期刊文献+
共找到9,672篇文章
< 1 2 250 >
每页显示 20 50 100
Reform of the Course System of Network Security Theory and Technology for Foreign Students in China
1
作者 Hu Xiong Jinhao Chen +1 位作者 Yang Zhao Zhiguang Qin 《计算机教育》 2020年第12期49-52,共4页
Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the... Theory and technology of network security is the core course of information security major,however,it still faces many challenges in the education of foreign graduate students studying in China.This paper analyzes the status quo and existing problems in the course of theory and technology of network security for foreign graduate students studying in China,the most fundamental of which is that the existing teaching materials are difficult to meet the needs of foreign graduate students.In view of the problem,this paper discusses how to improve the existing teaching materials to adapt to the teaching needs for foreign students and puts forward some new ideas and reform measures. 展开更多
关键词 theory and technology of network security REforM education of foreign graduate students
下载PDF
Influence of Quantum Information Technology on International Security
2
作者 ZHAO Dongqian 《International Relations and Diplomacy》 2024年第1期26-33,共8页
Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technologic... Humanity is currently undergoing the fourth industrial revolution,characterized by advancements in artificial intelligence,clean energy,quantum information technology,virtual reality,and biotechnology.This technological revolution is poised to have a profound impact on the world.Quantum information technology encompasses both quantum computing and the transmission of quantum information.This article aims to integrate quantum information technology with international security concerns,exploring its implications for international security and envisioning its groundbreaking significance. 展开更多
关键词 quantum information technology quantum communication quantum computing international security
下载PDF
Analysis of Software Development and Operation Measures from the Perspective of Security Technology
3
作者 Yan Gao 《Journal of Electronic Research and Application》 2024年第6期145-151,共7页
Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business... Security technology is crucial in software development and operation in the digital age. Secure software can protect user privacy and data security, prevent hacker attacks and data breaches, ensure legitimate business operations, and protect core assets. However, the development process often faces threats such as injection attacks, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF), mainly due to code vulnerabilities, configuration errors, and risks from third-party components. To meet these challenges, this paper discusses the application of security technology in development and operation, emphasizing security requirements analysis, design principles, coding practices, and testing during the development phase. Along with focusing on environmental configuration, continuous monitoring, emergency response, disaster recovery, and regular auditing and updating during the operation phase. These measures can significantly enhance the security of software systems and protect user and corporate data. 展开更多
关键词 security technology Software development Operation and maintenance
下载PDF
Exploration of Industrial Internet Security Technology and Application from the Perspective of Generative Artificial Intelligence
4
作者 Dinggao Li Shengda Liao Zhuo Zheng 《Journal of Electronic Research and Application》 2024年第6期170-175,共6页
In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technolog... In recent years,artificial intelligence technology has developed rapidly around the world is widely used in various fields,and plays an important role.The integration of industrial Internet security with new technologies such as big models and generative artificial intelligence has become a hot research issue.In this regard,this paper briefly analyzes the industrial Internet security technology and application from the perspective of generative artificial intelligence,hoping to provide some valuable reference and reference for readers. 展开更多
关键词 Generative artificial intelligence Industrial Internet security technology Application
下载PDF
Hybrid rice technology for food security in the world 被引量:10
5
作者 YUAN Long-ping(China National Hybrid Rice R & D Center,Changsha,Hunan,410125,China) 《作物研究》 2004年第4期185-186,共2页
关键词 Hybrid rice technology for food security in the world LINE
下载PDF
Research on Technology Early-Warning System Based on Dynamic Information Monitoring
6
作者 汪雪锋 朱东华 +1 位作者 刘嵩 刘佳 《Journal of Beijing Institute of Technology》 EI CAS 2009年第1期121-126,共6页
Relying on the advanced information technologies, such as information monitoring, data mining, natural language processing etc., the dynamic technology early-warning system is constructed. The system consists of techn... Relying on the advanced information technologies, such as information monitoring, data mining, natural language processing etc., the dynamic technology early-warning system is constructed. The system consists of technology information automatic retrieval, technology information monitoring, technology threat evaluation, and crisis response and management subsystem, which implements uninterrupted dynamic monitoring, trace and crisis early-warning to the specific technology. Empirical study testifies that the system improves the accuracy, timeliness and reliability of technology early-warning. 展开更多
关键词 technology early-warning system information monitoring dynamic retrieval technology threatevaluation crisis response and management
下载PDF
Research on Heterogeneous Data Sharing in Early Warning System for Grain Security
7
作者 GUO Heng-chuan,ZHAO Guo-zeng Department of Computer and Information Engineering,Luoyang Institute of Science and Technolog,Luoyang 471023 《Agricultural Science & Technology》 CAS 2010年第5期174-177,共4页
