首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
随着信息化建设的飞速发展,计算机网络安全成为了关系企业管理和发展的重大问题,如何从技术、管理等方面加强对计算机网络的安全防护,是很多企业面临的重要课题之一,本文结合我国企业网络安全建设的实际,分析了计算机网络安全方面存在的问题,并针对问题提出了具体的解决对策.  相似文献   

2.
VB程序设计作为高等院校理工科的一门基础课程,其理论性和实践性都比较强,本文通过对探究式教学法的概念、教学过程、教学原则的探讨,论述了在VB教学中如何采用探究式教学法来提高教学效果.  相似文献   

3.
运用协方差矩阵和系统聚类法对区域管制扇区复杂性指标间关系进行研究。基于对区域管制扇区结构和流量分布特征的分析,构建7个复杂性指标。以国内37个区域管制扇区数据为样本,结合可视化协方差矩阵阐明复杂性指标相关性。研究表明,区域各扇区面积相差悬殊(变异系数194.75%),但流量在不同路径的分布均匀程度比较一致(变异系数9.02%);扇区范围越大,往往流量在各路径上的分布越均匀(相关系数0.54~0.59),但扇区流量反而越低(相关系数-0.06~-0.13);以并类距离0.70为界,扇区复杂性指标分为静态和动态两类,且静态指标共性强于动态指标。  相似文献   

4.
随着信息技术的飞速发展,网络在为人们的生活带来越来越多便利的同时,也为医院节省了大量的人力、物力,但是医院在通过网络与外界交流时也存在着巨大的安全风险.本文主要介绍了医院在实际操作中存在各种网络风险的原因以及提出一些相应的对策.希望能为医院在网络安全方面提供了一些帮助.  相似文献   

5.
术语Ajax(异步Java Script与可扩展标记语言)用来描述一组技术,它使浏览器可以为用户提供更为自然的浏览体验。本文分析了Ajax应用程序的主要安全隐患,通过几个例子,介绍安全隐患所带来的攻击类型,以及如何采取措施防范安全隐患。  相似文献   

6.
笔者首先分析了计算机网络安全风险,其次探讨了计算机网络教学中存在的问题,最后针对这些问题提出了科学化的解决策略,核心目的是提高计算机网络教学的整体质量,满足现代化的教学需求。而且,在网络安全风险防范中,可以提高信息整合的价值,优化教学目标。  相似文献   

7.
With the growing popularity of competitive intelligence, few firms consider the opposite side of data collection — defensive intelligence (DI). This viewpoint article addresses the reasons for information compromise and lack of control measures in organizations. Specific sources of vulnerability to counter intelligence are outlined and ways to secure operations are presented. Finally strategies for employing proactive measures for DI are suggested as a way to ensure the long-term prosperity of an organization.  相似文献   

8.
互联网与信息安全随着互联网的发展与普及越来越受各国的重视,特别是在2013年棱镜门事件的逐步发酵与升级,使得各国已经对互联网信息安全的关注程度上升到国家安全的高度。无论是软件的,或者硬件的漏洞,还是由于设计和实施上的错误,或是使用者的不小心都有可能对信息安全造成不必要的影响。  相似文献   

9.
21世纪是信息的时代,随着计算机的发展和普及,计算机信息网络技术作为一门重要的科技手段已经深入影响到人们和社会生活发展的众多领域,它是一把双刃剑,在给现代生活发展带来便利的同时,也暴漏了许多弊端,其中,计算机网络安全问题尤为突出。本文从计算机网络安全的含义特征出发,了解我国信息网络安全现状,从而提出具体的加强网络安全的措施,深入体会安全的网络环境对于信息社会的发展意义。  相似文献   

10.
高校数字图书馆是学校的无形资产,价值昂贵,因此其安全性尤为重要.本文杉树了高校数字图书馆网络结构的特征,进而指出其中存在的安全隐患和威胁,在此基础上提出了相应的防范策略.  相似文献   

