Recent economic crises like the 2008 financial tsunami has demonstrated a critical need for better understanding of the topologies and various economic,social,and technical mechanisms of the increasingly interconnecte...Recent economic crises like the 2008 financial tsunami has demonstrated a critical need for better understanding of the topologies and various economic,social,and technical mechanisms of the increasingly interconnected global financial system.Such a system largely relies on the interconnectedness of various financial entities such as banks,firms,and investors through complex financial relationships such as interbank payment networks,investment relations,or supply chains.A network-based perspective or approach is needed to study various financial networks in order to improve or extend financial theories,as well as develop business applications.Moreover,with the advance of big data related technologies,and the availability of huge amounts of financial and economic network data,advanced computing technologies and data analytics that can comprehend such big data are also needed.We referred this approach as financial network analytics.We suggest that it will enable stakeholders better understand the network dynamics within the interconnected global financial system and help designing financial policies such as managing and monitoring banking systemic risk,as well as developing intelligent business applications like banking advisory systems.In this paper,we review the existing research about financial network analytics and then discuss its main research challenges from the economic,social,and technological perspectives.展开更多
In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management ap...In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management applications are developed using the development technology of Visual Basic language and computer system operating environment, to achieve a network management software for users on food additives of quality analytical testing. The software sets up an information sharing network platform for enterprise and quality management departments, which is a major innovation in the food additive quality analysis on test management methods and tools.展开更多
Many organizations are struggling to provide high bandwidth and reliable internet connectivity at their branch offices and business locations and getting the most out of their operational expense.The need for internet...Many organizations are struggling to provide high bandwidth and reliable internet connectivity at their branch offices and business locations and getting the most out of their operational expense.The need for internet connectivity at any branch offices and business locations is not a luxury anymore but is a necessity.Let us try to understand how to plan and document the SDWAN(Software Defined-Wide Area Network)implementation in an organization.We will try to understand why it is essential to implement the new technology instead of investing in the existing MPLS(Multi-Protocol label switching)by taking an example of a retail organization.Methods:This project/research was performed using the abilities of Software Defined Network Technology and options available in MPLS(Multi-Protocol Label Switching).The Technical Project management principles were adopted as per PMI(Project Management Institute)waterfall methodology.Results/Conclusion:SDWAN technology provides an effective replacement of MPLS network connection for providing WAN connectivity for our office locations.It is essential to follow a documented process for appropriate vendor selection based on the available features and other listed attributes in the article.To be successful in the implementation it is essential to perform a POC(Proof of Concept)in a controlled environment and validate results.SDWAN provides better network performance and improves reliability as the links operate in active-active function.展开更多
The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy R...The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization.展开更多
This paper attempts to provide an overview of risk assessment and management practice in underground rock engineering based on a review of the international literature and some personal experience. It is noted that th...This paper attempts to provide an overview of risk assessment and management practice in underground rock engineering based on a review of the international literature and some personal experience. It is noted that the terminologies used in risk assessment and management studies may vary from country to country. Probabilistic risk analysis is probably the most widely-used approach to risk assessment in rock engineering and in geotechnical engineering more broadly. It is concluded that great potential exists to augment the existing probabilistic methods by the use of Bayesian networks and decision analysis techniques to allow reasoning under uncertainty and to update probabilities, material properties and analyses as further data become available throughout the various stages of a project. Examples are given of the use of these methods in underground excavation engineering in China and elsewhere, and opportunities for their further application are identified.展开更多
Cloud-based satellite and terrestrial spectrum shared networks(CB-STSSN)combines the triple advantages of efficient and flexible net-work management of heterogeneous cloud access(H-CRAN),vast coverage of satellite net...Cloud-based satellite and terrestrial spectrum shared networks(CB-STSSN)combines the triple advantages of efficient and flexible net-work management of heterogeneous cloud access(H-CRAN),vast coverage of satellite networks,and good communication quality of terrestrial networks.Thanks to the complementary coverage characteristics,any-time and anywhere high-speed communications can be achieved to meet the various needs of users.The scarcity of spectrum resources is a common prob-lem in both satellite and terrestrial networks.In or-der to improve resource utilization,the spectrum is shared not only within each component but also be-tween satellite beams and terrestrial cells,which intro-duces inter-component interferences.To this end,this paper first proposes an analytical framework which considers the inter-component interferences induced by spectrum sharing(SS).An intelligent SS scheme based on radio map(RM)consisting of LSTM-based beam prediction(BP),transfer learning-based spec-trum prediction(SP)and joint non-preemptive prior-ity and preemptive priority(J-NPAP)-based propor-tional fair spectrum allocation is than proposed.The simulation result shows that the spectrum utilization rate of CB-STSSN is improved and user blocking rate and waiting probability are decreased by the proposed scheme.展开更多