The data nodes with heterogeneous database in early warning system for grain security seriously hampered the effective data collection in this system. In this article,the existing middleware technologies was analyzed,... The data nodes with heterogeneous database in early warning system for grain security seriously hampered the effective data collection in this system. In this article,the existing middleware technologies was analyzed,the problem-solution approach of heterogeneous data sharing was discussed through middleware technologies. Based on this method,and according to the characteristics of early warning system for grain security,the technology of data sharing in this system were researched and explored to solve the issues of collection of heterogeneous data sharing. 展开更多
关键词 Middle ware Early Waming system Web XML Dataset
下载PDF
Preliminary Study on Early-warning System of Ecological Security in Water-Level-Fluctuating Zone (WLFZ) of Three Gorges Reservoir 被引量:2
8
作者 郑磊 左太安 李月臣 《Agricultural Science & Technology》 CAS 2010年第5期159-164,共6页
The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological securit... The area,the scope as well as some ecological environment questions in Three Gorges Reservoir was briefly introduced. Then its early warning-system frame was preliminarily constructed,which includes ecological security dynamic monitoring,ecological security appraisal,ecological security forecast and ecological security decision-making management. The synthetic evaluation indicator system of the ecological security quality were initially established,which includes ecological environment pollution,land use and land cover change,geological hazard and epidemic outbreaks. At the same time,29 evaluating indicators were selected,divides into the basic factors,response factors and inducing factors,which need to be Real-time monitored. 展开更多
关键词 Ecological security Early warning system Fuzzy mathematics Three Gorges Reservoir Water-Level-Fluctuating Zone (WLFZ)
下载PDF
Mechanism and monitoring and early warning technology for rockburst in coal mines 被引量:13
9
作者 Xue-qiu He Chao Zhou +4 位作者 Da-zhao Song Zhen-lei Li An-ye Cao Shen-quan He Majid Khan 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2021年第7期1097-1111,共15页
On the basis of the massive amount of published literature and the long-term practice of our research group in the field of prevention and control of rockburst,the research progress and shortcomings in understanding t... On the basis of the massive amount of published literature and the long-term practice of our research group in the field of prevention and control of rockburst,the research progress and shortcomings in understanding the rockburst phenomenon have been comprehensively in-vestigated.This study focuses on the occurrence mechanism and monitoring and early warning technology for rockburst in coal mines.Results showed that the prevention and control of rockburst had made significant progress.However,with the increasing mining depth,several unre-solved concerns remain challenging.From the in-depth research and analysis,it can be inferred that rockburst disasters involve three main problems,i.e.,the induction factors are complicated,the mechanism is still unclear,and the accuracy of the monitoring equipment and multi-source stereo monitoring technology is insufficient.The monitoring and warning standards of rockburst need to be further clarified and im-proved.Combined with the Internet of Things,cloud computing,and big data,a study of the trend of rockburst needs to be conducted.Further-more,the mechanism of multiphase and multi-field coupling induced by rockburst on a large scale needs to be explored.A multisystem and multiparameter integrated monitoring and early warning system and remote monitoring cloud platform for rockburst should be explored and developed.High-reliability sensing technology and equipment and perfect monitoring and early warning standards are considered to be the de-velopment direction of rockburst in the future.This research will help experts and technicians adopt effective measures for controlling rock-burst disasters. 展开更多
关键词 coal mine ROCKBURST MECHANISM monitoring and early warning technology MULTIPARAMETER
下载PDF
Analysis of Grain Storage Security Countermeasures under the New Normal Condition with "Grain Storage Technology" as the Core 被引量:6
10
作者 Xingang ZHAO Shengzhong DONG +3 位作者 Hongwei MA Zhaohuan WEN Xiufeng SHAN Peng MAO 《Agricultural Science & Technology》 CAS 2017年第10期1971-1974,共4页
Grain storage security is big issue related to national economy and the people's livelihood, as well as one of the most important strategic requirements in China. Under the background of grain supply-side structural ... Grain storage security is big issue related to national economy and the people's livelihood, as well as one of the most important strategic requirements in China. Under the background of grain supply-side structural reform, this paper analyzed the grain storage security countermeasures under the new normal conditions with "grain storage technology", one of the national grain security strategies of China during the 13th Five-year Plan, as the guiding ideology, from the perspectives of scientific technologies, policy supports, government supports and talent construction, so as to provide supports for the storage enterprises with vulnerable technological links. In addition, the food security issues discussed in this paper could be a helping hand in improving people's living quality, enhancing grain storage ecological quality, promoting grain green storage quality security, and be of important and profound strategic significance to enhance the macro-control capability of the government, maintain social stability and people's health. 展开更多
关键词 Grain storage technology Grain storage security Countermeasure analysis
下载PDF
Multi-Lever EarlyWarning forWind and Photovoltaic Power Ramp Events Based on Neural Network and Fuzzy Logic
11
作者 Huan Ma Linlin Ma +3 位作者 Zengwei Wang Zhendong Li Yuanzhen Zhu Yutian Liu 《Energy Engineering》 EI 2024年第11期3133-3160,共28页
