期刊文献+
共找到2,046篇文章
< 1 2 103 >
每页显示 20 50 100
A Dynamic Social Network Graph Anonymity Scheme with Community Structure Protection
1
作者 Yuanjing Hao Xuemin Wang +2 位作者 Liang Chang Long Li Mingmeng Zhang 《Computers, Materials & Continua》 2025年第2期3131-3159,共29页
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ... Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate these attacks but are cumbersome, neglect dynamic protection of community structure, and lack precise utility measures. To address these challenges, we present a dynamic social network graph anonymity scheme with community structure protection (DSNGA-CSP), which achieves the dynamic anonymization process by incorporating community detection. First, DSNGA-CSP categorizes communities of the original graph into three types at each timestamp, and only partitions community subgraphs for a specific category at each updated timestamp. Then, DSNGA-CSP achieves intra-community and inter-community anonymization separately to retain more of the community structure of the original graph at each timestamp. It anonymizes community subgraphs by the proposed novel -composition method and anonymizes inter-community edges by edge isomorphism. Finally, a novel information loss metric is introduced in DSNGA-CSP to precisely capture the utility of the anonymized graph through original information preservation and anonymous information changes. Extensive experiments conducted on five real-world datasets demonstrate that DSNGA-CSP consistently outperforms existing methods, providing a more effective balance between privacy and utility. Specifically, DSNGA-CSP shows an average utility improvement of approximately 30% compared to TAKG and CTKGA for three dynamic graph datasets, according to the proposed information loss metric IL. 展开更多
关键词 Dynamic social network graph k-composition anonymity community structure protection graph publishing security and privacy
在线阅读 下载PDF
Enhancing agricultural sustainability:Optimizing crop planting structures and spatial layouts within the water-land-energy-economy-environment-food nexus
2
作者 Haowei Wu Zhihui Li +1 位作者 Xiangzheng Deng Zhe Zhao 《Geography and Sustainability》 2025年第3期223-239,共17页
In the new phase of sustainable development,agriculture is seeking sustainable management of the water-land-energy-economy-environment-food nexus.At present,there are few studies on optimizing crop planting structure ... In the new phase of sustainable development,agriculture is seeking sustainable management of the water-land-energy-economy-environment-food nexus.At present,there are few studies on optimizing crop planting structure and analyzing its spatial layout with consideration of natural and socio-economic factors.Herein,we proposed a framework for addressing this issue.In this framework,the NSGA-II algorithm was used to construct the multi-objective optimization model of crop planting structures with consideration of water and energy consumption,greenhouse gas(GHG)emissions,economic benefits,as well as food,land,and water security constraints,while the model for planting spatial layout optimization was established with consideration of crop suitability using the MaxEnt model and the improved Hungarian algorithm.This framework was further applied in the Black Soil Region of Northeast China(BSRNC)for analyzing optimized crop planting structures and spatial layouts of three main crops(rice,maize,and soybean)under various scenarios.This study showed that the sown area of rice in the BSRNC decreased by up to 40.73%and 35.30%in the environmental priority scenario and economic-environmental balance scenario,respectively,whereas that of soybean increased by up to 112.44%and 63.31%,respectively.In the economic priority scenario,the sown area of rice increased by up to 93.98%.Expanding the sown area of soybean was effective in reducing GHG emissions.On the contrary,rice production led to greater environmental costs though it provided higher economic returns.Among the three crops,maize exhibited an advantage in balancing environmental and economic benefits.Hegang-Jixi area in the northeast of the BSRNC was identified as the key area with the most intense crop planting transfer among different scenarios.Overall,this framework provides a new methodology for optimizing crop planting structures and spatial layouts with con-sideration of the nexus of various factors.Moreover,the case study demonstrates the applicability and expansion potential of the framework in the fields of sustainable agricultural development and food security assurance. 展开更多
关键词 Planting structure optimization Crop spatial layout Multi-objective genetic algorithm Food security Agricultural sustainability Water-land-energy-economy-environment-food nexus
在线阅读 下载PDF