In order to meet the strict requirements for information in engineering management, the positive interval (0, 1 ] in Shannon information entropy is extended to the real number interval [ - 1, 1 ]. The information the...In order to meet the strict requirements for information in engineering management, the positive interval (0, 1 ] in Shannon information entropy is extended to the real number interval [ - 1, 1 ]. The information theory and the decision theory are combined effectively, and the deficiencies that the traditional Bayes decision-making methods only consider a single factor are made up for. The multi-factors engineering decision-making methods are proposed, and some critical problems are solved in the practical engineering management decision-making process.展开更多
1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred milli...1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred million [2]. The fast growth ol the lnternet pusnes me rapid development of information technology (IT) and communication technology (CT). Many traditional IT service and CT equipment providers are facing the fusion of IT and CT in the age of digital transformation, and heading toward ICT enterprises. Large global ICT enterprises, such as Apple, Google, Microsoft, Amazon, Verizon, and AT&T, have been contributing to the performance improvement of IT service and CT equipment.展开更多
Purpose: The evolution of the socio-cognitive structure of the field of knowledge management(KM) during the period 1986–2015 is described. Design/methodology/approach: Records retrieved from Web of Science were submi...Purpose: The evolution of the socio-cognitive structure of the field of knowledge management(KM) during the period 1986–2015 is described. Design/methodology/approach: Records retrieved from Web of Science were submitted to author co-citation analysis(ACA) following a longitudinal perspective as of the following time slices: 1986–1996, 1997–2006, and 2007–2015. The top 10% of most cited first authors by sub-periods were mapped in bibliometric networks in order to interpret the communities formed and their relationships.Findings: KM is a homogeneous field as indicated by networks results. Nine classical authors are identified since they are highly co-cited in each sub-period, highlighting Ikujiro Nonaka as the most influential authors in the field. The most significant communities in KM are devoted to strategic management, KM foundations, organisational learning and behaviour, and organisational theories. Major trends in the evolution of the intellectual structure of KM evidence a technological influence in 1986–1996, a strategic influence in 1997–2006, and finally a sociological influence in 2007–2015.Research limitations: Describing a field from a single database can offer biases in terms of output coverage. Likewise, the conference proceedings and books were not used and the analysis was only based on first authors. However, the results obtained can be very useful to understand the evolution of KM research.Practical implications: These results might be useful for managers and academicians to understand the evolution of KM field and to(re)define research activities and organisational projects.Originality/value: The novelty of this paper lies in considering ACA as a bibliometric technique to study KM research. In addition, our investigation has a wider time coverage than earlier articles.展开更多
Digital circuit and analog circuit courses are basic courses for students of science and engineering universities. Among them,the practical courses are of great significance for students to master the knowledge of ele...Digital circuit and analog circuit courses are basic courses for students of science and engineering universities. Among them,the practical courses are of great significance for students to master the knowledge of electronics. In order to make teachers teaching more efficiently and students studying more quickly,how to update the experimental course in teaching reform is the key point. This paper analyzing the present situation of teaching in the digital circuit and analog circuit courses,the teaching questions in universities. On the basis of it,the innovation measures of experimental teaching methods and contents are discussed. Our school tries to introduce the UltraLab network experiment platform,reform and optimize the teaching methods of related courses.And it’ s accelerating the construction and development of emerging engineering education’ s process,reducing effectively the teacher’s time for managing in equipment,improving the students’ ability to use instruments.展开更多
Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively g...Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.展开更多
Managing documentation in a suitable way has become a critical issue for any organization. Organizations depend on the information?they store and they are required to have appropriate mechanisms to support the functio...Managing documentation in a suitable way has become a critical issue for any organization. Organizations depend on the information?they store and they are required to have appropriate mechanisms to support the functional needs of information storage, management and retrieval. Currently, there are several tools in the market, both free software and proprietary license, normally named Enterprise Content Management (ECM) tools, which offer relevant solutions in this context. This paper presents a comparative study among several of the most commonly used ECM tools. It starts with a systematic review of the literature to analyze possible solutions and then it defines a characterization schema instantiated in a particular case, the Regional Government of Andalusia.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