11.
As soil heavy metal pollution is increasing year by year, the risk assessment of soil heavy metal pollution is gradually gaining attention. Soil heavy metal datasets are usually imbalanced datasets in which most of the samples are safe samples that are not contaminated with heavy metals. Random Forest (RF) has strong generalization ability and is not easy to overfit. In this paper, we improve the Bagging algorithm and simple voting method of RF. A W-RF algorithm based on adaptive Bagging and weighted voting is proposed to improve the classification performance of RF on imbalanced datasets. Adaptive Bagging enables trees in RF to learn information from the positive samples, and weighted voting method enables trees with superior performance to have higher voting weights. Experiments were conducted using G-mean, recall and F1-score to set weights, and the results obtained were better than RF. Risk assessment experiments were conducted using W-RF on the heavy metal dataset from agricultural fields around Wuhan. The experimental results show that the RW-RF algorithm, which use recall to calculate the classifier weights, has the best classification performance. At the end of this paper, we optimized the hyperparameters of the RW-RF algorithm by a Bayesian optimization algorithm. We use G-mean as the objective function to obtain the optimal hyperparameter combination within the number of iterations.  相似文献   

12.
Abstract

Genetic algorithms are powerful generalized search techniques. This paper shows that genetic algorithms can solve a difficult class of problems in general systems theory quickly and efficiently. Genetic algorithms appear to be ideally suited to solving the combinatorially complex problem of behavior analysis. The search space of behavior analysis experiences exponential growth as a function of the number of variables. The genetic algorithm converges after considering a small percentage of these potential solutions. The number of solutions that need to be examined by the genetic algorithm seems to be a polynomial function of the number of variables and, in fact, the growth appears to be linear  相似文献   

13.
局域网安全隐患及防范策略探析   总被引:1,自引:0,他引:1  
本文就局域网系统中经出现的一些典型破坏性攻击为依据,对局域网数据安全,在漏洞预防、攻击处理、破坏修复三方面提供整体解决方案.  相似文献   

14.
环境试验是保证海军舰船装备可靠性的重要手段。简要分析舰船装备环境试验存在需求沟通、计划编制、试验标准、人员、试验大纲设计和试验设备等六大类风险,以及应对以上风险的管理、技术和道德三个方面的预防和应对措施。  相似文献   

15.
针对变电站内接地线操作存在安全隐患的问题,提出了一种动态地线的解决方案.  相似文献   

16.
Ecological Politics in an Age of Risk, Ulrich Beck, Polity Press, Cambridge (1995), 216 pp. EcoPopulism: Toxic Waste and the Movement for Environmental Justice, Andrew Szasz, University of Minnesota Press, Minneapolis (1994), 216 pp. Toxic Debts and the Superfund Dilemma, Harold Barnett, University of North Carolina Press, Chapel Hill (1994), 334 pp. Beyond Superfailure: America's Toxics Policy for the 1990s, Daniel Mazmanian and David Morell, Westview Press, Boulder (1992), 278 pp.  相似文献   

17.
随着信息技术的普及和推进,医院信息化建设为医院的整体运行提供了全面、自动化的服务,提升了医院的整体管理水平。但是,与此同时,医院信息系统的安全性也凸显重要。本文针对当前医院信息化的建设,分析了系统面临的各种风险,并且提出了相应的措施。  相似文献   

18.
近年来,随着我国科技水平的不断提升,计算机信息技术在各行各业得到了广泛应用,提升工作效率的同时,伴随一定应用风险。现阶段,如何有效提高信息化技术的应用水平,加强计算机信息化技术应用的风险控制,已成为当今社会广泛关注的首要课题,受到了人们的高度重视。基于此,主要针对计算机信息化应用及风险防控措施展开探讨,希望为日后的相关研究提供帮助。  相似文献   

19.
在当前我国科学技术水平快速发展的环境下,计算机信息技术也也得到广泛应用,对提升企业工作效率和质量有极大的帮助,但同时也会带来一定的风险问题。在此背景下,笔者主要针对计算机信息化技术的应用进行研究,并结合存在的风险问题提出了相应的防控策略,希望通过此次理论研究能够为相关研究提供一定的借鉴。  相似文献   

20.
Corporate recruitment efforts have evolved from traditional newspaper want ads to highly sophisticated, rhetorically powerful recruiting Web sites or "career sites." This e-cruiting phenomenon offers a unique opportunity not only to examine organizations' persuasive attempts to recruit potential applicants online, but also to uncover contemporary corporate representations of the meaning(s) of work. Using a random sample of recruitment Web sites of Fortune 500 companies, we employ content analysis and rhetorical criticism to catalogue content types, identify persuasive structure, and analyze rhetorical themes in representations of work. The investigation reveals that career sites are not merely places to post job openings, but reflect corporations' attempt to sell a glorified image of work, one which positions workers as powerful actors and employers as kind benefactors. In view of current reports on working conditions, we argue these glorified representations reflect a rhetoric of idealization and discuss potential consequences of such a strategy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号