The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and e...The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.展开更多
Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new...Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods.展开更多
Information technologies play an important role in many business areas. One of these areas is hotel information system. Many operations, such as check-in, check-out, and food and beverage, are performed owing to infor...Information technologies play an important role in many business areas. One of these areas is hotel information system. Many operations, such as check-in, check-out, and food and beverage, are performed owing to information technologies. Package programs are used for managing hotel operations. Software provides reporting, filtering, remote accessing, and cost control services which are important key parameters of decision-making processes of hotel managers. Cost control is one of the most important operations in hotel management. Cost control service of package programs assists managers in monitoring overall cost and computing each department's partial cost and serves information to the different departments of hotels using information technologies. Cost control is important in the departments which are profitable in a hotel. Food and beverage is one of these profitable departments, which is the second profitable department in hotels. It makes profit between mostly 20% and 40%. This research aims to understand effects of information technologies during decision-making processes. The sample of study is food and beverage managers in five-star hotels in Istanbul. Questionnaire was applied to 45 participants.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
The spectral analysis of simulated N-team of interacting decision makers with bounded rationality constraints of Oladejo, which assumes triangular probability density function of command inputs is hereby restructured ...The spectral analysis of simulated N-team of interacting decision makers with bounded rationality constraints of Oladejo, which assumes triangular probability density function of command inputs is hereby restructured and analysed, to have hierarchical command inputs that are predicated on order statistics distributions. The results give optimal distributions.展开更多
This study aims to analyze the influence of Human Resource Competence,Regulation,Information Technology,Reconciliation,and Internal Control System on Asset Management in Local Government Work Unit(abbreviated SKPD)of ...This study aims to analyze the influence of Human Resource Competence,Regulation,Information Technology,Reconciliation,and Internal Control System on Asset Management in Local Government Work Unit(abbreviated SKPD)of Central Java Provincial Government.This research is conducted because there is still record in the Final Report of Inspection by the Republic of Indonesia Audit Board(abbreviated BPK)concerning problem of asset management conducted by some SKPDs of Central Java Provincial Government,although in general the Local Government Financial Report of Central Java Province has got opinion“Reasonable Without Exception”.The data source of this research is primary data collected through interview method on asset management officers at the 48 SKPD in Central Java Provincial Government.Data analysis method used in this research is multiple regression analysis.This research finds that the Human Resource Competence,the Regulation,the Information Technology,the Reconciliation,and the Internal Control System have positive and significant effect on the Asset Management at the Local Government Work Unit of Central Java Provincial Government at level of significance 0.05.Ability to explain of the independent variables to the Asset Management variable is equal to 67.7%.展开更多
The emerging novel energy infrastructures,such as energy communities,smart building-based microgrids,electric vehicles enabled mobile energy storage units raise the requirements for a more interconnective and interope...The emerging novel energy infrastructures,such as energy communities,smart building-based microgrids,electric vehicles enabled mobile energy storage units raise the requirements for a more interconnective and interoperable energy system.It leads to a transition from simple and isolated microgrids to relatively large-scale and complex interconnected microgrid systems named multi-microgrid clusters.In order to efficiently,optimally,and flexibly control multi-microgrid clusters,cross-disciplinary technologies such as power electronics,control theory,optimization algorithms,information and communication technologies,cyber-physical,and big-data analysis are needed.This paper introduces an overview of the relevant aspects for multi-microgrids,including the out-standing features,architectures,typical applications,existing control mechanisms,as well as the challenges.展开更多
[研究目的]从情报学和情报工作专业视角研究美国商务部工业与安全局(The Bureau of Industry and Secur-ity of U.S.Department of Commerce,BIS)的情报工作,为新时期中国情报学和情报工作创新发展提供参考。[研究方法]通过BIS官方网站...[研究目的]从情报学和情报工作专业视角研究美国商务部工业与安全局(The Bureau of Industry and Secur-ity of U.S.Department of Commerce,BIS)的情报工作,为新时期中国情报学和情报工作创新发展提供参考。[研究方法]通过BIS官方网站信息内容研究、官方网站重要文件研究、瓦森纳协定官方网站信息内容研究、BIS典型执法案例研究相结合的方法,研究BIS情报工作的全貌和精要。[研究结论]从情报学和情报工作专业视角对BIS的组织机构使命、组织网络、信息网络、人际网络、法律保障、典型情报工作、提升美国出口商情报能力的主要工作进行研究,揭示了BIS情报工作全貌、精要和最突出的关键成功因素。展开更多
基金supported by the Natural Science Foundation Research Plan of Shanxi Province (2023JCQN0728)。
文摘The subversive nature of information war lies not only in the information itself, but also in the circulation and application of information. It has always been a challenge to quantitatively analyze the function and effect of information flow through command, control, communications, computer, kill, intelligence,surveillance, reconnaissance (C4KISR) system. In this work, we propose a framework of force of information influence and the methods for calculating the force of information influence between C4KISR nodes of sensing, intelligence processing,decision making and fire attack. Specifically, the basic concept of force of information influence between nodes in C4KISR system is formally proposed and its mathematical definition is provided. Then, based on the information entropy theory, the model of force of information influence between C4KISR system nodes is constructed. Finally, the simulation experiments have been performed under an air defense and attack scenario. The experimental results show that, with the proposed force of information influence framework, we can effectively evaluate the contribution of information circulation through different C4KISR system nodes to the corresponding tasks. Our framework of force of information influence can also serve as an effective tool for the design and dynamic reconfiguration of C4KISR system architecture.