Engineering project management is the whole process of project construction management activities up to the point of achieving the goals of engineering construction, which adopts the means of planning, organizing,lead...Engineering project management is the whole process of project construction management activities up to the point of achieving the goals of engineering construction, which adopts the means of planning, organizing,leading, and controlling. In addition, engineering project management modes are the works of project management and the technical guarantee of project success. For the quality and efficient transformation demands of the Chinese construction industry in the process of marketization, internationalization and informatization, based on the connotation and development path of engineering project management modes, the 16 main and new kinds of project management modes both domestically and abroad are divided into trading mode, financing mode and management mode. These have led to comparative analysis and brief commentary. Finally, it will be pointed out that the engineering project management modes move throughout the whole management process, the combined model and the expansion development of financing model. This work will provide reference for project participants to choose the appropriate project management modes and better understand building company transformation.展开更多
Risk evaluation is one of the important elements of international engineering project management. The risk factors of international engineering projects are systematically analyzed from multiple dimension features of ...Risk evaluation is one of the important elements of international engineering project management. The risk factors of international engineering projects are systematically analyzed from multiple dimension features of the projects. The muhilayer evaluation index system for the international engineering project risk assessment is proposed and constructed, which consists of 8 I-grade indexes and 24 II-grade indexes as policy risk, market risk, resource risk, and technical scheme risk, schedule risk, funding risk, personnel risk and management risk. And then the self-evaluation and benchmarking evaluation methods are applied to evaluate the international engineering project risk, and established the corresponding mathematical models. Finally, a project evaluation example is given to illustrate the applicability and effectiveness of the mathematical models.展开更多
In this paper the calculation formulae of optimum beginning time-inter-val and optimum finishing time-interval between every two adjacent operations forthe most general current production network are derived.Two examp...In this paper the calculation formulae of optimum beginning time-inter-val and optimum finishing time-interval between every two adjacent operations forthe most general current production network are derived.Two examples show thatthese formulae are very convenient for calculation.展开更多
Software Defined Networking(SDN) provides a flexible and convenient way to support fine-grained traffic-engineering(TE). Besides, SDN also provides better Quality of Experience(QoE) for customers. However, the policy ...Software Defined Networking(SDN) provides a flexible and convenient way to support fine-grained traffic-engineering(TE). Besides, SDN also provides better Quality of Experience(QoE) for customers. However, the policy of the evolution from legacy networks to the SDNs overemphasizes the controllability of the network or TE while ignoring the customers' benefit. Standing in the customers' position, we propose an optimization scheme, named as Optimal Migration Schedule based on Customers' Benefit(OMSB), to produce an optimized migration schedule and maximize the benefit of customers. Not only the quality and quantity of paths availed by migration, but also the number of flows from the customers that can use these multi-paths are taken into consideration for the scheduling. We compare the OMSB with other six migration schemes in terms of the benefit of customers. Our results suggest that the sequence of the migration plays a vital role for customers, especially in the early stages of the network migration to the SDN.展开更多
基金This research was partially supported by Department of informatics,Faculty of Economics,Business Administration and Information Technology,University of Zurich.
文摘Recent economic crises like the 2008 financial tsunami has demonstrated a critical need for better understanding of the topologies and various economic,social,and technical mechanisms of the increasingly interconnected global financial system.Such a system largely relies on the interconnectedness of various financial entities such as banks,firms,and investors through complex financial relationships such as interbank payment networks,investment relations,or supply chains.A network-based perspective or approach is needed to study various financial networks in order to improve or extend financial theories,as well as develop business applications.Moreover,with the advance of big data related technologies,and the availability of huge amounts of financial and economic network data,advanced computing technologies and data analytics that can comprehend such big data are also needed.We referred this approach as financial network analytics.We suggest that it will enable stakeholders better understand the network dynamics within the interconnected global financial system and help designing financial policies such as managing and monitoring banking systemic risk,as well as developing intelligent business applications like banking advisory systems.In this paper,we review the existing research about financial network analytics and then discuss its main research challenges from the economic,social,and technological perspectives.