Legal Research on the Protection of the Rights and Interests of Small and Medium-sized Shareholders: Based on the Response of Two-Tier Shareholding Structure
3
作者 Yuji Lin 《Proceedings of Business and Economic Studies》 2025年第3期153-159,共7页
The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier sharehol... The two-tier shareholding structure,which originated in the United States,has become popular around the world.Unlike the traditional model of“equal shares with equal rights”,the core feature of the two-tier shareholding structure is that the company issues two classes of shares with different voting rights.It enables the concentration and stabilization of corporate control,which has a positive effect on the long-term development of the company and resistance to hostile takeovers.Against the background of the rapid development of the capital market and the continuous innovation of corporate governance structure,the two-tier shareholding structure has begun to be adopted by many enterprises.While this structure can improve the efficiency of corporate governance and promote corporate growth,it also raises a number of challenges.In particular,for small and medium-sized shareholders,their shareholdings may face the problem of limited or no voting rights,as well as the lack of an effective internal and external monitoring mechanism for the company.These issues may lead to the impairment of the rights of small and medium-sized shareholders.Currently,challenges in practice include inadequate laws and regulations,insufficient disclosure of information,and inadequate monitoring mechanisms.Therefore,exploring the path to protect the rights and interests of small and medium-sized shareholders and analyzing their current situation has become an important area in the study of two-tier shareholding structures.This paper starts from the actual situation,analyzes the problems exposed in the operation process of two-tier shareholding structure,and then explores the practical and feasible methods to protect the rights and interests of small and medium-sized shareholders on this basis,with a view to putting forward valuable references for the development of China’s securities market. 展开更多
关键词 Two-tier shareholding structure Small and medium-sized shareholders Rights and interests protection securities law Sunset clause Information disclosure
暂未订购
Trust Model Based on Structured Protection for High Level Security System 被引量:1
4
作者 Liao Jianhua Zhao Yong Zhan Jing 《China Communications》 SCIE CSCD 2012年第11期70-77,共8页
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured protection is proposed. We consider that functional components, system actions and message flows between components are three key factors of information systems. Structured protection requirements on components, connections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theorem of trusted system behavior is proved. The developed prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 展开更多
关键词 trusted computing security assurance structured protection
在线阅读 下载PDF
Research on Occurrence Mechanism of Public Security Emergency from the perspective of the Structure Box
5
作者 Jian Lin Bo Kang 《International Journal of Technology Management》 2016年第9期1-6,共6页
Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis... Public security emergency is a public crisis event, and we cannot anticipate the specific time, actual scale, specific situation and influence depth of emergencies. If the emergencies are not under control, the crisis will get worse and its destructive energy will be released quickly.Structure box is an invisible closed system which is constructed by local politics, economy, and culture. Namely, structure box is local social ecological environment. Structure box is a closed area which is full of anger. Therefore, in such environment with too much pressure, we need an outlet to release pressure. Anger is the social and psychological basis of the emotional resonance of onlooker, when the fuse incident occurred, so that the widespread anger in structure box will find the spotlight. The words and actions of the leaders in the informal group will produce a great social infection and circulatory response, and groups’ stirring will cause emotional resonance which is easy to burst. Thus, irrational behavior may caused by people. This processcan use five links to describe: occurrence of fuse events, information diffusion, emotional resonance, situational catalysis, control failure, and occurrence of public security emergency. This is the occurrence mechanism of public security emergency. 展开更多
关键词 Public security emergency structure box Emotional resonance Resonance effect Supporting network
在线阅读 下载PDF
Cost analysis of radical resection of malignant breast tumors under the China Healthcare Security Diagnosis Related Groups payment system 被引量:1
6
