China Datang Group Company attaches great importance to information security and has formulated a security strategy of "dual networks, dual computers, sub-zones, hierarchical protection and multi-layer defense&qu...China Datang Group Company attaches great importance to information security and has formulated a security strategy of "dual networks, dual computers, sub-zones, hierarchical protection and multi-layer defense" to strengthen network border security and divide the management information network into an information internal network and an information external network, Logical strong isolation policy is used between information internal and external networks, and information internal and external networks use physical isolation and independent server and desktop computer respectively. According to the transformation of internal and external network isolation in Bikou Power Plant, some problems and solutions of internal and external network isolation in some power enterprises are understood.展开更多
Wireless sensors are deployed widely to monitor space, emergent events, and disasters. Collected realtime sensory data are precious for completing rescue missions quickly and efficiently. Detecting isolate safe areas ...Wireless sensors are deployed widely to monitor space, emergent events, and disasters. Collected realtime sensory data are precious for completing rescue missions quickly and efficiently. Detecting isolate safe areas is significant for various applications of event and disaster monitoring since valuable real-time information can be provided for the rescue crew to save persons who are trapped in isolate safe areas. We propose a centralized method to detect isolate safe areas via discovering holes in event areas. In order to shorten the detection delay, a distributed isolate safe area detection method is studied. The distributed method detects isolate safe areas during the process of event detection. Moreover, detecting isolate safe areas in a building is addressed particularly since the regular detecting method is not applicable. Our simulation results show that the distributed method can detect all isolate safe areas in an acceptable short delay.展开更多
文摘China Datang Group Company attaches great importance to information security and has formulated a security strategy of "dual networks, dual computers, sub-zones, hierarchical protection and multi-layer defense" to strengthen network border security and divide the management information network into an information internal network and an information external network, Logical strong isolation policy is used between information internal and external networks, and information internal and external networks use physical isolation and independent server and desktop computer respectively. According to the transformation of internal and external network isolation in Bikou Power Plant, some problems and solutions of internal and external network isolation in some power enterprises are understood.
文摘Wireless sensors are deployed widely to monitor space, emergent events, and disasters. Collected realtime sensory data are precious for completing rescue missions quickly and efficiently. Detecting isolate safe areas is significant for various applications of event and disaster monitoring since valuable real-time information can be provided for the rescue crew to save persons who are trapped in isolate safe areas. We propose a centralized method to detect isolate safe areas via discovering holes in event areas. In order to shorten the detection delay, a distributed isolate safe area detection method is studied. The distributed method detects isolate safe areas during the process of event detection. Moreover, detecting isolate safe areas in a building is addressed particularly since the regular detecting method is not applicable. Our simulation results show that the distributed method can detect all isolate safe areas in an acceptable short delay.