文摘In this paper, on the basis of the implementation of the national chemical industry standard analytical test methods and analysis of test items, a food additive quality analysis and inspection of network management applications are developed using the development technology of Visual Basic language and computer system operating environment, to achieve a network management software for users on food additives of quality analytical testing. The software sets up an information sharing network platform for enterprise and quality management departments, which is a major innovation in the food additive quality analysis on test management methods and tools.
文摘Many organizations are struggling to provide high bandwidth and reliable internet connectivity at their branch offices and business locations and getting the most out of their operational expense.The need for internet connectivity at any branch offices and business locations is not a luxury anymore but is a necessity.Let us try to understand how to plan and document the SDWAN(Software Defined-Wide Area Network)implementation in an organization.We will try to understand why it is essential to implement the new technology instead of investing in the existing MPLS(Multi-Protocol label switching)by taking an example of a retail organization.Methods:This project/research was performed using the abilities of Software Defined Network Technology and options available in MPLS(Multi-Protocol Label Switching).The Technical Project management principles were adopted as per PMI(Project Management Institute)waterfall methodology.Results/Conclusion:SDWAN technology provides an effective replacement of MPLS network connection for providing WAN connectivity for our office locations.It is essential to follow a documented process for appropriate vendor selection based on the available features and other listed attributes in the article.To be successful in the implementation it is essential to perform a POC(Proof of Concept)in a controlled environment and validate results.SDWAN provides better network performance and improves reliability as the links operate in active-active function.
基金ACKNOWLEDGEMENT This work was supported by the National Na- tural Science Foundation of China under Gra- nts No. 61172079, 61231008, No. 61201141, No. 61301176 the National Basic Research Program of China (973 Program) under Grant No. 2009CB320404+2 种基金 the 111 Project under Gr- ant No. B08038 the National Science and Tec- hnology Major Project under Grant No. 2012- ZX03002009-003, No. 2012ZX03004002-003 and the Shaanxi Province Science and Techno- logy Research and Development Program un- der Grant No. 2011KJXX-40.
文摘The traffic with tidal phenomenon in Heterogeneous Wireless Networks(HWNs)has radically increased the complexity of radio resource management and its performance analysis.In this paper,a Simplified Dynamic Hierarchy Resource Management(SDHRM)algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic.In network-level resource allocation,the proposed algorithm first adopts wavelet neural network to forecast the traffic of each sub-area and then allocates the resources to those sub-areas to maximise the network utility.In connection-level network selection,based on the above resource allocation and the pre-defined QoS requirement,three typical network selection policies are provided to assign traffic flow to the most appropriate network.Furthermore,based on multidimensional Markov model,we analyse the performance of SDHRM in HWNs with heavy tailed traffic.Numerical results show that our theoretical values coincide with the simulation results and the SDHRM can improve the resource utilization.
文摘This paper attempts to provide an overview of risk assessment and management practice in underground rock engineering based on a review of the international literature and some personal experience. It is noted that the terminologies used in risk assessment and management studies may vary from country to country. Probabilistic risk analysis is probably the most widely-used approach to risk assessment in rock engineering and in geotechnical engineering more broadly. It is concluded that great potential exists to augment the existing probabilistic methods by the use of Bayesian networks and decision analysis techniques to allow reasoning under uncertainty and to update probabilities, material properties and analyses as further data become available throughout the various stages of a project. Examples are given of the use of these methods in underground excavation engineering in China and elsewhere, and opportunities for their further application are identified.
