共查询到20条相似文献,搜索用时 265 毫秒
1.
网络现代化发展的迅速,使得视频监控系统也更加地网络化、高清化.尤其是一些智慧型的城市中,以及一些平安城市,都高度重视安防系统的建设,得到了深度挖掘和利用.大量监控系统的使用率加大了监控系统中的数据存储性、存储容量扩展性、以及系统的稳定性、综合管理都提高了要求.云存储技术可以利用云计算、以及虚拟化等一些核心技术实现了大容量的数据存储规模,起到降低成本,减少资源浪费等. 相似文献
2.
信息化背景下,传统教育的数字化改造催生了智慧校园体系,形成一体化教学、智能校园管理的模式。在高校招生人数持续增长的过程中,高校收费管理系统的信息化升级同样成为智慧校园建设的重要内容。本文对XH大学智慧校园建设过程中收费管理大数据的运用和存在的问题进行分析研究,并提出利用大数据技术创新高校收费管理的可行对策。通过研究发现,高校收费管理大数据存在数据处理能力不足、数据分析水平低下、数据转化能力缺乏等具体问题。在智慧校园建设的大背景下,高校需要夯实大数据设施基础,同时重视数据共享和资源整合,并提高财务人员素质,促进高校收费大数据分析与共享,以不断提升高校智慧财务管理水平。 相似文献
3.
我国平安城市监控系统建设日趋普及,但遗留系统各自为重,集成改造困难。本文针对具体的平安城市案例在设计和集成中所遇到的关键问题和技术进行了讨论,详细介绍了该“平安城市”系统构建的总体原则,提出了设备编码标准,设计多级矩阵透明切换算法和网络安全框架,整合了遗留系统资源,最后,成功的构建了一个兼容性广、安全性强、透明度高、易用度好的平安城市监控平台。 相似文献
4.
技术成熟、功能完善、同时,质量可靠的校园数字监控系统对于学校安全管理工作具有着重要意义。本文通过对监控系统的总体目标及原则介绍,对校园数字监控系统进行设计与研究,拟为现实工作中学校开展校园数字监控系统建设提供有帮助的参考。 相似文献
5.
6.
决策支持系统作为高可靠性的在线系统,需要加强技术手段实时管理、控制整个系统的运行。本文提出了一种决策支持系统的统一监控方法,将整个决策支持系统的维护点集中、维护流程封装,进行集中监控、维护及管理,确保整个系统的稳定性和可监控管理性。该监控方法具有高效、实时和安全性等优点。 相似文献
7.
基于SNMP协议的Cacti网络监控软件能够较好地满足校园网络运行设备监控的需求,既加强了网络监管力度,节省了开支,也为提高了校园网络运行设备故障诊断、处理效率,增强了校园网络的稳定性。 相似文献
8.
9.
本文从机制健全、依法治校、资金投入、宣传教育、队伍建设、隐患整改等六个方面总结平安校园建设经验,并从保卫工作立法、构建治安防控体系和建设智慧安防平台等三个方面提出平安校园建设的新设想。 相似文献
10.
如今各个校园都建立了自己视频监控系统,监控所产生的数据是非常大的,文章就如何将信息生命周期管理策略应用到视频监控系统提出了自己的看法。 相似文献
11.
12.
13.
《Business Horizons》2016,59(6):605-614
Business use of cloud computing services is motivated by ease of use and potential financial cost reductions. Service failure may occur when the service provider does not protect information or when the use of the services becomes overly complex and difficult. The benefits of cloud computing also bring optimization challenges for the information owners who must assess service security risks and the degree to which new human behaviors are required. In this research, we look at the risk of identity theft when ease of service access is provided through a single sign-on (SSO) authorization, asking: What are the optimal behavioral expectations for a cloud service information owner? Federated identity management provides well-developed design literature on strategies for optimizing human behaviors in relation to the new technologies. We briefly review the literature and then propose a working solution that optimizes the trade-off between disclosure risk, human user risk, and service security. 相似文献
14.