With the increasing penetration of renewable energy in power system,renewable energy power ramp events(REPREs),dominated by wind power and photovoltaic power,pose significant threats to the secure and stable operation... With the increasing penetration of renewable energy in power system,renewable energy power ramp events(REPREs),dominated by wind power and photovoltaic power,pose significant threats to the secure and stable operation of power systems.This paper presents an early warning method for REPREs based on long short-term memory(LSTM)network and fuzzy logic.First,the warning levels of REPREs are defined by assessing the control costs of various power control measures.Then,the next 4-h power support capability of external grid is estimated by a tie line power predictionmodel,which is constructed based on the LSTMnetwork.Finally,considering the risk attitudes of dispatchers,fuzzy rules are employed to address the boundary value attribution of the early warning interval,improving the rationality of power ramp event early warning.Simulation results demonstrate that the proposed method can generate reasonable early warning levels for REPREs,guiding decision-making for control strategy. 展开更多
关键词 Early warning machine learning power system security renewable energy power ramp event smart grid
下载PDF
Challenges and Solutions of Information Security Issues in the Age of Big Data 被引量:6
12
作者 YANG Mengke ZHOU Xiaoguang +1 位作者 ZENG Jianqiu XU Jianjian 《China Communications》 SCIE CSCD 2016年第3期193-202,共10页
Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings ... Big data has been taken as a Chinese national strategy in order to satisfy the developments of the social and economic requirements and the development of new information technology. The prosperity of big data brings not only convenience to people's daily life and more opportunities to enterprises, but more challenges with information security as well. This paper has a research on new types and features of information security issues in the age of big data, and puts forward the solutions for the above issues: build up the big data security management platform, set up the establishment of information security system and implement relevant laws and regulations. 展开更多
关键词 information security big data data privacy information technology
下载PDF
Design and Construction of Automatic Monitoring System for Open-pit Coal Mine Slopes
13
作者 Yu LUO 《Asian Agricultural Research》 2024年第6期19-21,24,共4页
[Objectives]To monitor the stability of open-pit coal mine slopes in real time and ensure the safety of coal mine production.[Methods]The automatic monitoring system of coal mine slope was explored in depth,and the co... [Objectives]To monitor the stability of open-pit coal mine slopes in real time and ensure the safety of coal mine production.[Methods]The automatic monitoring system of coal mine slope was explored in depth,and the core functions of the system were designed comprehensively.According to the design function of the automatic monitoring system,the slope automatic monitoring system was constructed.Besides,in accordance with the actual situation of the slope,the monitoring frequency of slopes was set scientifically,and the key indicators such as rainfall,deep displacement and surface displacement of the slopes were monitored in an all-round and multi-angle way.[Results]During the monitoring period,the overall condition of the slope remained good,and no landslides or other geological disasters occurred.At the same time,the overall rainfall in the slope area remained low.In terms of monitoring data,the horizontal displacement and settlement of the slopes increased first and then tended to be stable.Specifically,the maximum horizontal displacement during the monitoring period was 22.74 mm,while the maximum settlement was 18.65 mm.[Conclusions]The automatic slope monitoring system has obtained remarkable achievements in practical application.It not only improves the accuracy and efficiency of slope stability monitoring,but also provides valuable reference experience for similar projects. 展开更多
关键词 SLOPE MONITORING Automatic MONITORING technology Global Navigation Satellite system (GNSS) MONITORING system EARLY warning
下载PDF
Ensuring Security and Privacy in the Internet of Things: Challenges and Solutions
14
作者 Nur Mohammad Rabeya Khatoon +3 位作者 Sadia Islam Nilima Jahanara Akter Md Kamruzzaman Hasan Mahmud Sozib 《Journal of Computer and Communications》 2024年第8期257-277,共21页
The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these device... The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control and management of these devices. This pervasive integration into daily life brings significant convenience but also raises substantial concerns regarding the security of personal data collected and stored online. As the number of connected devices grows, the urgency to address privacy and security issues becomes paramount. IoT systems are particularly susceptible to threats that could compromise consumer privacy and security, affecting their practical deployment. Recent research efforts have focused on enhancing the security of IoT devices, including the exploration of blockchain technologies to mitigate these concerns. This paper aims to elucidate the security and privacy challenges inherent in IoT systems by examining vulnerabilities at each layer of the IoT protocol stack. It identifies key security requirements and reviews existing solutions designed to protect IoT systems from a layered perspective, thereby providing a comprehensive overview of the current landscape of IoT security and highlighting the critical need for robust security measures as the adoption of IoT continues to expand. 展开更多
关键词 IOT security PRIVACY Blockchain Technologies Layered Perspective
下载PDF
Cutting-Edge Challenges in Communication Technology and Computer Network Security
15
作者 Haikang Gu 《Journal of Electronic Research and Application》 2024年第5期26-31,共6页
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev... The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks. 展开更多
关键词 Communication technology Computer network security