作者 Yun-He Hu Ai-Dong Li 《World Journal of Clinical Cases》 SCIE 2024年第20期4174-4179,共6页
BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hosp... BACKGROUND Breast cancer is one of the most common malignant tumors in women worldwide and poses a severe threat to their health.Therefore,this study examined patients who underwent breast cancer surgery,analyzed hospitalization costs and structure,and explored the impact of China Healthcare Security Diagnosis Related Groups(CHS-DRG)management on patient costs.It aimed to provide medical institutions with ways to reduce costs,optimize cost structures,reduce patient burden,and improve service efficiency.AIM To study the CHS-DRG payment system’s impact on breast cancer surgery costs.METHODS Using the CHS-DRG(version 1.1)grouping criteria,4073 patients,who underwent the radical resection of breast malignant tumors from January to December 2023,were included in the JA29 group;1028 patients were part of the CHS-DRG payment system,unlike the rest.Through an independent sample t-test,the length of hospital stay as well as total hospitalization,medicine and consumables,medical,nursing,medical technology,and management expenses were compared.Pearson’s correlation coefficient was used to test the cost correlation.RESULTS In terms of hospitalization expenses,patients in the CHS-DRG payment group had lower medical,nursing,and management expenses than those in the diagnosis-related group(DRG)non-payment group.For patients in the DRG payment group,the factors affecting the total hospitalization cost,in descending order of relevance,were medicine and consumable costs,consumable costs,medicine costs,medical costs,medical technology costs,management costs,nursing costs,and length of hospital stay.For patients in the DRG nonpayment group,the factors affecting the total hospitalization expenses in descending order of relevance were medicines and consumable expenses,consumable expenses,medical technology expenses,the cost of medicines,medical expenses,nursing expenses,length of hospital stay,and management expenses.CONCLUSION The CHS-DRG system can help control and reduce unnecessary medical expenses by controlling medicine costs,medical consumable costs,and the length of hospital stay while ensuring medical safety. 展开更多
关键词 China Healthcare security Diagnosis Related Groups Real-world study Radical resection of malignant breast tumors Hospitalization costs Cost structure Average length of stay
暂未订购
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
7
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
Surgical treatment of liver cancer and pancreatic cancer under the China Healthcare Security Diagnosis Related Groups payment system
8
作者 Yun-He Hu Fan Yu +1 位作者 Yu-Zhuo Zhou Ai-Dong Li 《World Journal of Clinical Cases》 SCIE 2024年第21期4673-4679,共7页
BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers account... BACKGROUND Data from the World Health Organization’s International Agency for Research on Cancer reported that China had the highest prevalence of cancer and cancer deaths in 2022.Liver and pancreatic cancers accounted for the highest number of new cases.Real-world data(RWD)is now widely preferred to traditional clinical trials in various fields of medicine and healthcare,as the traditional research approach often involves highly selected populations and interventions and controls that are strictly regulated.Additionally,research results from the RWD match global reality better than those from traditional clinical trials.AIM To analyze the cost disparity between surgical treatments for liver and pancreatic cancer under various factors.METHODS This study analyzed RWD 1137 cases within the HB1 group(patients who underwent pancreatectomy,hepatectomy,and/or shunt surgery)in 2023.It distinguished different expenditure categories,including medical,nursing,technical,management,drug,and consumable costs.Additionally,it assessed the contribution of each expenditure category to total hospital costs and performed cross-group comparisons using the non-parametric Kruskal–Wallis test.This study used the Steel–Dwass test for post-hoc multiple comparisons and the Spearman correlation coefficient to examine the relationships between variables.RESULTS The study found that in HB11 and HB13,the total hospitalization costs were significantly higher for pancreaticoduodenectomy than for pancreatectomy and hepatectomy.Although no significant difference was observed in the length of hospital stay between patients who underwent pancreaticoduodenectomy and pancreatectomy,both were significantly longer than those who underwent liver resection.In HB15,no significant difference was observed in the total cost of hospitalization between pancreaticoduodenectomy and pancreatectomy;however,both were significantly higher than those in hepatectomy.Additionally,the length of hospital stay was significantly longer for patients who underwent pancreaticoduodenectomy than for those who underwent pancreatectomy or liver resection.CONCLUSION China Healthcare Security Diagnosis Related Groups payment system positively impacts liver and pancreatic cancer surgeries by improving medical quality and controlling costs.Further research could refine this grouping system and ensure continuous effectiveness and sustainability. 展开更多
