of Meteorological Observation Equipment in Jiangxi Province
14
作者 Zeng Yang Hu Qin 《Meteorological and Environmental Research》 CAS 2018年第5期19-21,共3页
According to the current development status and requirements of meteorological observation equipment security work in Jiangxi Province,a security management system of meteorological observation equipment was developed... According to the current development status and requirements of meteorological observation equipment security work in Jiangxi Province,a security management system of meteorological observation equipment was developed to improve the scientific and precise level of current security management business. The system was elaborated in terms of design ideas,functional modules,and realization of functions. The system adopts the C/S architecture to realize the information management of security business of meteorological observation equipment such as radar and automatic weather stations. It provides functions such as maintenance registration,data statistics and table generation. 展开更多
关键词 METEOROLOGICAL OBSERVATION EQUIPMENT security management system JIANGXI PROVINCE
下载PDF
Virtualization Security, Strategy and Management
15
作者 Simon Tran Stuart Gold 《International Journal of Communications, Network and System Sciences》 2014年第10期423-429,共7页
The purpose of this quantitative study was to determine the relationship between the security management framework of organizations and the security condition of the virtualized environment.
关键词 VIRTUALIZATION Technology VIRTUAL MACHINE security ISSUES security management Framework
下载PDF
Cost management based security framework in mobile ad hoc networks
16
作者 YANG Rui-jun XIA Qi +2 位作者 PAN Qun-hua WANG Wei-nong LI Ming-lu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第4期493-501,共9页
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ... Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks. 展开更多
关键词 Network attacks Mobile ad hoc Cost management security framework
下载PDF
Research on "bridge" mode of mine security production management
17
作者 冯夕文 王以功 《Journal of Coal Science & Engineering(China)》 2007年第4期453-457,共5页
Realized new break-through on the basis of existing security management theory, tentatively and creatively carried out "realizing management theory of mine security production" and proposed "bridge" mode of realiz... Realized new break-through on the basis of existing security management theory, tentatively and creatively carried out "realizing management theory of mine security production" and proposed "bridge" mode of realizing green management theory. Green management theory has an integrated system structure. The green management system of mine security production includes three parts, the foundation of green system, the supervision system of green system operation and the safeguard system of green system. The key of "bridge" mode is to analyze the existing insecurity factors in the process of security production and establish corresponding regulations. 展开更多
关键词 "bridge mode" mine security management theory green management
下载PDF
Trust and Security on Semantic HIM (Health Information Management)
18
作者 Nasim Khozouei Razie Vanda Peyman Khozouei 《Intelligent Information Management》 2012年第6期401-406,共6页
Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-base... Information technology have changed information media by networking and internet using technology in health as same as another part improve efficiency and effectiveness. Currently, the medical document is reality-based medicine, so that is the most important, richest and the most realistic source of medical and health information. Health information management systems that require systems to the storage, retrieval, storage and elimination of health records (by law), and adjust to the rules of professional. These processes are difficult and time consuming for human. In the meantime semantic HIM seem best solution. 展开更多
关键词 HEALTH INFORMATION management (HIM) MEDICAL Document HEALTH INFORMATION System(HIS) SEMANTIC Web security TRUST
下载PDF
Relevance of Advanced Plant Disease Detection Techniques in Disease and Pest Management for Ensuring Food Security and Their Implication: A Review
19
作者 Matthew Abu John Ibukunoluwa Bankole +3 位作者 Oluwatayo Ajayi-Moses Tofunmi Ijila Timilehin Jeje Patil Lalit 《American Journal of Plant Sciences》 2023年第11期1260-1295,共36页
Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grow... Plant diseases and pests present significant challenges to global food security, leading to substantial losses in agricultural productivity and threatening environmental sustainability. As the world’s population grows, ensuring food availability becomes increasingly urgent. This review explores the significance of advanced plant disease detection techniques in disease and pest management for enhancing food security. Traditional plant disease detection methods often rely on visual inspection and are time-consuming and subjective. This leads to delayed interventions and ineffective control measures. However, recent advancements in remote sensing, imaging technologies, and molecular diagnostics offer powerful tools for early and precise disease detection. Big data analytics and machine learning play pivotal roles in analyzing vast and complex datasets, thus accurately identifying plant diseases and predicting disease occurrence and severity. We explore how prompt interventions employing advanced techniques enable more efficient disease control and concurrently minimize the environmental impact of conventional disease and pest management practices. Furthermore, we analyze and make future recommendations to improve the precision and sensitivity of current advanced detection techniques. We propose incorporating eco-evolutionary theories into research to enhance the understanding of pathogen spread in future climates and mitigate the risk of disease outbreaks. We highlight the need for a science-policy interface that works closely with scientists, policymakers, and relevant intergovernmental organizations to ensure coordination and collaboration among them, ultimately developing effective disease monitoring and management strategies needed for securing sustainable food production and environmental well-being. 展开更多
关键词 Disease management Detection Techniques Advanced Detection SUSTAINABILITY Science-Policy Food security
下载PDF
Application of PDCA Circulation in Security Service Quality Management 被引量:2
20
作者 Na Gao 《管理科学与研究(中英文版)》 2015年第1期1-5,共5页
关键词 管理学 管理理念 管理方法 领导学
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部