下载PDF
Computer Network and Database Security Technology Optimization
16
作者 Kachen Zhang 《Journal of Electronic Research and Application》 2024年第6期188-193,共6页
With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ens... With the continuous development of computer network technology, its applications in daily life and work have become increasingly widespread, greatly improving efficiency. However, certain security risks remain. To ensure the security of computer networks and databases, it is essential to enhance the security of both through optimization of technology. This includes improving management practices, optimizing data processing methods, and establishing comprehensive laws and regulations. This paper analyzes the current security risks in computer networks and databases and proposes corresponding solutions, offering reference points for relevant personnel. 展开更多
关键词 Computer network and database security technology Optimized path
下载PDF
Application of the PKPM-BIM construction management platform in project security management 被引量:1
17
作者 Liu Chen Wang Jing 《Computer Aided Drafting,Design and Manufacturing》 2017年第1期58-62,共5页
This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contr... This paper introduces the PKPM-BIM construction management platform and its applications in the construction security management. The PKPM-BIM platform is an integrated management system mainly developed for the contractors to implement the BIM-aided construction management. Application of BIM technology would bring many beneficial changes to the security management in construction. 展开更多
关键词 PKPM-BIM construction management platform security management BIM technology CONSTRUCTION CONTRACTOR
下载PDF
Improving the Cybersecurity Framework for Future Consumer Networks
18
作者 Tyler Welker Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2021年第4期47-54,共8页
The framework Information Technology professionals and Network Organizations use is often seen as open and dynamic. This can create many different pathways for cybercriminals to launch an attack on an enterprise netwo... The framework Information Technology professionals and Network Organizations use is often seen as open and dynamic. This can create many different pathways for cybercriminals to launch an attack on an enterprise network to cause panic, this situation could be prevented. Using the proposed framework, network administrators and networked organizations can improve their cybersecurity framework for future consumer networks. Implementing a network security plan that is up to date and outlines responsibilities of team members, creating a government subsidy to implement and increase safeguards on US based networks, and the analyzing of past cyber-attacks metadata to further understand the attacks that are causing problems for consumer networks can improve the cybersecurity framework for consumer networks and increase potential security on US based networks. Research found that the implementation of security plans, creating a government subsidy, and analyzing past metadata all show signs of improving the framework of cybersecurity in consumer based networks. 展开更多
关键词 CYBERsecurity Information technology Network security MALWARE ATTACKS
下载PDF
A Proposed Biometric Authentication Model to Improve Cloud Systems Security
19
作者 Hosam El-El-Sofany 《Computer Systems Science & Engineering》 SCIE EI 2022年第11期573-589,共17页
Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password.Unfortunately,this approach has many security problems b... Most user authentication mechanisms of cloud systems depend on the credentials approach in which a user submits his/her identity through a username and password.Unfortunately,this approach has many security problems because personal data can be stolen or recognized by hackers.This paper aims to present a cloud-based biometric authentication model(CBioAM)for improving and securing cloud services.The research study presents the verification and identification processes of the proposed cloud-based biometric authentication system(CBioAS),where the biometric samples of users are saved in database servers and the authentication process is implemented without loss of the users’information.The paper presents the performance evaluation of the proposed model in terms of three main characteristics including accuracy,sensitivity,and specificity.The research study introduces a novel algorithm called“Bio_Authen_as_a_Service”for implementing and evaluating the proposed model.The proposed system performs the biometric authentication process securely and preserves the privacy of user information.The experimental result was highly promising for securing cloud services using the proposed model.The experiments showed encouraging results with a performance average of 93.94%,an accuracy average of 96.15%,a sensitivity average of 87.69%,and a specificity average of 97.99%. 展开更多
关键词 Cloud computing cloud security biometrics technologies biometric authentication
下载PDF
Study on Construction of Tourism Security Early Warning System in Tourist Destinations-Take Yangshuo, China as an Example
20
作者 Jianwu He 《Journal of Electronic Research and Application》 2019年第5期1-4,共4页
Tourism security is the necessary foundation for sustainable development of tourism destinations.The application of next-generation information technology for early warning of tourism safety can achieve the management... Tourism security is the necessary foundation for sustainable development of tourism destinations.The application of next-generation information technology for early warning of tourism safety can achieve the management goals of tourism destinations such as accuracy,economy,and rapid response.The tourist destination safety early warning system mainly consists of video surveillance-based passenger flow assessment,traffic safety early warning system,emergency intelligent guidance system and intelligent rescue simulation system. 展开更多
关键词 TOURISM security EARLY warning system Yangshuo
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部