基金the National Nat-ural Science Foundation of China under Grants 61771163the Natural Science Foundation for Out-standing Young Scholars of Heilongjiang Province un-der Grant YQ2020F001the Science and Technol-ogy on Communication Networks Laboratory under Grants SXX19641X072 and SXX18641X028.(Cor-respondence author:Min Jia)。
文摘Cloud-based satellite and terrestrial spectrum shared networks(CB-STSSN)combines the triple advantages of efficient and flexible net-work management of heterogeneous cloud access(H-CRAN),vast coverage of satellite networks,and good communication quality of terrestrial networks.Thanks to the complementary coverage characteristics,any-time and anywhere high-speed communications can be achieved to meet the various needs of users.The scarcity of spectrum resources is a common prob-lem in both satellite and terrestrial networks.In or-der to improve resource utilization,the spectrum is shared not only within each component but also be-tween satellite beams and terrestrial cells,which intro-duces inter-component interferences.To this end,this paper first proposes an analytical framework which considers the inter-component interferences induced by spectrum sharing(SS).An intelligent SS scheme based on radio map(RM)consisting of LSTM-based beam prediction(BP),transfer learning-based spec-trum prediction(SP)and joint non-preemptive prior-ity and preemptive priority(J-NPAP)-based propor-tional fair spectrum allocation is than proposed.The simulation result shows that the spectrum utilization rate of CB-STSSN is improved and user blocking rate and waiting probability are decreased by the proposed scheme.
文摘In order to meet the strict requirements for information in engineering management, the positive interval (0, 1 ] in Shannon information entropy is extended to the real number interval [ - 1, 1 ]. The information theory and the decision theory are combined effectively, and the deficiencies that the traditional Bayes decision-making methods only consider a single factor are made up for. The multi-factors engineering decision-making methods are proposed, and some critical problems are solved in the practical engineering management decision-making process.
基金supported in part by Ministry of Education/China Mobile joint research grant under Project No.5-10Nanjing University of Posts and Telecommunications under Grants No.NY214135 and NY215045
文摘1 IntroductionNowadays in China, there are more than six hundred million netizens [1]. On April 11, 2015, the nmnbet of simultaneous online users of the Chinese instant message application QQ reached two hundred million [2]. The fast growth ol the lnternet pusnes me rapid development of information technology (IT) and communication technology (CT). Many traditional IT service and CT equipment providers are facing the fusion of IT and CT in the age of digital transformation, and heading toward ICT enterprises. Large global ICT enterprises, such as Apple, Google, Microsoft, Amazon, Verizon, and AT&T, have been contributing to the performance improvement of IT service and CT equipment.
文摘Purpose: The evolution of the socio-cognitive structure of the field of knowledge management(KM) during the period 1986–2015 is described. Design/methodology/approach: Records retrieved from Web of Science were submitted to author co-citation analysis(ACA) following a longitudinal perspective as of the following time slices: 1986–1996, 1997–2006, and 2007–2015. The top 10% of most cited first authors by sub-periods were mapped in bibliometric networks in order to interpret the communities formed and their relationships.Findings: KM is a homogeneous field as indicated by networks results. Nine classical authors are identified since they are highly co-cited in each sub-period, highlighting Ikujiro Nonaka as the most influential authors in the field. The most significant communities in KM are devoted to strategic management, KM foundations, organisational learning and behaviour, and organisational theories. Major trends in the evolution of the intellectual structure of KM evidence a technological influence in 1986–1996, a strategic influence in 1997–2006, and finally a sociological influence in 2007–2015.Research limitations: Describing a field from a single database can offer biases in terms of output coverage. Likewise, the conference proceedings and books were not used and the analysis was only based on first authors. However, the results obtained can be very useful to understand the evolution of KM research.Practical implications: These results might be useful for managers and academicians to understand the evolution of KM field and to(re)define research activities and organisational projects.Originality/value: The novelty of this paper lies in considering ACA as a bibliometric technique to study KM research. In addition, our investigation has a wider time coverage than earlier articles.
基金supported by University-level Teaching Reform Project of New Engineering,Beijing University of Chemical Technology(xgk2017040436)Teaching Reform Project of School of International Teaching,Beijing University of Chemical Technology(siejg201713)
文摘Digital circuit and analog circuit courses are basic courses for students of science and engineering universities. Among them,the practical courses are of great significance for students to master the knowledge of electronics. In order to make teachers teaching more efficiently and students studying more quickly,how to update the experimental course in teaching reform is the key point. This paper analyzing the present situation of teaching in the digital circuit and analog circuit courses,the teaching questions in universities. On the basis of it,the innovation measures of experimental teaching methods and contents are discussed. Our school tries to introduce the UltraLab network experiment platform,reform and optimize the teaching methods of related courses.And it’ s accelerating the construction and development of emerging engineering education’ s process,reducing effectively the teacher’s time for managing in equipment,improving the students’ ability to use instruments.