针对现有远程抄表系统的不足,结合计算机及通信领域的最新科技成果,提出了一种基于LoRa(Long Range)和GPRS(General Packet Radio Service)相结合的网络化远程抄表系统。其无线智能燃气表终端采用超低功耗微处理器MSP430进行智能化设计,完成气表数据采集与处理;采用LoRa技术进行测控组网;集中器和管理中心通过GPRS无线通信网络实现数据的远程交互。最后,给出了抄表系统的可靠性解决方案。实验结果表明,该系统比传统的远程抄表系统能耗低,且更快捷、可靠、方便,可广泛应用于无线远程抄表领域。 相似文献
15.
I. T. Hawryszkiewycz 《Journal of Organizational Computing & Electronic Commerce》2014,24(2-3):174-185
This paper describes how to design systems that support large scale collaboration between enterprises on the cloud. To do this, the paper proposes an innovative modeling method for large scale collaboration. The modeling method identifies the collaborative spaces in the collaboration and describes ways to support the collaboration in cloud environments, including defining knowledge flows across system boundaries.The modeling focuses on the ability to deploy the cloud to quickly create collaborative environments. Common access to the cloud makes it an enhancer of collaboration, especially across large business networks such as outsourcing or co-design and to support the agility needed in such collaboration. The paper proposes that cloud provides an advantage where it can foster the collaboration needed to maintain sustainable communities and defines the support needed from the cloud for collaboration. This is particularly relevant to smart cities and the greater emphasis on the Internet of things. 相似文献
16.
信息时代技术飞速发展,人类需要更强大的信息处理能力,云计算技术应运而生同时迅速流行,与之相辅相威的云存储也得到了广泛的关注和支持。但云存储自身的数据安全问题阻碍其推广应用,成为制约云存储发展的首要问题。云存储的安全问题也不仅仅是传统安全能够完全解决的,这其中涉及到一些新的关键技术和管理技术。本文介绍了云存储的相关概念及优势所在,揭示了其脆弱的安全性,并对云存储安全中的数据加密存储与检索、密文访问控制等关键技术进行了分析,最后提出了一些提高安全性的措施。 相似文献
17.
18.
Emi Moriuchi 《心理学和销售学》2023,40(1):169-189
Voice conversation agents (VCAs) have moved beyond simple tasks such as information gathering. The integration of VCAs in smart technologies for security has grown in the consumer market. This paper investigates consumers' motivation to use smart technologies controlled by voice conversational agents and how that impacts their perceived hedonic and utilitarian value, which eventually leads to their satisfaction with smart technologies usage. Two cross-sectional studies and a netnography were conducted. The findings showed that the variables measuring technology acceptance mediate the relationship between consumers' motivation and the perceived value of the VCA-controlled smart technologies. Study 1 results show that ease of use and usefulness of the VCA-controlled smart technologies have a more substantial mediating effect between motivation and hedonic value than utilitarian value. For study 2, results show that the mediators had a stronger influence on hedonic and utilitarian values for outdoor voice conversational agent-controlled smart technologies than indoor smart technologies. Study 3 showed that smart technologies have both risks and benefits and depend on whether they are being used for themselves or others. The results suggest that marketers need to consider consumer's emphasis on the products' features including its ease of use and usefulness, and strategically complement it with consumers' prevention and promotion focus for each product. 相似文献
19.
20.
邓国家 《安徽商贸职业技术学院学报(社会科学版)》2012,11(4):10-13
作为数字化校园建设的重要组成部分,校园一卡通系统与图书馆集成系统的对接,改变了图书馆的传统管理模式,改善了服务质量,提高了服务效率和管理水平,但仍存在硬件设备安全、软件安全等问题,需从软件维护、硬件管理、权限设置等方面加以解决。 相似文献