关键词 China health care security diagnosis-related groups Real-world study Liver cancer surgical treatment Pancreatic cancer surgical treatment Hospitalization costs Cost structure Average length of stay
暂未订购
嵌套SP网络的New-Structure系列结构的零相关线性逼近与不可能差分性质研究 被引量:3
9
作者 付立仕 崔霆 金晨辉 《电子学报》 EI CAS CSCD 北大核心 2017年第6期1367-1374,共8页
分组密码的安全性分析是密码学的重要研究内容,其中不可能差分分析和零相关线性分析是密码算法安全性分析的重要方法.本文利用中间相错方法,通过对扩散层进行限制,给出了嵌套SP网络的New-Structure系列结构的零相关线性逼近.给出了New-S... 分组密码的安全性分析是密码学的重要研究内容,其中不可能差分分析和零相关线性分析是密码算法安全性分析的重要方法.本文利用中间相错方法,通过对扩散层进行限制,给出了嵌套SP网络的New-Structure系列结构的零相关线性逼近.给出了New-Structure I和New-Structure IV结构中概率非零的差分传递链和相关优势非零的线性逼近传递链在结构上的一致性.此外也给出了嵌套SP网络New-Structure I、III的16/22轮不可能差分特征.最后给出在分组规模和密钥规模均为128比特时,对New-Structure I,III,IV进行21/28/22轮的不可能差分攻击和19/28/22轮的多维零相关线性逼近攻击所需要的时间复杂度和数据复杂度.本文的结果对基于New-Structure结构设计的密码算法的安全性分析提供了理论依据. 展开更多
关键词 信息安全 不可能差分分析 零相关线性分析 New-structure系列
在线阅读 下载PDF
Agricultural Production Structure Optimization: A Case Study of Major Grain Producing Areas, China 被引量:5
10
作者 LU Sha-sha LIU Yan-sui +1 位作者 LONG Hua-lou GUAN Xing-liang 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2013年第1期184-197,共14页
A large number of mathematical models were developed for supporting agricultural production structure optimization decisions; however, few of them can address various uncertainties existing in many factors (e.g., eco... A large number of mathematical models were developed for supporting agricultural production structure optimization decisions; however, few of them can address various uncertainties existing in many factors (e.g., eco-social benefit maximization, food security, employment stability and ecosystem balance). In this study, an interval-probabilistic agricultural production structure optimization model (IPAPSOM) is formulated for tackling uncertainty presented as discrete intervals and/or probability distribution. The developed model improves upon the existing probabilistic programming and inexact optimization approaches. The IPAPSOM considers not only food security policy constraints, but also involves rural households’income increase and eco-environmental conversation, which can effectively reflect various interrelations among different aspects in an agricultural production structure optimization system. Moreover, it can also help examine the reliability of satisfying (or risk of violating) system constraints under uncertainty. The model is applied to a real case of long-term agricultural production structure optimization in Dancheng County, which is located in Henan Province of Central China as one of the major grain producing areas. Interval solutions associated with different risk levels of constraint violation are obtained. The results are useful for generating a range of decision alternatives under various system benefit conditions, and thus helping decision makers to identify the desired agricultural production structure optimization strategy under uncertainty. 展开更多
关键词 major grain producing areas agricultural production structure optimization interval-probabilistic programming food security farmers’income increase China
在线阅读 下载PDF
Structured Equation Model of Tuberculosis Incidence Based on Its Social Determinants and Risk Factors in Bandar Lampung, Indonesia 被引量:1
11
作者 Dyah Wulan Sumekar Rengganis Wardani Lutfan Lazuardi +1 位作者 Yodi Mahendradhata Hari Kusnanto 《Open Journal of Epidemiology》 2014年第2期76-83,共8页
World Health Organization through tuberculosis (TB) control averted up to six million deaths and cured thirty-six million people in 1995-2008, but had less success in reducing TB incidence, especially in thirteen high... World Health Organization through tuberculosis (TB) control averted up to six million deaths and cured thirty-six million people in 1995-2008, but had less success in reducing TB incidence, especially in thirteen high burden countries, including Indonesia. Therefore, TB control will need to have more emphasis on the issues of social determinants, as social determinants affect TB’s incidence directly and/-or through TB’s risk factors. This study aimed to identify a significant effect of social determinants and the risk factors of TB incidence. The research setting was at twenty-seven primary health centers and one hospital that have implemented the Directly Observed Treatment Short Course (DOTS) strategy in Bandar Lampung municipality, Indonesia. Respondents