共查询到20条相似文献,搜索用时 62 毫秒
1.
工业工程理论与方法在医疗健康管理领域的应用贯穿于医院设施规划、医疗流程优化、医疗资源管理和疾病诊断等各个环节,为医疗服务改进和效率提升提供了有力支撑。随着物联网、云计算、大数据和人工智能等新一代信息技术的发展,工业工程理论与方法在医疗健康管理领域的应用也发生了改变。本文基于2014~2023年医疗健康管理文献中的4个热门话题——全生命周期健康管理、医疗资源调度与优化、医院运营管理和医疗物流及供应链管理,回顾工业工程关键技术在相关话题中的应用;归纳和分析新一代信息技术在医疗健康管理领域中的应用创新,阐明数智时代下工业工程理论与方法在医疗健康管理领域的技术赋能和管理赋能;对数智时代下工业工程理论与方法在医疗健康管理信息化、精细化和智能化等方面的应用前景进行展望。 相似文献
2.
本书为由上海汽车工业教育基金会组编,并与上海交通大学出版社、工业工程与管理系共同策划编辑、出版的"工业工程系列教材"之一。近40年来模糊理论发展极其迅速,而模糊技术也极其广泛地应用到多种多样的领域。工业工程与管理是模糊技术应用的重要领域,在这方面的论文非常多,但是尚无这方面的专著和教材。本书就是为工业工程与管理专业的研究生和高年级本科生在这方面的需求而编写的。 相似文献
3.
4.
论新时期工业工程学科发展 总被引:1,自引:0,他引:1
在简要回顾工业工程发展历史基础上,得出若干启示;分析了工业工程面临的机遇和挑战,提出工业工程学科十个方面的变革切入点;从传统工业工程学科内容、技术与工具和应用对象3个维度提出了工业工程学科内容拓扑结构,据此可以组合与交叉形成新的不同的工业工程学科内容或方向。 相似文献
5.
本书为由上海汽车工业教育基金会组编,并与上海交通大学出版社、工业工程与管理系共同策划编辑、出版的“工业工程系列教材”之一。近40年来模糊理论发展极其迅速,而模糊技术也极其广泛地应用到多种多样的领域。工业工程与管理是模糊技术应用的重要领域,在这方面的论文非常多,但是尚无这方面的专著和教材。 相似文献
6.
7.
目的 随着信息技术的发展,数字化、智能化的工业系统在企业生产安全、生产效率、节约成本等方面发挥着巨大作用.作为复杂信息的载体,工业信息图符在智能化产线控制系统中起着重要作用,符合视觉认知规律的工业信息图符设计可提高信息搜索的效率和准确度.方法 通过文献搜集和整理,分析视觉认知视角下工业信息图符可视化研究进展,从视觉认知理论和工业信息图符研究入手,阐述相关研究成果.结论 总结了国内外视觉认知与工业信息图符的研究现状;从感知特性、感知模型、感知技术三方面分析了视觉认知研究进展及方向;从模式识别、模版匹配、特征分析、原型匹配四个维度探究了操作员视觉搜索机制;从图符语义、图符定义与分类、图符设计原则、图符设计评价四个维度进行了相关研究;研究了工业信息图符语义与实体的关联性;从视觉标记机制出发,提出了从信息特征、语义范畴和空间布局三个层面探讨工业信息图符设计的合理性与必要性. 相似文献
8.
目的分析脑电(EEG)领域研究现状,为工业设计领域学者提供系统认知,并预测其未来发展趋势,为该领域的后续研究提供方向。方法采用大数据分析方法,选取CNKI数据库作为数据来源,对国内外相关论文数据进行分类和分析,从文献年度分布、研究层次分布、关键词分布3个角度进行分析,得出脑电在工业设计领域的研究现状,发现EEG在工业设计领域中的应用主要有感性工学、产品评价、交互设计和设计应用4个研究方向。结论对感性工学、产品评价、交互设计和设计应用4个主要方面进行深入分析,深入了解EEG在各个方面的研究发展现状和主要学者的文献,在此基础上提出了目前EEG研究存在的不足以及未来的研究趋势,为EEG在工业设计领域中的研究指出了方向。 相似文献
9.