文摘Computer network technology has a very important role in electronic information engineering.The application of this technology not only enriches the traditional information engineering functions,but also effectively guarantees the efficiency and quality.At present,due to the wide variety of external information that Chinese citizens are exposed to,in addition to the variegated and mixed content,it is easy for information to be leaked or stolen.In order to avoid similar situations,it is necessary for people to pay more attention to network system security,so as to ensure that the quality of life of citizens can be guaranteed.In view of that,this paper discusses and analyzes the application of computer network technology in electronic information engineering.
文摘Managing documentation in a suitable way has become a critical issue for any organization. Organizations depend on the information?they store and they are required to have appropriate mechanisms to support the functional needs of information storage, management and retrieval. Currently, there are several tools in the market, both free software and proprietary license, normally named Enterprise Content Management (ECM) tools, which offer relevant solutions in this context. This paper presents a comparative study among several of the most commonly used ECM tools. It starts with a systematic review of the literature to analyze possible solutions and then it defines a characterization schema instantiated in a particular case, the Regional Government of Andalusia.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘Engineering project management is the whole process of project construction management activities up to the point of achieving the goals of engineering construction, which adopts the means of planning, organizing,leading, and controlling. In addition, engineering project management modes are the works of project management and the technical guarantee of project success. For the quality and efficient transformation demands of the Chinese construction industry in the process of marketization, internationalization and informatization, based on the connotation and development path of engineering project management modes, the 16 main and new kinds of project management modes both domestically and abroad are divided into trading mode, financing mode and management mode. These have led to comparative analysis and brief commentary. Finally, it will be pointed out that the engineering project management modes move throughout the whole management process, the combined model and the expansion development of financing model. This work will provide reference for project participants to choose the appropriate project management modes and better understand building company transformation.
基金supported by National Natural Science Foundation of China under Grant No.71172123Aviation Science Fund under Grant No.2012ZG53083humanities and social science research special task project of Chinese Ministry of education under Grant No.10JDSZ1010
文摘Risk evaluation is one of the important elements of international engineering project management. The risk factors of international engineering projects are systematically analyzed from multiple dimension features of the projects. The muhilayer evaluation index system for the international engineering project risk assessment is proposed and constructed, which consists of 8 I-grade indexes and 24 II-grade indexes as policy risk, market risk, resource risk, and technical scheme risk, schedule risk, funding risk, personnel risk and management risk. And then the self-evaluation and benchmarking evaluation methods are applied to evaluate the international engineering project risk, and established the corresponding mathematical models. Finally, a project evaluation example is given to illustrate the applicability and effectiveness of the mathematical models.
文摘In this paper the calculation formulae of optimum beginning time-inter-val and optimum finishing time-interval between every two adjacent operations forthe most general current production network are derived.Two examples show thatthese formulae are very convenient for calculation.
基金supported by Joint Funds of National Natural Science Foundation of China and Xinjiang under code U1603261the Research Fund of Ministry of Education-China Mobile under Grant No. MCM20160304the Fundamental Research Funds for the Central Universities
文摘Software Defined Networking(SDN) provides a flexible and convenient way to support fine-grained traffic-engineering(TE). Besides, SDN also provides better Quality of Experience(QoE) for customers. However, the policy of the evolution from legacy networks to the SDNs overemphasizes the controllability of the network or TE while ignoring the customers' benefit. Standing in the customers' position, we propose an optimization scheme, named as Optimal Migration Schedule based on Customers' Benefit(OMSB), to produce an optimized migration schedule and maximize the benefit of customers. Not only the quality and quantity of paths availed by migration, but also the number of flows from the customers that can use these multi-paths are taken into consideration for the scheduling. We compare the OMSB with other six migration schemes in terms of the benefit of customers. Our results suggest that the sequence of the migration plays a vital role for customers, especially in the early stages of the network migration to the SDN.