of this research were 238 smear-positive TB patients as case group and 238 patients without TB as control group. Research variables consisted of “social determinants”, “housing condition”, “household food security” and “health access” which were set as latent variables and measured through their indicators. Data had been collected by using questionnaire and then was analyzed with Structural Equation Modeling using SmartPLS 2.0 software. The result showed that “social determinants” through “housing condition” and “household food security” affected “TB incidence”. Moreover, “social determinants”, “housing condition” and “household food security” can be used to explain 34.1% variation of “TB incidence”. In conclusion, the knowledge can be used to support the TB control program, particularly to implement the DOTS strategy together with improving social determinants, housing condition and household food security. 展开更多
关键词 SOCIAL Determinants HOUSING Condition HOUSEHOLD Food security TB INCIDENCE structural Equation Modeling
暂未订购
Identity-Based Threshold Decryption on Access Structure
12
作者 秦华旺 朱晓华 戴跃伟 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期485-489,共5页
For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig... For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible. 展开更多
关键词 threshold decryption access structure IDENTITY CRYPTOGRAPHY information security
原文传递
Investigations on Simultaneously Secure IBE Scheme and Security Proofs under RO and Non-RO Model
13
作者 Zhengtao JIANG Yongbin WANG +1 位作者 Yong WANG Yumin WANG 《Intelligent Information Management》 2009年第1期6-13,共8页
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper an... This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR. 展开更多
关键词 3G security 3G security structure 3G AUTHENTICATION and key AGREEMENT protocol security arith- metic
在线阅读 下载PDF
The Analysis and Amendment of Security System in 3G
14
作者 Min ZHAO Ling SHI 《Intelligent Information Management》 2009年第1期1-5,共5页
This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper an... This paper analyses security mechanism and authentication, key agreement protocol of 3G system amply, puts forward a amelioration scheme. This scheme assures security communications without credible VLR. This paper analyses ameliorative protocol and resolves the security communications problem between MS and HLR. 展开更多
关键词 3G security 3G security structure 3G AUTHENTICATION and key AGREEMENT protocol security arith- metic
在线阅读 下载PDF
Structured Query Language Injection Penetration Test Case Generation Based on Formal Description
15
作者 韩明 苗长云 《Journal of Donghua University(English Edition)》 EI CAS 2015年第3期446-452,共7页
Aiming to improve the Structured Query Language( SQL) injection penetration test accuracy through the formalismguided test case generation,an attack purpose based attack tree model of SQL injection is proposed,and the... Aiming to improve the Structured Query Language( SQL) injection penetration test accuracy through the formalismguided test case generation,an attack purpose based attack tree model of SQL injection is proposed,and then under the guidance of this model, the formal descriptions for the SQL injection vulnerability feature and SQL injection attack inputs are established. Moreover,according to new coverage criteria,these models are instantiated and the executable test cases are generated.Experiments show that compared with the random enumerated test case used in other works,the test case generated by our method can detect the SQL injection vulnerability more effectively. Therefore,the false negative is reduced and the test accuracy is improved. 展开更多
关键词 software security penetration test web application structured query language(SQL) injection test case
在线阅读 下载PDF
Overview of Studies on Grain Security in China 被引量:1
16
作者 Shuhua CAO Weipeng MA Lei NIE 《Asian Agricultural Research》 2014年第4期67-74,共8页
Through overview of relevant literature and on the basis of basically grasping frontier study and development trend,this paper discussed the grain security from industrial structure,farmland protection,grain import,ur... Through overview of relevant literature and on the basis of basically grasping frontier study and development trend,this paper discussed the grain security from industrial structure,farmland protection,grain import,urbanization and industrialization,grain reserve,ecological protection,and grain security pre-warning,in the hope of providing some convenience and reference for future related researches. 展开更多
关键词 GRAIN security FARMLAND PROTECTION INDUSTRIAL stru
在线阅读 下载PDF
A Security Architecture for SCADA Systems
17
作者 Arun Velagapalli Mahalingam Ramkumar 《Journal of Information Security》 2018年第1期100-132,共33页
Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack ... Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack on any system exploits some undesired (malicious or accidental) functionality in the components of the system. Unfortunately, it is far from practical to eliminate undesired functionality in every component of a system. The contribution of this paper is a novel architecture for securing SCADA systems that guarantee that “any malicious modification of the deployment configuration or the design configuration of the SCADA system will be detected”—even if undesired functionality may exist in SCADA system components. 展开更多
关键词 SCADA security: TRUSTED Computing: Authenticated Data structure Critical Infrastructure DCS PCS CYBER security CIP
在线阅读 下载PDF
Study on Architecture-Oriented Information Security Management Model for Using Mobile Devices Control
18
作者 Wei-ming Ma 《Chinese Business Review》 2018年第9期442-464,共23页
The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:th... The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:the lack of accurate use of resources,the lack of protection of the mobile device from the overall point of view,the unclear division of responsibility among specialized agencies,and unclear members’responsibilities for their own duties.This study applies the structure behavior coalescence(SBC)methodology to integrate the organizational structure of the participating management and control units with effective management behaviors in a visualized and useful manner.The units can effectively communicate with each other and solve the four issues faced by the military barrack-areas for the control of mobile devices.This research fulfills improving the lack of control of the military mobile devices by using of management resources effectively and the establishment of mobile devices management with the overall concept,and strengthening the rights and responsibilities and information security awareness,through the logical verification and enterprise interview results. 展开更多
关键词 information security management structure behavior COALESCENCE MOBILE devices MILITARY ARMY
在线阅读 下载PDF
Countermeasure Analysis of Safety in Civil Engineering Structure
19
作者 LIU hao 《外文科技期刊数据库(文摘版)工程技术》 2020年第3期001-003,共5页
With the continuous development of society, the number of civil engineering projects is also increasing with the development of society. Civil engineering safety management is a very important part of it. It is necess... With the continuous development of society, the number of civil engineering projects is also increasing with the development of society. Civil engineering safety management is a very important part of it. It is necessary to have a strong sense of safety management and ensure the structural safety of civil engineering so as to promote the rapid development of China's construction industry more effectively. To civil engineering structure security problems, in fact, is refers to the engineering structural indicators, the indicators including ability to resist collapse and corruption based on the external environment. And the indicators for the civil engineering construction are the core content. The corresponding indexes must be reached to ensure the civil engineering in the construction and in the later use process has no accidents. In the study of this paper, based on the actual situation of the safety of advanced civil construction structures in China, the possible problems in civil engineering design are discussed, and combined with specific investigation and analysis, according to the requirements of relevant indicators and relevant factors, put forward targeted countermeasures and suggestions for improvement. 展开更多
关键词 civil structure structural design security essentials
原文传递
Discussion on Improving Building Safety in Building Structure Design
20
作者 ZHU Haidong 《外文科技期刊数据库(文摘版)工程技术》 2021年第5期245-248,共6页
With the continuous improvement of construction technology and construction level, the current development trend of construction is large-scale and high-rise. Based on this, the reliability requirements for buildings ... With the continuous improvement of construction technology and construction level, the current development trend of construction is large-scale and high-rise. Based on this, the reliability requirements for buildings are becoming higher and higher. There is a great relationship between the reliability in the design of building structures and the safety performance of buildings, so it is very necessary to carry out in-depth analysis and research to ensure the reliability of building structures and improve the safety factor. In this paper, the reliability factors affecting the design of building structures are analyzed and studied, and the influencing factors are optimized for reference by relevant practitioners. 展开更多
关键词 building structure DESIGN security
原文传递
上一页 1 2 103 下一页 到第
使用帮助 返回顶部