基金This work was supported in part by the National Natural Science Foundation of China under Grant 62203468Young Elite Scientist Sponsorship Program by CAST under Grant 2022QNRC001+1 种基金Foundation of China State Railway Group Co.,Ltd.under Grant K2021X001Foundation of China Academy of Railway Sciences Corporation Limited under Grant 2021YJ315.
文摘Purpose–The intelligent Central Traffic Control(CTC)system plays a vital role in establishing an intelligent high-speed railway(HSR)system.As the core of HSR transportation command,the intelligent CTC system is a new HSR dispatching command system that integrates the widely used CTC in China with the practical service requirements of intelligent dispatching.This paper aims to propose key technologies and applications for intelligent dispatching command in HSR in China.Design/methodology/approach–This paper first briefly introduces the functions and configuration of the intelligent CTC system.Some new servers,terminals and interfaces are introduced,which are plan adjustment server/terminal,interface for automatic train operation(ATO),interface for Dynamic Monitoring System of Train Control Equipment(DMS),interface for Power Supervisory Control and Data Acquisition(PSCADA),interface for Disaster Monitoring,etc.Findings–The key technologies applied in the intelligent CTC system include automatic adjustment of train operation plans,safety control of train routes and commands,traffic information data platform,integrated simulation of traffic dispatching and ATO function.These technologies have been applied in the Beijing-Zhangjiakou HSR,which commenced operations at the end of 2019.Implementing these key intelligent functions has improved the train dispatching command capacity,ensured the safe operation of intelligent HSR,reduced the labor intensity of dispatching operators and enhanced the intelligence level of China’s dispatching system.Originality/value–This paper provides further challenges and research directions for the intelligent dispatching command of HSR.To achieve the objectives,new measures need to be conducted,including the development of advanced technologies for intelligent dispatching command,coping with new requirements with the development of China’s railway signaling system,the integration of traffic dispatching and train control and the application of AI and data-driven modeling and methods.
文摘Information technologies play an important role in many business areas. One of these areas is hotel information system. Many operations, such as check-in, check-out, and food and beverage, are performed owing to information technologies. Package programs are used for managing hotel operations. Software provides reporting, filtering, remote accessing, and cost control services which are important key parameters of decision-making processes of hotel managers. Cost control is one of the most important operations in hotel management. Cost control service of package programs assists managers in monitoring overall cost and computing each department's partial cost and serves information to the different departments of hotels using information technologies. Cost control is important in the departments which are profitable in a hotel. Food and beverage is one of these profitable departments, which is the second profitable department in hotels. It makes profit between mostly 20% and 40%. This research aims to understand effects of information technologies during decision-making processes. The sample of study is food and beverage managers in five-star hotels in Istanbul. Questionnaire was applied to 45 participants.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
文摘The spectral analysis of simulated N-team of interacting decision makers with bounded rationality constraints of Oladejo, which assumes triangular probability density function of command inputs is hereby restructured and analysed, to have hierarchical command inputs that are predicated on order statistics distributions. The results give optimal distributions.
文摘This study aims to analyze the influence of Human Resource Competence,Regulation,Information Technology,Reconciliation,and Internal Control System on Asset Management in Local Government Work Unit(abbreviated SKPD)of Central Java Provincial Government.This research is conducted because there is still record in the Final Report of Inspection by the Republic of Indonesia Audit Board(abbreviated BPK)concerning problem of asset management conducted by some SKPDs of Central Java Provincial Government,although in general the Local Government Financial Report of Central Java Province has got opinion“Reasonable Without Exception”.The data source of this research is primary data collected through interview method on asset management officers at the 48 SKPD in Central Java Provincial Government.Data analysis method used in this research is multiple regression analysis.This research finds that the Human Resource Competence,the Regulation,the Information Technology,the Reconciliation,and the Internal Control System have positive and significant effect on the Asset Management at the Local Government Work Unit of Central Java Provincial Government at level of significance 0.05.Ability to explain of the independent variables to the Asset Management variable is equal to 67.7%.
基金supported by VILLUM FONDEN under the VILLUM Investigator Grant(No.25920):Center for Research on Microgrids(CROM)www.crom.et.aau.dk。
文摘The emerging novel energy infrastructures,such as energy communities,smart building-based microgrids,electric vehicles enabled mobile energy storage units raise the requirements for a more interconnective and interoperable energy system.It leads to a transition from simple and isolated microgrids to relatively large-scale and complex interconnected microgrid systems named multi-microgrid clusters.In order to efficiently,optimally,and flexibly control multi-microgrid clusters,cross-disciplinary technologies such as power electronics,control theory,optimization algorithms,information and communication technologies,cyber-physical,and big-data analysis are needed.This paper introduces an overview of the relevant aspects for multi-microgrids,including the out-standing features,architectures,typical applications,existing control mechanisms,as well as the challenges.
文摘[研究目的]从情报学和情报工作专业视角研究美国商务部工业与安全局(The Bureau of Industry and Secur-ity of U.S.Department of Commerce,BIS)的情报工作,为新时期中国情报学和情报工作创新发展提供参考。[研究方法]通过BIS官方网站信息内容研究、官方网站重要文件研究、瓦森纳协定官方网站信息内容研究、BIS典型执法案例研究相结合的方法,研究BIS情报工作的全貌和精要。[研究结论]从情报学和情报工作专业视角对BIS的组织机构使命、组织网络、信息网络、人际网络、法律保障、典型情报工作、提升美国出口商情报能力的主要工作进行研究,揭示了BIS情报工作全貌、精要和最突出的关键成功因素。