10.
11.
12.
S.‐T. Ung S. Bonsall V. Williams A. Wall J. Wang 《Quality and Reliability Engineering International》2007,23(5):631-639
Greater heed has been paid to the matter of maritime security since the tragedy in the U.S.A. on 11 September 2001. A number of measures have been put into practice by ports to enhance security. More regulations and measures sometimes imply an increased probability of influencing port operations. Thus, the quality of the port security process regulated by measures is becoming essential. In this paper, the quality control in the port security process is demonstrated using the Six Sigma concept. It is concluded that it is crucial to distinguish each step of a security process clearly from the outset, furthermore, gathering quantitative data at each stage is the first priority. Copyright © 2007 John Wiley & Sons, Ltd. 相似文献
13.
The rapid evolution of computing and communication technologies and their standardizations have made the boom in e-commerce
possible. Lowering of the cost of operation, increase in the speed of transactions, and easy global reach to customers and
vendors have been the reasons for the overwhelming popularity of this new way of commerce. This article examines the issues
related to the security of the assets and transactions in the e-commerce components and activities. Since large public money
is involved in the transactions, the role of information security and privacy is not exaggerated in this kind of business.
After examining the technologies used in e-commerce, the article goes on to identify the security requirement of e-commerce
systems from perceived threats and vulnerabilities. Then e-commerce security is viewed as an engineering management problem
and a life cycle approach is put forward. How the e-commerce systems can be made secure using the life cycle approach is outlined.
The relevant standards and laws are also discussed in the perspective of e-commerce. The article closes with some future research
directions and conclusions. 相似文献
14.
15.
16.
17.
The domain name system (DNS) provides a mapping service between
memorable names and numerical internet protocol addresses, and it is a critical
infrastructure of the Internet. The authenticity of DNS resolution results is crucial for
ensuring the accessibility of Internet services. Hundreds of supplementary specifications
of protocols have been proposed to compensate for the security flaws of DNS. However,
DNS security incidents still occur frequently. Although DNS is a distributed system, for a
specified domain name, only authorized authoritative servers can resolve it. Other servers
must obtain the resolution result through a recursive or iterative resolving procedure,
which renders DNS vulnerable to various attacks, such as DNS cache poisoning and
distributed denial of service (DDoS) attacks. This paper proposes a novel decentralized
architecture for a DNS data plane, which is called Blockzone. First, Blockzone utilizes
novel mechanisms, which include on-chain authorization and off-chain storage, to
implement a decentralized and trustworthy DNS data plane. Second, in contrast to the
hierarchical authentication and recursive query of traditional DNS, Blockzone
implements a decentralized operation model. This model significantly increases the
efficiency of domain name resolution and verification and enhances the security of DNS
against DDoS and cache poisoning attacks. In addition, Blockzone is fully compatible
with the traditional DNS implementation and can be incrementally deployed as a plug-in
service of DNS without changing the DNS protocol or system architecture. The
Blockzone scheme can also be generalized to address security issues in other areas, such
as the Internet of things and edge computing. 相似文献
18.
19.
Government agencies and standard setters require organizations operating in critical infrastructure sectors to disclose cybersecurity incidents, yet little is known about whether organizations report these incidents to law enforcement. This study examines this issue based on data from the 2017–2021 periods of the Canadian Survey of Cybersecurity and Cybercrime administered to Canadian organizations. We assessed the effects of governance determinants along with cyber incidents and their impacts using partial least squares equation modelling to identify the relationships between these factors and cybersecurity incidents reported to police services. To conceptualize these relationships, we developed a framework based on resource-dependence theory, protection motivation theory, and previous empirical evidence. The overall governance determinants as well as the impacts of the incidents explained 51% of the intention to report cybersecurity incidents to police, and the intensity of the impacts explained 30% of these intentions to signal incidents to law enforcement. The results also revealed that the intensity of cyber incident impacts dictates the attitudes of organizations towards reporting digital attacks. This study makes a significant theoretical contribution to the information security literature and has practical implications for standard setters and government agencies that aim to combat cybersecurity incidents. 相似文献