Search scope:
排序: Display mode:
Water environment security indicator system for urban water management
Tian HAO, Pengfei DU, Yun GAO
Frontiers of Environmental Science & Engineering 2012, Volume 6, Issue 5, Pages 678-691 doi: 10.1007/s11783-012-0450-7
Keywords: water environment security supervision and management monitoring parameter indicator system Suzhou
Ecological security evaluation of Africa
Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN
Frontiers of Agricultural Science and Engineering 2020, Volume 7, Issue 4, Pages 467-477 doi: 10.15302/J-FASE-2020320
Keywords: Africa ecological security evaluation system PSR model
Research and practice on system engineering management of a mobile payment project
Yongkai ZHOU, Hongfeng CHAI
Frontiers of Engineering Management 2017, Volume 4, Issue 2, Pages 127-137 doi: 10.15302/J-FEM-2017011
Keywords: systems engineering mobile payment engineering management method Mobile QuickPass national information security rapid iteration process financial security coordination and cooperation
Development of Security Protection Technologies for Industrial Control System
Sun Yanbin, Wang Hongyi, Tian Zhihong , Fang Binxing
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 126-136 doi: 10.15302/J-SSCAE-2023.06.008
Industrial control system (ICS) is gradually transitioning from beingand uncontrollable security challenges of ICS.In view of the security challenges, the development ideas are given from the aspects of securityand controllability of ICS and a novel security protection system of ICS, and key tasks and key technologysecurity protection system of ICS based on a self-defense plus guard mode, such that the security
Keywords: industrial control system security protection autonomous and controllable new security-protection
Summarization of Network Security
Li Ying,Shan Xiuming,Ren Yong
Strategic Study of CAE 2004, Volume 6, Issue 1, Pages 10-15
The content of computer network security is discussed in this article Firstly, the concept, systemand structure and model of computer network security are given.
Artificial Intelligence Security in Multiple-Unmanned System Cooperation
Shi Wen, Wang Kaiwen, Yu Chengpu, Sun Jian, Chen Jie
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 82-89 doi: 10.15302/J-SSCAE-2021.03.007
Fusuo ZHANG, Zhenling CUI, Weifeng ZHANG
Frontiers of Agricultural Science and Engineering 2014, Volume 1, Issue 1, Pages 53-61 doi: 10.15302/J-FASE-2014006
Keywords: integrated nutrient management integrated soil-crop system management environmental protection food security
The Current Network Security Situation and Emergency Network Response
Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 83-88 doi: 10.15302/J-SSCAE-2016.06.017
Considering the emergence of recent network security threats, this article presents network securityLearning from the emergency response system in traditional areas in order to improve current emergencytechnical measures becomes an important part of network security.In this paper, the author proposes a multi-linkage elimination method that can mobilize system strengthand protect against network threats based on the system and the mechanism.
Keywords: network security threat information security emergency response emergency system
The Value Added Tax Anti-Fake and Control System and Its Security Design
Wei Qingfu
Strategic Study of CAE 2000, Volume 2, Issue 11, Pages 84-87
The Value Added Tax (AVT) anti-fake and control system, which is one of the main parts of the NationalThe invention and popularization of the system greatly benefit the taxation and government finance.The system has been contributive to the national tax supervision.To obtain high security, the system adopts a systematic security design technique according to the secureand system management.
Keywords: value-added tax anti-fake encryption security
Development of Content Security Based on Artificial Intelligence
Zhu Shiqiang, Wang Yongheng
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 67-74 doi: 10.15302/J-SSCAE-2021.03.004
Content security refers to the protection of information contentThe recent development of artificial intelligence (AI) has had a very important impact on content securityIn this article, we summarize the research status and development trends of AI-based content securityThis study proposes to build the world’s leading AI-based content security system through a three-stepand large-scale social system simulation devices for public opinion attack and defense should be established
Keywords: artificial intelligence (AI),content security,system construction
Theoretical Method and Practice of Giant System for Mineral Resource Security
Chen Qishen, Zhang Yanfei, Xing Jiayun, Long Tao, Zheng Guodong, Wang Kun,Ren Xin, Li Zhenqing, Li Qiang
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 191-201 doi: 10.15302/J-SSCAE-2023.10.001
Keywords: mineral resource security giant system system engineering big data platform
Soil security and global food security
Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530
● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.
Keywords: Agriculture soil security food security regenerative
Strategic Framework for New Electric Power System Development under the Energy Security Pattern
Tang Guangfu , Zhou Jing , Pang Hui , Lin Junjie , Fan Zheng , Wu Yanan ,He Zhiyuan , Ma Shicong , Xue Feng , Zhou Baorong
Strategic Study of CAE 2023, Volume 25, Issue 2, Pages 79-88 doi: 10.15302/J-SSCAE-2023.02.010
Keywords: energy security new electric power system emergency warning sharing and mutual aid security defense
The System Standpoint on Information Safety
Li Daimao
Strategic Study of CAE 2007, Volume 9, Issue 8, Pages 21-25
Keywords: information safety security factor information hiding boundary threat
Strategy for Guaranteeing Power Supply Security of China
Rao Hong, Han Feng, Chen Zheng, Huang Guori, Wang Dan, Zhang Ye,Cai Wantong, Xu Min, Jiang Weiyong, Zhou Baorong
Strategic Study of CAE 2023, Volume 25, Issue 2, Pages 100-110 doi: 10.15302/J-SSCAE-2023.02.009
Electric power is vital for the national security, economy, and peopleand construct a power supply guarantee system that adapts to the new era and facilitate high-qualitytechnological innovations are proposed, and a three-step roadmap for constructing a new power supply guarantee systema new-generation technical system for guaranteeing power supply security; and (4) optimizing themarket system to construct a power security ecology participated by all.
Keywords: power security supply security carbon peaking and carbon neutrality new type of power system
Title Author Date Type Operation
Water environment security indicator system for urban water management
Tian HAO, Pengfei DU, Yun GAO
Journal Article
Ecological security evaluation of Africa
Huihui WEI, Wenjuan ZHANG, Feng ZHANG, Guojun SUN
Journal Article
Research and practice on system engineering management of a mobile payment project
Yongkai ZHOU, Hongfeng CHAI
Journal Article
Development of Security Protection Technologies for Industrial Control System
Sun Yanbin, Wang Hongyi, Tian Zhihong , Fang Binxing
Journal Article
Artificial Intelligence Security in Multiple-Unmanned System Cooperation
Shi Wen, Wang Kaiwen, Yu Chengpu, Sun Jian, Chen Jie
Journal Article
Managing nutrient for both food security and environmental sustainability in China: an experiment for
Fusuo ZHANG, Zhenling CUI, Weifeng ZHANG
Journal Article
The Current Network Security Situation and Emergency Network Response
Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong
Journal Article
Development of Content Security Based on Artificial Intelligence
Zhu Shiqiang, Wang Yongheng
Journal Article
Theoretical Method and Practice of Giant System for Mineral Resource Security
Chen Qishen, Zhang Yanfei, Xing Jiayun, Long Tao, Zheng Guodong, Wang Kun,Ren Xin, Li Zhenqing, Li Qiang
Journal Article
Strategic Framework for New Electric Power System Development under the Energy Security Pattern
Tang Guangfu , Zhou Jing , Pang Hui , Lin Junjie , Fan Zheng , Wu Yanan ,He Zhiyuan , Ma Shicong , Xue Feng , Zhou Baorong
Journal Article